www.exterro.com Open in urlscan Pro
151.101.130.132  Public Scan

URL: https://www.exterro.com/ftk-imager
Submission: On January 03 via api from IN — Scanned from DE

Form analysis 2 forms found in the DOM

https://www.exterro.com/search/results

<form role="search" action="https://www.exterro.com/search/results">
  <button type="submit" class="search__icon"></button>
  <input type="text" name="q">
</form>

https://www.exterro.com/search/results

<form role="search" action="https://www.exterro.com/search/results">
  <button type="submit" class="search__icon"></button>
  <input type="text" name="q">
</form>

Text Content

 * Products
 * Markets
 * Resources
 * Training
 * Partners
 * About
 * Legal GRC
 * Store
 * Request A Demo


 * Products
 * Spotlight
 * Privacy
 * E-Discovery
 * Risk Management and Compliance
 * Digital Forensics

 * Spotlight
 * Exterro Platform Overview
 * Office 365 Explorer
 * Artificial Intelligence

 * Privacy
 * Data Subject Access Request
 * Smart Data Inventory
 * Data Retention
 * Data Discovery
 * Vendor Risk Profiling
 * Consent

 * E-Discovery
 * Legal Hold
 * In-Place Preservation
 * Comprehensive Interview
 * E-Discovery Data Management
 * Smart ECA
 * ECA, Collection & Processing
 * ESI Vault
 * Review
 * Smart Labeling
 * Production
 * Legal Project Management
 * Employee Change Monitor
 * Data Source Discovery

 * Risk Management and Compliance
 * File Analysis
 * Exterro Incident and Breach Management
 * Smart Breach Review
 * FOIA & Public Records Response
 * Exterro Policy Management

 * Digital Forensics
 * FTK 8.0 - Free Trial
 * FTK 8.0
 * FTK
 * FTK Lab
 * FTK Imager
 * FTK Enterprise
 * FTK Connect
 * FTK Central
 * FTK Product Downloads

 * Markets
 * Corporations
 * Law Enforcement
 * Public Sector
 * Service Providers
 * Law Firm

 * Resources
 * Spotlight
 * Ongoing Initiatives
 * Resource Library

 * Spotlight
 * Basics of E-Discovery
 * Basics of Data Privacy
 * Basics of Digital Forensics
 * FRCP & E-Discovery Guide
 * Legal Leaders Series
 * Masters of E-Discovery, Volume II
 * Masters of Digital Forensics
 * Masters of Data Privacy
 * IABM Video Series

 * Ongoing Initiatives
 * Data Privacy Alert Library
 * E-Discovery Case Law Library
 * E-Discovery Maturity Quiz
 * How Exterro Is Changing Lives
 * State Privacy Law Map
 * FTK Over the Air podcast

 * Resource Library
 * Blog
 * E-Books
 * Infographics
 * Product Briefs
 * Surveys & Reports
 * Webcasts
 * White Papers
 * All Forensics

 * Partners
 * PARTNER PROGRAM
 * BECOME A PARTNER
 * Find a Partner

 * About
 * Leadership Team
 * Customers
 * About Us
 * News
 * Careers
 * Contact Us
 * Exterro Gives Back
 * Events
 * Exterro CLE Roadshow 2023

Legal GRC Software Platform

 * Products
   
   
   SPOTLIGHT
   
   * Exterro Platform Overview
   * Office 365 Explorer
   * Artificial Intelligence
   
   
   PRIVACY
   
   * Data Subject Access Request
   * Smart Data Inventory
   * Data Retention
   * Data Discovery
   * Vendor Risk Profiling
   * Consent
   
   
   E-DISCOVERY
   
   * Legal Hold
   * In-Place Preservation
   * Comprehensive Interview
   * E-Discovery Data Management
   * Smart ECA
   * ECA, Collection & Processing
   * ESI Vault
   * Review
   * Smart Labeling
   * Production
   * Legal Project Management
   * Employee Change Monitor
   * Data Source Discovery
   
   
   RISK MANAGEMENT AND COMPLIANCE
   
   * File Analysis
   * Exterro Incident and Breach Management
   * Smart Breach Review
   * FOIA & Public Records Response
   * Exterro Policy Management
   
