SlideShare una empresa de Scribd logo
1 de 17
Welcome to corma
What are investigations to corma?
What makes investigations complex?
Challenges of the Information Age
Corporate investigations -
a multi-faceted challenge
2
Who can solve that for you?
3
corma GmbH:
investigative services
4
Stops suspects by:
analytical investigations
operative investigations
Saves time by:
online research
online monitoring
Increases efficiency &
saves money by:
data analytics
global intelligence
solutions
What makes corma unique?
5
corma services
6
Diverse needs
for investigations
7
Investigative framework (1)
8
Analytical investigations
Investigative work tailored to your needs
Analytical way of thinking and operating
Visual criminal analysis
Investigative framework (2)
9
Operative investigations
Interviews / discussions
Undercover questioning
Surveillance & documentation
Test purchases
corma services
10
Research challenges
11
Sources Time Data
iResearch:
solution developed by corma
12
Specialized investigative team
Info-broker network
Supported by intelligence databases
corma services
13
Data analytics
in investigations
14
Efficient data analytics
15
Specialized expert team
Certified analysts
State-of-the-art software solutions
Intelligence databases
We can assist you in:
16
☑ Investigations
☑ Research
☑ Data analytics
☑ Due Diligence
☑ Detection of warranty and service fraud
☑ Solutions against counterfeiting
☑ Retrieval of stolen goods
☑ Asset recovery
☑ Investigative databases
☑ Computer forensic
Should you have any questions, please feel free to contact us!
Jörn Weber
CEO
corma GmbH
Heinz-Nixdorf-Straße 22

41179 Mönchengladbach
Tel. +49 (2161) 277 85 – 0
mail@corma.de
www.corma.de
www.blog.corma.de/en

Más contenido relacionado

Destacado

Die Kunst des Ermittelns
Die Kunst des ErmittelnsDie Kunst des Ermittelns
Die Kunst des Ermittelns
corma GmbH
 
CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015
Jörn Weber
 

Destacado (9)

Die Kunst des Ermittelns
Die Kunst des ErmittelnsDie Kunst des Ermittelns
Die Kunst des Ermittelns
 
InfoZoom Tipps & Tricks – Vorlage für gleich strukturierte Daten erstellen
InfoZoom Tipps & Tricks – Vorlage für gleich strukturierte Daten erstellenInfoZoom Tipps & Tricks – Vorlage für gleich strukturierte Daten erstellen
InfoZoom Tipps & Tricks – Vorlage für gleich strukturierte Daten erstellen
 
InfoZoom Tipps & Tricks – Teil 5: Automatisierte Datenreinigung per Vorlage u...
InfoZoom Tipps & Tricks – Teil 5: Automatisierte Datenreinigung per Vorlage u...InfoZoom Tipps & Tricks – Teil 5: Automatisierte Datenreinigung per Vorlage u...
InfoZoom Tipps & Tricks – Teil 5: Automatisierte Datenreinigung per Vorlage u...
 
CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015
 
corma Unternehmenspräsentation
corma Unternehmenspräsentation corma Unternehmenspräsentation
corma Unternehmenspräsentation
 
corma‘s Investigative Approach
corma‘s Investigative Approachcorma‘s Investigative Approach
corma‘s Investigative Approach
 
InfoZoom Tipps & Tricks – Teil 2 Reporterstellung mittels InfoZoom Anfragen
InfoZoom Tipps & Tricks – Teil 2 Reporterstellung mittels InfoZoom AnfragenInfoZoom Tipps & Tricks – Teil 2 Reporterstellung mittels InfoZoom Anfragen
InfoZoom Tipps & Tricks – Teil 2 Reporterstellung mittels InfoZoom Anfragen
 
corma's Global Intelligence Solution to Combat Counterfeiting
corma's Global Intelligence Solution to Combat Counterfeitingcorma's Global Intelligence Solution to Combat Counterfeiting
corma's Global Intelligence Solution to Combat Counterfeiting
 
InfoZoom Tips & Tricks – Part 4 Merge Different Data Sources in InfoZoom
InfoZoom Tips & Tricks – Part 4 Merge Different Data Sources in InfoZoomInfoZoom Tips & Tricks – Part 4 Merge Different Data Sources in InfoZoom
InfoZoom Tips & Tricks – Part 4 Merge Different Data Sources in InfoZoom
 

Similar a corma company presentation

CF-Computer-Forensic-Services
CF-Computer-Forensic-ServicesCF-Computer-Forensic-Services
CF-Computer-Forensic-Services
Compute Forensics
 
