WetStone Technologies LiveDiscover Forensic Edition
May 01, 2008
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Easy to use tool with some nice information-gathering features.
- Weaknesses: Limited usefulness by itself -- however, as part of an overall toolkit, indispensable.
- Verdict: Add this to Gargoyle, LiveWire and some of the other WetStone products for a solid kit supporting other larger-scale tools.
This product is very simple to install and use. Installation is run as an MSI file when the CD is loaded into the system. After a few minutes, installation of both the product and dongle drivers is complete and the program is ready to go. To start an investigation the user just follows a few simple steps from a wizard and LiveDiscover does the rest. Once the scan is complete, the investigator can go through the discovered nodes and easily find information.
From a performance standpoint, this is a great product. It is not only simple to install and use, but it only has a small network footprint, so an investigation can take place without disrupting anything else. This product also goes beyond just servers and workstations. It can also forensically map switches, CD servers, jukeboxes and online storage. This provides the ability to get important information on almost any device running on the network.
This product comes with a short PDF user guide. This guide illustrates product features by showing simple steps in running an investigation starting from the discovery wizard through viewing data and reports. The guide features many labeled screen shots and step-by-step instructions.
Purchase of LiveDiscover includes one year of product maintenance. WetStone also has phone and email support available, as well as a small support area on the website. This area includes a FAQs section and driver downloads for the dongle.
At a price just shy of $2,000, this product is a good value for the money. While it does have some very excellent features, it is intended only as a starting place for an investigation.
SC Magazine Articles
- Brexit shakeup: How will the U.K.'s exit from the EU affect the technology sector?
- Blasphemy! Godless malware preys on nearly 90 percent of Android devices
- 'Password attacks' continue; Citrix becomes latest victim
- Dangerous connections: Risky LinkedIn behavior runs rampant, finds survey
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- CEO sacked after aircraft company grounded by whaling attack
- Wendy's POS breach 'considerably' bigger than first thought
- Microsoft warns of new, self-propagating ransomware in the wild
- No hacking required: Israeli researchers show how to steal data through PC components
- IRS implements new authentication safeguards
- Darktrace boss says we are living in a "golden age of criminality"
- UK Cyber-security after Brexit: May not be as bad as it first appears
- Industry, privacy groups: EU and U.S. Privacy Shield changes unlikely to ease concerns
- District court judge: FBI's hacking trick does not require warrant