   
   DIGITAL FORENSICS
   
   * FTK 8.0 - Free Trial
   * FTK 8.0
   * FTK
   * FTK Lab
   * FTK Imager
   * FTK Enterprise
   * FTK Connect
   * FTK Central
   * FTK Product Downloads
 * Markets
   
   
   CORPORATIONS
   
   
   LAW ENFORCEMENT
   
   
   PUBLIC SECTOR
   
   
   SERVICE PROVIDERS
   
   
   LAW FIRM
 * Resources
   
   
   SPOTLIGHT
   
   * Basics of E-Discovery
   * Basics of Data Privacy
   * Basics of Digital Forensics
   * FRCP & E-Discovery Guide
   * Legal Leaders Series
   * Masters of E-Discovery, Volume II
   * Masters of Digital Forensics
   * Masters of Data Privacy
   * IABM Video Series
   
   
   ONGOING INITIATIVES
   
   * Data Privacy Alert Library
   * E-Discovery Case Law Library
   * E-Discovery Maturity Quiz
   * How Exterro Is Changing Lives
   * State Privacy Law Map
   * FTK Over the Air podcast
   
   
   RESOURCE LIBRARY
   
   * Blog
   * E-Books
   * Infographics
   * Product Briefs
   * Surveys & Reports
   * Webcasts
   * White Papers
   * All Forensics
 * Training
 * Partners
   
   
   PARTNER PROGRAM
   
   
   BECOME A PARTNER
   
   
   FIND A PARTNER
 * About
   
   
   LEADERSHIP TEAM
   
   
   CUSTOMERS
   
   
   ABOUT US
   
   
   NEWS
   
   
   CAREERS
   
   
   CONTACT US
   
   
   EXTERRO GIVES BACK
   
   
   EVENTS
   
   
   EXTERRO CLE ROADSHOW 2023
 * Legal GRC
 * Store
 * Get Demo

Download FTK® Imager Now!


FTK® IMAGER

Preview and Image Data for Free

Need a quick way to see what data is on a computer hard drive?

Join the thousands of forensic professionals worldwide who trust FTK Imager as
their go-to solution for the first step in investigating an electronic device.

Click for sound





43:28









FULL DISK IMAGING CAPABILITIES

Preview and image hard drives from Windows and Linux computers, CDs, DVDs, thumb
drives, and other USB devices for free with FTK Imager! Acquire electronic
evidence in a forensically sound manner by creating copies of computer data
without making any changes to the original evidence.

CUSTOM CONTENT IMAGES

Create a custom content image of your dataset by selecting only the data you
want in order to reduce the size of your dataset and make your investigation
more efficient yet still forensically sound. Manually add files or directories
to your custom image or use wildcard search criteria to select targeted files.

FORENSIC IMAGE MOUNTING

Mount an image for a read-only view that leverages Windows® File Explorer to see
the content of the image exactly as the user saw it on the original drive. See
and recover files that have been deleted from the Recycle Bin, but have not yet
been overwritten on the drive.

HASH REPORTS

Generate hash reports for regular files and disk images (including files inside
disk images) that you can later use as a benchmark to prove the integrity of
your case evidence. Use either of the two leading hash functions: Message Digest
5 (MD5) and Secure Hash Algorithm (SHA-1).

PREVIEW DATA

Preview the contents of forensic images stored on your local machine or on a
network drive. This feature works with files and folders on local hard drives,
network drives, CDs and DVDs, thumb drives or other USB devices.

COMPATIBLE EXPORT FILES

FTK Imager can write and read all of the most common forensic image formats,
making it easy to continue your forensic analysis and review in whatever tool
you use in your workflow, including the full-featured FTK Forensic Toolkit.

RAM CAPTURE

FTK Imager allows you to perform memory capture or registry capture on a live
device, to recover passwords or other data stored in memory on the active
device. For large-scale remote volatile data capture and robust memory analysis
capabilities, upgrade to a full-featured version of FTK, including FTK®
Enterprise or FTK® Central.

Get Started with

FTK® Imager

Download FTK® Imager

undefined


WHAT CUSTOMERS ARE SAYING

I’ve used FTK Imager for nearly 20 years. Imager has always been a  dependable
imaging tool but the recent improvements in speed are really outstanding. We've
seen the time to image a device cut in half! Great work!