Tom tom - Location services and privacy | Simon Hania @ VINT symposium THINGS...
Tom tom - Location services and privacy | Simon Hania @ VINT symposium THINGS...Tom tom - Location services and privacy | Simon Hania @ VINT symposium THINGS...
Tom tom - Location services and privacy | Simon Hania @ VINT symposium THINGS...
VINTlabs | The Sogeti Trendlab
 

Similar a corma company presentation (20)

Smart Solutions: Data Analytics to Support Fraud Examinations
Smart Solutions: Data Analytics to Support Fraud ExaminationsSmart Solutions: Data Analytics to Support Fraud Examinations
Smart Solutions: Data Analytics to Support Fraud Examinations
 
Smart Solutions: Data Analytics Substantial to Support Fraud Investigations
Smart Solutions: Data Analytics Substantial to Support Fraud InvestigationsSmart Solutions: Data Analytics Substantial to Support Fraud Investigations
Smart Solutions: Data Analytics Substantial to Support Fraud Investigations
 
CF-Computer-Forensic-Services
CF-Computer-Forensic-ServicesCF-Computer-Forensic-Services
CF-Computer-Forensic-Services
 
DATAD-R: Criteria for Trusted African Institutional Repositories
DATAD-R: Criteria for Trusted African Institutional RepositoriesDATAD-R: Criteria for Trusted African Institutional Repositories
DATAD-R: Criteria for Trusted African Institutional Repositories
 
Alpes strategie v5
Alpes strategie v5Alpes strategie v5
Alpes strategie v5
 
Tom tom - Location services and privacy | Simon Hania @ VINT symposium THINGS...
Tom tom - Location services and privacy | Simon Hania @ VINT symposium THINGS...Tom tom - Location services and privacy | Simon Hania @ VINT symposium THINGS...
Tom tom - Location services and privacy | Simon Hania @ VINT symposium THINGS...
 
GDPR & Forensics Readiness -English
GDPR & Forensics Readiness -EnglishGDPR & Forensics Readiness -English
GDPR & Forensics Readiness -English
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data Encryption
 
Trade Secret Asset Management
Trade Secret Asset ManagementTrade Secret Asset Management
Trade Secret Asset Management
 
In2SAM Audit Defence_ITAM Review Amsterdam April 2016
In2SAM Audit Defence_ITAM Review Amsterdam April 2016In2SAM Audit Defence_ITAM Review Amsterdam April 2016
In2SAM Audit Defence_ITAM Review Amsterdam April 2016
 
Technical Challenges in Cyber Forensics
Technical Challenges in Cyber ForensicsTechnical Challenges in Cyber Forensics
Technical Challenges in Cyber Forensics
 
Transpeye Overview V1 (1)
Transpeye Overview V1 (1)Transpeye Overview V1 (1)
Transpeye Overview V1 (1)
 
Revolutionizing the Legal Industry with Spark, NLP and Azure Databricks at Cl...
Revolutionizing the Legal Industry with Spark, NLP and Azure Databricks at Cl...Revolutionizing the Legal Industry with Spark, NLP and Azure Databricks at Cl...
Revolutionizing the Legal Industry with Spark, NLP and Azure Databricks at Cl...
 
Attack Simulation and Hunting
Attack Simulation and HuntingAttack Simulation and Hunting
Attack Simulation and Hunting
 
Digital Forensics Workshop
Digital Forensics WorkshopDigital Forensics Workshop
Digital Forensics Workshop
 
Investigating Cooridinated Data Exfiltration
Investigating Cooridinated Data ExfiltrationInvestigating Cooridinated Data Exfiltration
Investigating Cooridinated Data Exfiltration
 
Cloud data security and GDPR compliance
Cloud data security and GDPR complianceCloud data security and GDPR compliance
Cloud data security and GDPR compliance
 
Webinar - Fraud Detection - Palombo (20160428)
Webinar - Fraud Detection - Palombo (20160428)Webinar - Fraud Detection - Palombo (20160428)
Webinar - Fraud Detection - Palombo (20160428)
 
From Bad to Worse: How to Stay Protected from a Mega Data Breach
From Bad to Worse: How to Stay Protected from a Mega Data BreachFrom Bad to Worse: How to Stay Protected from a Mega Data Breach
From Bad to Worse: How to Stay Protected from a Mega Data Breach
 
InfoZoom Tips & Tricks – Part 5: Automated data cleansing via templates & que...
InfoZoom Tips & Tricks – Part 5: Automated data cleansing via templates & que...InfoZoom Tips & Tricks – Part 5: Automated data cleansing via templates & que...
InfoZoom Tips & Tricks – Part 5: Automated data cleansing via templates & que...
 

Último

Último (20)

Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 

corma company presentation