Data Collection and Preservation

Improve investigations and reduce your potential for litigation and fines with the strict chain-of-custody protocol our experts follow at every stage of the data collection process.
Contact Us
A Defensible Incident Response Starts With Reliable Evidence

When sensitive information is compromised, it’s critical to ensure electronic evidence is handled with precision and care to prevent it from being overwritten, destroyed, or otherwise corrupted. With Kroll, you can feel confident knowing our data collection and data preservation experts follow a strict chain-of-custody protocol at every stage of the process to improve the outcomes of on-site investigation and reduce your potential for litigation and fines.

Mitigate Risk Through Proper Identification and Preservation of Digital Evidence

Preserving critical electronic evidence during on-site investigation and threat containment/eradication paves the way for a successful incident analysis. At Kroll, our trained and certified forensic experts adhere to strict data preservation standards to ensure all potentially relevant data is captured and remains intact during an on-site investigation. We have the ability to quickly and efficiently capture electronic data from:

  • Email servers
  • Network shares
  • Desktop or laptop computers
  • Handheld and portable devices
  • Backup media

Whether gathering digital evidence from a single source or from multiple sources organization-wide, we apply forensically sound methods to preserve key digital evidence so you can establish a clear picture of the incident and launch an effective response. And because we’ve worked on hundreds of cases involving multiple data collection sites around the globe, you can trust us to perform an optimal on-site investigation, giving you the flexibility to pursue any available legal remedies.

Key Areas

Talk to a Kroll Expert

Kroll is ready to help, 24x7. Use the links on this page to explore our services further or speak to a Kroll expert today via our 24x7 cyber hotlines or our contact page. 

Computer Forensics

Kroll's computer forensics experts ensure that no digital evidence is overlooked and assist at any stage of an investigation or litigation, regardless of the number or location of data sources.

Digital Forensics Services

In the event of a security incident, Kroll’s digital forensics investigators can expertly help investigate and preserve data to help provide evidence and ensure business continuity.

24x7 Incident Response

Kroll is the largest global IR provider with experienced responders who can handle the entire security incident lifecycle.


Office 365 Security, Forensics and Incident Response

Digital forensic experts investigate hundreds of Office 365 incidents per year and help strengthen your security.

Malware Analysis and Reverse Engineering

Kroll’s Malware Analysis and Reverse Engineering team draws from decades of private and public-sector experience, across all industries, to deliver actionable findings through in-depth technical analysis of benign and malicious code.

Malware and Advanced Persistent Threat Detection

Our expertise allows us to identify and analyze the scope and intent of advanced persistent threats to launch a targeted and effective response.


Business Email Compromise (BEC) Response and Investigation

In a business email compromise (BEC) attack, fast and decisive response can make a tremendous difference in limiting financial, reputational and litigation risk. With decades of experience investigating BEC scams across a variety of platforms and proprietary forensic tools, Kroll is your ultimate BEC response partner.