News By Tag
News By Place
Forensic Data Services Named Best Of 2012
Forensic Data Services has just been named to the Daily Business Review’s "Best of 2012" list in the category of Best Data Security Services. The DBR "Best of 2012" awards are based upon an annual survey of the South Florida marketplace.
The DBR “Best of 2012” awards are based upon an annual survey of the South Florida marketplace that invites some 25,000 readers of the Daily Business Review to express their views. These upscale, high-end decision-makers are asked to select the best firms within a geographic region from Palm Beach southward.
Five-year-old Forensic Data Services, founded by Robert Moody, is one of just three firms named in the Best Data Security Services category.
“We are proud to be honored by the community for our accomplishments,”
Moody and his team handle a range of technical matters that include retrieval of records, acquisition of data that is thought to be damaged or lost and expert witness testimony in civil and criminal cases in state and federal court. They have worked with clients around the world and are proud of their “balanced approach” to computer forensics. “We have worked with the prosecution and the defense,” said Moody “we go where the data leads.”
“We are an old-timer in a very young field,” said Moody. “We’ve been working with law firms since forensics was in its infancy, our methodologies are what put us ‘head and shoulders’ above other firms.”
Moody also said that innovative products and services keep Forensic Data Services at the forefront of its industry. He described The DataFerret which opens up the field of computer forensics by allowing a client to use a device that allows them to collects a copy of the hard drive of a computer themselves and then send it to Forensic Data Services to be analyzed.
The firm’s proprietary Pandora process is a forensic procedure that finds specific files from one computer that are now on another computer providing formidable evidence in such situations as intellectual property theft.
Another product that Moody described is a secure mobile device that operates just like a top-of-the-line cellphone, but at the switch of a button becomes a clandestine communication device that can’t be hacked.
This award-winning company features a highly experienced and educated team, state-of-the-