Tom Angle
Forensic Consultant, Law Enforcement


DO EVEN MORE WITH FTK® FORENSIC TOOLKIT

Upgrade to the Gold Standard in Digital Forensics

While FTK Imager excels at electronic device imaging, its analysis and review
capabilities are limited. For more than 15 years, digital forensics
professionals have counted on the full-featured FTK Forensic Toolkit to complete
forensically sound investigations.


RELATED RESOURCES

Download Now

Download Now

Download Now




~ SELECT CLIENTS ~

Previous

Next
Ready to learn how to use FTK® Imager?
Take the FTK Imager on-demand Training Course

Learn how to create Data Images, Custom Content Images, Data Previews, Hash
Reports, Mounted Images, RAM Capture & Exports

ENROLL NOW

Data security is our top priority

Rest easy knowing Exterro’s policies and processes implemented to protect your
data have been SOC 2® Type 2 certified and approved as FedRAMP Authorized.
More >

About Us

The Exterro Orchestrated E-Discovery Suite enables customers to manage, measure,
and optimize e-discovery processes, unifying all phases of e-discovery across
the EDRM, and all stakeholders on the same technology platform. More >

E-Discovery

 * Legal Hold
 * In-Place Preservation
 * Comprehensive Interview
 * ECA, Collection & Processing
 * Smart ECA
 * ESI Vault
 * Review
 * Smart Labeling
 * Production
 * Legal Project Managements
 * Employee Change Monitor
 * Data Source Discovery

Risk Management and Compliance

 * File Analysis
 * Exterro Incident and Breach Management
 * Smart Breach Review
 * FOIA & Public Records Response
 * Exterro Policy Management

Privacy

 * Data Subject Access Request
 * Smart Data Inventory
 * Data Retention
 * Vendor Risk Profiling
 * Data Discovery
 * Consent

Digital Forensics

 * FTK
 * FTK Lab
 * FTK Imager
 * FTK Enterprise
 * FTK Connect
 * FTK Central
 * FTK Product Downloads

Featured Software

 * Exterro Platform Overview
 * Exterro Office 365 Explorer

Markets

 * Corporations
 * Law Enforcement
 * Public Sector
 * Service Providers
 * Law Firm

Email Preference Center

Set your preferences for email updates on e-discovery, privacy, and digital
forensics.

Sign Up or Unsubscribe

Quick Links

 * Exterro Legal GRC
 * Contact Us
 * About Us
 * Blog
 * Careers
 * Leadership Team
 * Partners
 * News
 * Privacy Policy
 * Modern Slavery Statement
 * Technical Support
 * Do Not Sell My Personal Information

© 2024, Exterro, Inc. All rights reserved.






To turn off the behavioral advertising cookies and trackers on this website
toggle “Targeting / Advertising” cookies to “off” and click “Confirm My
Choices.” Note that your selection is limited to the specific device and browser
you are using during this visit to our website. If you visit this website from a
different device or browser you will need to opt out again.

Settings Allow All Disable All

×


ABOUT COOKIES

  Cookie List



To turn off the behavioral advertising cookies and trackers on this website
toggle “Targeting / Advertising” cookies to “off” and click “Confirm My
Choices.” Note that your selection is limited to the specific device and browser
you are using during this visit to our website. If you visit this website from a
different device or browser you will need to opt out again.

Allow All Disable All
Necessary Always Active

Necessary cookies help make a website usable by enabling basic functions like
page navigation and access to secure areas of the website. The website cannot
function properly without these cookies.

Preferences


Preference cookies enable a website to remember information that changes the way
the website behaves or looks, like your preferred language or the region that
you are in.

Statistics


Statistic cookies help website owners to understand how visitors interact with
websites by collecting and reporting information anonymously.

Marketing


Marketing cookies are used to track visitors across websites. The intention is
to display ads that are relevant and engaging for the individual user and
thereby more valuable for publishers and third-party advertisers.

Unclassified

Unclassified cookies are cookies that we are in the process of classifying,
together with the providers of individual cookies.

Save my choices