Imagine LAN, Inc. Announces ConfigSafe 2015, The Ultimate Configuration Tool Suite for Windows Stability, Compliance, and Intrusion Investigation.

Share Article

ConfigSafe 2015 offers powerful system state configuration investigation and recovery features, automated forensics tools for malware investigations, and Windows diagnostics and application research for Windows PCs.

Imagine LAN, Inc., a leading developer of configuration management applications, announced today the availability of ConfigSafe 2015 for Windows Vista/7/8.1/10 PCs. ConfigSafe 2015 expands the ConfigSafe product line with enhanced system configuration capture, comparison and recovery abilities with configuration portability features for forensic investigation.

ConfigSafe 2015 is the ultimate configuration investigation tool suite designed for Windows PCs. By recording system state configuration “snapshots” that also capture Registry hives and file and folder attributes, ConfigSafe 2015 provides users with the ability to recover from bad software installs and uninstalls, faulty drivers, unwanted adware, and even detect the presence of malware.

By utilizing Microsoft Windows’ Volume Shadow Copy Service and SQLite-based portable snapshots, ConfigSafe 2015 is able to track all changes made to key system state components such as the Registry, system files, DLLs, system drivers, and network settings. Snapshots record a PC’s exact configuration at a moment in time which can then be used to investigate or recover from unwanted system state changes.

Additionally, computer forensic experts will find ConfigSafe 2015 includes critical features such as configuration exploration and comparison of Shadow Copies from all local and remote protected drives, mounted images, cloned drives, and saved SQLite snapahot images.

ConfigSafe 2015 is available in Desktop, Professional, and Forensic Editions for Microsoft Windows Vista, 7, 8.1, and 10.

ConfigSafe 2015 is an indispensable tool for power users, software developers, security administrators, and computer forensic experts. Learn more at

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Irwin Tsay
Visit website