Built by people who understand what's at stake
ForensicLens was created by security software engineers with 20+ years protecting critical systems worldwide.
Why ForensicLens Exists
We've spent two decades building infrastructure and security software. We've seen countless small businesses and IT admins face the same impossible situation:
"I think we've been compromised. I don't have the budget for professional incident response. I don't have forensic expertise. I need to know what happened, but I don't know where to start."
This gap—between "do it yourself" and "hire professionals for $20,000+"—is where most small businesses get stuck. They either:
- Do nothing (hope for the best, clean reinstall, and move on)
- Spend days manually digging through logs without knowing what to look for
- Pay thousands they don't have for professional forensics
All bad options.
ForensicLens exists to give you a fourth option: accessible, honest, forensic-level analysis that doesn't require expertise or massive budgets.
Who We Are
Proven track record in security software engineering
2001 - Present | 173 Countries | Hundreds of Thousands of Installations
We're the team behind BackupAssist—Windows backup and recovery software that's been protecting business-critical data for over 20 years.
By the numbers:
- Deployed in 173 countries
- Hundreds of thousands of installations
- Protecting petabytes of critical data
- 20+ years of continuous development
- Trusted by businesses worldwide
What we learned: Small businesses need professional-grade tools that don't require professional-grade expertise. Complexity is the enemy of security.
Peer-Reviewed Cryptographic File System
We created ScramFS—a user-mode cryptographic file system developed in collaboration with cryptographers from:
- Monash University
- The University of Melbourne
- University of Cincinnati
Peer-reviewed and published. ScramFS is now securing configuration files and sensitive data across enterprise and government systems worldwide.
What we learned: Transparency and peer review build trust. Published methodologies are verifiable. Open systems are more secure than closed ones.
Infrastructure & Cybersecurity Since 2001
We've been in the infrastructure and cyber space for over two decades. We understand:
What's at stake
Business operations. Customer data. Reputation. Jobs. Livelihoods.
What works
Simple beats complex. Transparent beats proprietary. Honest beats confident.
What people need
Tools they can trust. Clear answers. No hype. No false promises.
Our Principles
These aren't just marketing words. They're how we build software.
Transparency
We publish our complete methodology. Every indicator we check. Every log we read. Every decision algorithm.
Why: Black boxes require blind trust. We earn trust through openness.
Honesty
We use a three-state model (DETECTED/NOT DETECTED/INDETERMINATE) because sometimes we can't determine the answer.
Why: False confidence is dangerous. You deserve truth, not marketing.
Accessibility
We design for IT generalists, not forensic experts. No specialized training required.
Why: Most organizations can't afford dedicated security teams. Good tools shouldn't require expertise.
Verifiability
Raw artifacts included in every ZIP. You can verify our findings manually.
Why: You shouldn't have to take our word for it. Check our work.
User-Owned Data
Standard formats (ZIP, CSV, JSON). No cloud uploads. No vendor lock-in.
Why: Your data belongs to you. Forever. Period.
No Hype
We say "62 indicators" not "comprehensive protection." We're specific, not grandiose.
Why: The security industry is full of exaggerated claims. We're different.
What ForensicLens Is NOT
Let's be clear about our limitations
We're not a replacement for professional incident response
If you have cyber insurance or a serious, sophisticated attack, call the professionals first. ForensicLens helps with triage and investigation, but doesn't replace expert forensic investigators.
Think of us as the difference between:
- Checking your own blood pressure vs. going to the ER
- Changing your own oil vs. rebuilding an engine
- Reading medical information vs. getting a diagnosis from a doctor
ForensicLens gives you information to make informed decisions. Sometimes that decision is "call in experts."
We're not "comprehensive" or "complete"
We check 62 specific indicators. That's 62 more than manual investigation, but it's not everything.
Sophisticated attackers can evade detection. Zero-day exploits won't have known signatures. Custom malware might not leave expected artifacts.
We're honest about what we can and can't detect.
We're not an antivirus or prevention tool
ForensicLens doesn't prevent breaches. It investigates after you suspect one happened.
You still need:
- Antivirus/EDR for prevention
- Firewalls for perimeter security
- Good patching practices
- User training
ForensicLens is for incident response, not prevention.
Our Commitment to You
We Will Always
- Publish our complete methodology
- Be honest about limitations
- Use standard, open formats
- Keep collection free forever
- Give you access to raw data
- Explain how we reach conclusions
- Listen to user feedback
- Prioritize accuracy over marketing
We Will Never
- Make exaggerated security claims
- Use proprietary data formats
- Require cloud uploads
- Collect telemetry without permission
- Lock you into our platform
- Hide our methodology
- Promise 100% detection
- Use FUD (fear, uncertainty, doubt) marketing
Join the Beta
Help us build better forensic tools for everyone
Beta Testers Get
- First machine analyzed FREE
- 50% off additional machines during beta
- Direct line to the development team
- Influence product roadmap
- Early access to new features
- Lifetime 20% discount after beta
Beta starting December 2024. Limited spots available.
Questions? Want to learn more?