“If you put a key under the mat for the cops, a burglar can find it, too. Criminals are using every technology tool at their disposal to hack into people’s accounts. If they know there’s a key hidden somewhere, they won’t stop until they find it.” 

Tim Cook  –  CEO APPLE


RKH iSECURE aligns with its leading global partners to offer a range of e-Forensic tools, that assist industry experts, recover, extract and analyse case-critical data. The range of our products enables them to conduct and uncover a wealth of information range that include; web and user activity, access and modification dates, link files, USB activity, email chronology and printing, copying and deletion history, email accounts, devices, document management systems as well as cloud storage systems.


This investigation tool is designed for forensic practitioners, who need to conduct efficient, forensically sound data collection and investigations using a repeatable and defensible process. This solution allows examiners acquire data from a wide variety of devices, unearth potential evidence with disk level forensic analysis, and craft comprehensive reports on their findings, all while maintaining the integrity of their evidence.


This is a portable forensic tool that comes principally on a USB device. The solution gives access to forensic professionals as well as non-experts to quickly and easily triage and collect vital in a forensically sound and court-proven manner.


This solution allows you to monitor, capture, analyze and graphically visualize network traffic to see exactly what a suspect is doing during a law enforcement or government digital investigation. Captured network activity can be played back on demand. Furthermore it’s easy to deploy to enable quick access to network traffic once surveillance is determined to be necessary.

It is a passive network monitoring solution that visualizes network activity by creating a dynamic picture of communication flows, giving you a clear picture of your suspect’s activities and has the capacity to play back events from thousands of communications to validate whether criminal or malicious activity has taken place. This dramatically enhances your ability to identify all offenders and exploits, build a case, and locate any stolen information or misused resources.


This court-accepted digital investigations platform is built for speed, analytics and enterprise-class scalability. Its intuitive interface, email analysis, customizable data views and stability permits it to establish the framework for seamless expansion, so your computer forensics solution can grow with your organization’s needs.