SilentRunner by AccessData

  • Lillard T
  • Garrison C
  • Schiller C
 et al. 
  • 4


    Mendeley users who have this article in their library.
  • N/A


    Citations of this article.


Publisher Summary SilentRunner is the network forensic tool by AccessData. It is a suite of applications designed to work together, offering data capture, analysis, and visualization of the data. This includes the loading of the data into a relational database to provide complex query and correlation abilities. The major parts of the SilentRunner system are the Collectors, Loaders, Database, and Analysis workstations. The SilentRunner system of applications is made up of seven parts that include the Collector, Forwarder, Loader, Database, Data Manager, Analyzer, and Context Management. SilentRunner is implemented in two different ways: stand-alone and distributed. The stand-alone implementation installs all of the components on a single system. This is useful for security and incident response teams to place the system in a strategic place on an ad hoc basis. The distributed installation is designed for a permanent enterprise-wide deployment. The distributed installation performed by separating out the functions allows for a wide deployment and the ability to collect and work with a far greater amount of data. SilentRunner allows for two different editions: Standard and Privacy. The Privacy Edition is available in places where the privacy laws are more stringent than the United States, or if it is chosen to not collect such data.

Get free article suggestions today

Mendeley saves you time finding and organizing research

Sign up here
Already have an account ?Sign in


  • Terrence V Lillard

  • Clint P Garrison

  • Craig A Schiller

  • James Steele

Cite this document

Choose a citation style from the tabs below

Save time finding and organizing research with Mendeley

Sign up for free