Digital forensics

Evidence Preservation and Analysis

How does it work?

Reconstructing the attacker’s steps and actions provides knowledge to prevent similar attacks from happening again and, if necessary, to provide evidence before the law. Zerum Lynx analyzes the raw network data involved in the incident, enabling cybersecurity teams to know where it came from, how it penetrated and how it acted.

How does it work?

Reconstructing the attacker’s steps and actions provides knowledge to prevent similar attacks from happening again and, if necessary, to provide evidence before the law. Zerum Lynx analyzes the raw network data involved in the incident, enabling cybersecurity teams to know where it came from, how it penetrated and how it acted.

network forensics with speed and accuracy

Zerum Lynx™ enables agile, in-depth forensic investigations based on network traffic. With an intuitive interface and optimized architecture, it is possible to identify, reconstruct and extract digital evidence in a few seconds, without the need for agents on the devices.

continuous packet capture with automated extraction

All network communication is recorded in real time with forensic precision. Files, credentials, commands and transmitted objects are automatically extracted from captured packets, allowing retroactive analysis and reconstruction of events with total clarity.

complete visibility from layer L2 to L7

The solution analyzes the full content of packets (full packet capture), not just the flow metadata. This guarantees a granular view of network interactions, revealing protocols, applications, errors and suspicious activity at any layer.

decryption embedded in dedicated hardware

With support for real-time decryption directly on the hardware, Lynx™ offers visibility of encrypted traffic with high performance, without impacting capture or compromising the integrity of evidence.

chain of custody preserved with digital signature

The evidence captured – such as files and packages – is stored with complete metadata. Optionally, they can be digitally signed in accordance with ICP-Brasil, guaranteeing legal validity.

post-mortem investigation with precise reconstruction of incidents

Lynx™ enables detailed forensic analysis after an incident has occurred, making it possible to reconstruct the timeline, identify the techniques used and understand the attack vector precisely. By preserving raw data and recording every network interaction, the solution provides the necessary inputs to extract lessons learned, improve defenses and, when necessary, support legal actions with consistent technical evidence.

Do you want expert support
to identify and eliminate cyber threats?

We’re here
to help you.