ICC brings you comprehensive listings of Computer Services in Huntsville, Alabama complete with each company's contact details, product and service information.
Don Miguels Financial Svc
2025 Sparkman Dr NW
Huntsville
Alabama
35810
More information about Don Miguels Financial Svc
Harp Hill Farm, LLC
600 Boulevard South SW Suite 104A
Huntsville
Alabama
35802-2175
More information about Harp Hill Farm, LLC
Huntsville Phone Repair
12021 S Memorial Pkwy
Suite N-2
Huntsville
Alabama
35803
More information about Huntsville Phone Repair
Interweave Technologies LLC
1130 Putman Dr NW
Huntsville
Alabama
35816
More information about Interweave Technologies LLC
Kintsugi Electronics, LLC
1118 Tyler Rd NW
Huntsville
AL
35816 Call Today
More information about Kintsugi Electronics, LLC
North Alabama Technical Services
1208 Shadow Ridge Dr
Huntsville
Alabama
35803
More information about North Alabama Technical Services
Office Depot - Tech Services
5850-C University Drive
Huntsville
Alabama
35806
More information about Office Depot - Tech Services
Pc Therapist
3013 Mountain Park Cir NW
Huntsville
Alabama
35810
More information about Pc Therapist
Secure Data Recovery Services
900 Bob Wallace Ave SW
Huntsville
AL
35801 10% Off Hard Drive and RAID Data Recovery Services
More information about Secure Data Recovery Services
SecureUSB 3.0 Encrypted Flash DriveFIPS Certified with Military Grade Encryption
$139.00 to $199.00 16GB
32GB
64GB
Url: https://www.secureusb.com/product/encrypted-flash-drive
RFID Credit & Debit Card ProtectionProtect Your Identity with SecureData Card Protect RFID Blocking Wallet Card which Blocks RFID Card(s) while in your existing credit card holder, wallets, case, protector or sleeve.
Any credit cards within its 10mm e-field are made invisible to a reader
Fits in any wallet or money clip
Will last 3 years
Doesn't require batteries
Simply carry this card in your wallet and money clip and all cards within range of its efield will be protected.
$14.50
Url: https://www.secureusb.com/product/card-protect
Digital Forensics ServicesSecure Data Recovery Services provides expert computer forensics services to attorneys, businesses, and individuals worldwide. We collect, preserve, and analyze evidence in criminal and civil cases. We also provide our clients with preventative forensics services and education on the legal and technical issues surrounding electronically stored information.
Specific Forensics Services:
-Digital Forensics
-Mobile Forensics
-DVR Recovery
-Imaging & Erasure
-Analysis & Investigation
-Expert Testimony
Legal Forensics Services
-Divorce & Custody
-Infidelity Investigation
-Intellectual Property Cases
-Employment & Contracts
-Insurance Claims
-Social Media Analysis
Secure Data Recovery are experts in obtaining forensic images from all File Systems and Data Storage Devices, including:
-Hard Drives, Desktop Computers, Workstations, Laptops
-Removable Media, USB Thumb drives
-Email Servers, Database Servers, RAID Arrays, Application Servers, File Servers
-Smartphones, Tablets, SIM Cards
-Surveillance Cameras, Digital Recorders
Specializing in case types:
-IP Theft | Non-Compete | Non-Solicitation
-White-Collar Crime | Fraud | Embezzlement
-Breach of Fiduciary Responsibilities
-Contract Disputes
-Destruction of Data
-Domestic Relations
-Insurance Claims
-Negligence | Product Liability
-Privacy Violation | Breach
-Professional Malpractice
-Wrongful Termination
Starting at $1,500
Url: https://www.securedatarecovery.com/services/forensics
E-Discovery ServicesIf you are ever involved in a lawsuit or a dispute having access to your electronically stored data will be essential in order to prove your argument.Secure Data Recovery Services are experts at helping you to extract all relevant ESI from complex IT infrastructure. Our e-discovery process consists of seven main components.
Identification:
Our team of experts will locate all sources of electronically stored information and will find the best approach to collect it.
Secure Data Recovery are experts in obtaining ESI from all File Systems and Data Storage Devices.
-Hard Drives, Desktop Computers, Workstations, Laptops
-Removable Media, USB Thumb drives, Tape Drives
-Email Servers, Database Servers, RAID Arrays, Application Servers, File Servers
-Smartphones, Tablets, SIM Cards
-Surveillance Cameras, Digital Recorders, Camcorders, GPS Systems
-Files, Logs, Metadata, Databases, Cloud Providers, Industrial Systems, Email Accounts
Preservation:
Secure Data Recovery team will make sure the collected ESI is protected from being changed or deleted while the litigation is ongoing. This process can be very challenging since employees rely on the data to conduct day to day operations.
Collection:
Gathering ESI for further use in the e-discovery process. During the collection process our e-discovery experts will collect all relevant ESI as defined during the identification portion of the process. It is essential that this step is completed using forensically sound methods since internal investigations, legal inquiries and litigation require defensible and auditable results. The Secure Data Recovery e-discovery approach collects all associated metadata which will be indisputable during the production portion of the process.
Processing:
Our custom process and software will reduce the amount of ESI to just the relevant information including removing duplicate files stored on multiple devices and email chains containing the same attachments. This information is then converted to data sets which can be searched or queried for relevant phrases or terms.
Some files may also be converted to different formats which may be more suitable for the presentation portion of the e-discovery process.
-Restoration of archive backups and other sets of data
-Conversion of legacy formats of databases, files, and e-mail
-Extraction of container files (e-mail, encrypted files, virtual disks, databases and compressed file sets)
-Cataloging and itemization of all extracted files, e-mail, attachments and sparse files
-De-duplication, near de-duplication and similarity hashing
-Model Extraction
-Full text indexing
-Exception identification and handling
Review:
During this state our team of e-discovery experts will work with your legal team to go through the ESI which has been collected and processed to ensure that all information is relevant and nothing that has been collected is considered classified or private.
Analysis:
As the data is being processed and reviewed our e-discovery team learns more about the collected data and refines our process to locate the most relevant ESI to the case.
Production:
Once the information is processed, reviewed and analyzed its ready for production during which stage the most relevant ESI is delivered to the recipient such as the Client, court or opposing council. Should the case go to trial or the information used during other proceedings attorneys may be responsible for presenting the evidence in a clear and concise format to support the argument. At this time having the right company perform your e-discovery process will be the different in winning and losing.
Starting at $1,500
Url: https://www.securedatarecovery.com/services/ediscovery
SecureBackup for WindowsProviding customers with solution options is why SecureData, Inc. stands out from the competition. We offer a full-suite of services from data recovery to digital forensics to our new SecureBackup software. Our feature-rich backup and restore solution meets the needs of casual home users to large enterprises.
SecureBackup can automatically back up your entire hard drive not just a folder. You can specify file filters, retention policies, bandwidth limits, backup types, notifications, interface locks and more. Manage everything from your desktop or web portal.
Try It for Free
Free for 30 days
Url: https://www.securebackup.com/
Virtual Passages
2715 Cynthia Ln SE
Huntsville
Alabama
35803
More information about Virtual Passages
Note: If you are aware of any errors or ommissions on this page, there is a link on each business record's page where it can be reported.