NOTICE: The SARC Website is undergoing routine maintenance. Certain portions of the site will be unavailable during this period. We apologize for any inconvenience.
Steganography Analysis and Research Center
Thoughtful . Insightful . Precise : The Global Leader in Steganalysis
1-877-560-SARC

Welcome to the Steganography Analysis and Research Center

A Backbone Security Center of Excellence

Home

Lab - Triage - Enterprise - Training
Check Out Our Industry-Leading Steganalysis Products and Services:

StegAlyzerAS StegAlyzerAS
Steganography Analyzer Artifact Scanner

Detect the presence of steganography application files and registry entries in a lab environment
StegAlyzerSS StegAlyzerSS
Steganography Analyzer Signature Scanner

Detect the use of steganography applications and extract hidden information in a lab environment
StegalyzerFS StegAlyzerFS
Steganography Analyzer Field Scanner

Detect the presence and use of steganography applications in a triage environment
StegAlyzerRTS StegAlyzerRTS
Steganography Analyzer Real-Time Scanner

Detect the presence and use of steganography applications in real-time in an enterprise network environment
Certified Steganography Examiner Training Certified Steganography Examiner Training
Raise Your Threshold of Perception

Learn about the threats posed by steganography and
how to effectively detect and extract it in your investigations

Latest News:

New Backbone Security Offers Complimentary VIP Forensics Conference Registrations to Customers
No-Cost VIP Registrations Available to the Techno Security and Forensics Investigations and Mobile Forensics World Conference

RESELLERS WANTED

The SARC is expanding its global authorized reseller network! If
you are a reseller in the USA or
international countries,
apply now!

New Backbone Security Announces 2014 Schedule for Online Certified Steganography Examiner Training
Students Enjoy the Convenience of Training Online to Receive Their Certification
Hot Steganography: How al-Qaeda Hid Secret Documents in a Porn Video
Hundreds of Secret al Qaeda Documents Found Hidden in a Pornographic File Reveal Details of Attack Plans
Hot 'Operation Shady RAT' Attackers Employed Steganography
Digital Images Hid Commands Controlling Infected Machines
Hot Busted Russian Spies Used Steganography To Conceal Communications
'Deep-cover' Russian intelligence agents hid electronic messages behind computer images

Featured Clients and Awards: