Your infrastructure.
Complete control.

Deploy Forensic OSINT on your own servers. Your data never leaves your network — full functionality with zero external transmission.

When cloud isn't an option

Some organizations require complete control over where data lives and how it's accessed. On-Premise deployment puts everything on your infrastructure.

shield

Zero external transmission

No data sent to Forensic OSINT servers — everything stays within your network

dns

Your infrastructure

Run on your servers, your network, your security controls

lan

Internal network only

Backend runs entirely within your network — no external internet connection required after setup

groups

Team collaboration

Shared access to captures and centralized evidence repository

tune

Full configuration control

Configure security, access controls, and storage to your specifications

verified_user

Your compliance framework

Implement your organization's security policies and audit requirements

Two deployment methods

Choose the deployment approach that fits your organization's size and technical requirements.

inventory_2

Containerized (Docker / Kubernetes)

Flexible Scale

Containerized deployment that scales from a single workstation to enterprise Kubernetes clusters. Choose the approach that fits your infrastructure.

Docker Desktop

  • Ideal for individual investigators or small teams
  • Quick setup on a local workstation
  • Host computer must remain powered on

Kubernetes (K8s)

  • Enterprise-scale container orchestration
  • High availability and load balancing
  • Integrates with existing K8s infrastructure

Full platform functionality

On-Premise deployment includes all the features you'd get with cloud — running on your infrastructure.

backupSQL database backup of all captures
picture_as_pdfDigitally signed PDF report generation
folder_zipFull-disclosure package downloads
syncResync captures across browsers
searchCentralized evidence search
admin_panel_settingsRole-based access controls

Security on your terms

You control the security configuration. We recommend following industry best practices.

enhanced_encryption

End-to-end encryption

Each capture is encrypted individually with unique keys

manage_accounts

Access control

Admins manage user access with options for private cases

https

TLS encryption

Secure data transmission within your network

local_fire_department

Your firewall rules

Configure network access controls to your requirements

For IIS deployments, we recommend following Microsoft IIS Security Best Practices for optimal protection.

Built for high-security environments

local_police

Law enforcement

Agencies requiring on-premise evidence storage and air-gapped operations

account_balance

Government & defense

Organizations with strict data sovereignty and network isolation requirements

corporate_fare

Enterprise security teams

Corporate investigation units with existing on-premise infrastructure mandates

support_agent

Professional setup assistance available

Our team can help with initial installation and configuration. One-time setup fee with optional ongoing support agreements for OnPrem deployments.

Request Setup Assistance

Prefer managed infrastructure?

If you don't need to run your own servers, our cloud options provide the same functionality without the overhead.

Complete control. Full functionality.

Deploy Forensic OSINT on your infrastructure. Your data stays with you.

Minimum Requirements:

  • 8 Characters
  • 1 Upper
  • 1 Lower
  • 1 Digit