Combining technical and legal expertise
to deliver investigative, discovery and forensic solutions worldwide.

Some of our Features

This is where your latest Features custom posts will show up. You can change this text in the options.

View all our Features
  • Computer Forensics »

    Computer forensics is the use of scientific methodologies for collecting, analyzing, and presenting digital evidence in litigation. The challenge for forensic experts grows as organizations store data on ever-increasing numbers of devices, operating systems and shared platforms. More »

  • Cyber Security »

    Assessments are crucial in determining the effectiveness of an organization’s current security, and in judging whether correct remediation has taken place after an incident. Kivu has deep expertise in both reactive and proactive data security services. More »

  • Data Breach Response »

    In today’s environment, a data breach is the perfect storm. It destroys customer loyalty, ruins corporate reputations, absorbs employee time and scarce resources, and opens the door to regulatory actions and law suits. More »

  • Investigations »

    Fraud, theft of confidential information and employee misconduct are issues which can literally destroy an otherwise sound business. In a highly competitive environment, the risks of financial damage, reputational harm and regulatory action have never been greater. More »

From Our Blog

RSS Kivu Labs

  • Good Data Quality is Better Security November 13, 2015
    Data quality is not a glamourous subject. It is not the type of topic that headlines a conference or becomes front-page news. It is more typically suited for help guides and reference manuals that few individuals relish reading. However, organizations that acknowledge the importance of data quality and have strong data quality programs significantly reduce […]
  • HIPAA Data Leakage – Is Your Protected Health Information Secure? October 20, 2015
    The misnomer of HIPAA compliant software is prevalent in the health care industry. Too often, HIPAA-regulated entities rely on vendor controls and claims of compliance as a substitute for their own HIPAA security programs. While the vendor software itself may meet the requirements of HIPAA compliance for the discrete functions it performs, the truth of […]

Upcoming Events