Products |
HIGH-PERFORMANCE Network Packet Capture and WIRE-SPEED Packet Decode solutions for Wired and Wireless environment which support Ethernet, Wireless 802.11 a/b/g/n (WiFi), HTTPS/SSL, VoIP Interceptor technology for the Network Forensics , Lawful Interception and Information Security.
Wikipedia definition : Network Forensics, Lawful Interception , Information Security .
|
Tactic Lawful Interception Package
Tactic Lawful Interception Operation is the way investigator uses lawful
interception device to collect the traffic from operator POP center or
internet exchange gateway, and have it analyzed for crime investigation or
intelligence collection. It is for temporary deployment instead of permanent
operation and must be used for specific case by authorized personnel with
approval by court. Traffic must be directed into interception point by the
help of network management staff of operator or international exchange
gateway. The only difference for tactic LI is that target user provision
data may not be available directly from traffic, but it can be available by
link analysis on the intercepted data. Decision Group provide the total
solution of tactic lawful interception package for cyber investigation, lab
and training of LEA, and it can be easily upgrade into ETSI-compliant LI
platform.
Download:
- Brochure Download 3.38MB
- Package Contents 926KB
- Presentation Slides 1.60MB |
Lawful Interception Suite (LI Suite) for Packet Data Network
Decision Group’s Lawful Interception Suite (LI Suite) for Packet Data Network provides all the hardware and software needed for targeted network surveillance based on a court-issued warrant. The suite includes iMediator, iMonitor, our EDDM module that decodes and reconstructs network packets, and the evidence archiving manager – Data Retention Management System.
Download:
- Presentation Slides 1.69MB
|
Cloud Computing Application
Internet User Behavior Management Service by Cloud Computing Technology Offered Jointly by eDataNet and Decision Group
Download:
- Data Sheets 683KB |
E-Detective |
Real-Time Network Forensics and Lawful Interception System |
|
|
|
|
|
|
|
|
|
Sample
Appliance-Server Photo, HP ProLiant 380
|
|
|
|
Cyber Crime Investigation Course |
Combined with theory and real practice of case study, this program will provide you lot of information on cyber crime investigation by 4 aspects:
- The Nature of Cyber Crime
- Cyber Fraud
- Procedure of Lawful Investigation on Cyber Crime
- Case Study on Internal Threat and Information Security Issues
|
|
|
|
|
|
|
Awards and Recognitions |
Picture:Light of R&D Award given by Europe 2008
Picture:7th Golden Penguin R&D Award from Industrial Bureau of Economic Ministry , 2009/12/1
Strong R&D Capability
|
|