Presentation is loading. Please wait.

Presentation is loading. Please wait.

Total LI Compliance using Turn-key Applications and Solutions Rami Mittelman V.P. Product Marketing.

Similar presentations


Presentation on theme: "Total LI Compliance using Turn-key Applications and Solutions Rami Mittelman V.P. Product Marketing."— Presentation transcript:

1 Total LI Compliance using Turn-key Applications and Solutions Rami Mittelman V.P. Product Marketing

2 Company Confidential Total LI solution - Why ? Comply with the law Delivery Verification LEA needs it If you know how to catch the ball you know how to throw

3 Company Confidential Total LI solution - What ? STAR-GATE  Full Network coverage  SAS: Same Administration & Maint. RELIANT: Monitor Center RELIANT4Data: Protocol decoding System solution  Security  Networking

4 Company Confidential Protocol Decoding Challenge Ever-expanding communications  Different access modes  Dial-up  Cable modem  xDSL  Internet, Internet, Internet  New versions, applications, protocols Needs for solution  Process various protocols  Passive processing

5 Company Confidential RELIANT4Data: all protocols Decoding  Fax  Dial-up modem  Internet  Mobile Data Viewing

6 Company Confidential Complete Solution: Internet Internet  WWW  E-mail  FTP  Telnet  VoIP  Chat Mobile Internet  WAP ISP Access  AOL 5.0  ComuServe 2000

7 Company Confidential Data Flow - Independent Conf.

8 Company Confidential Integration with other systems Open Solution  Standard Input / Output interface Integration with...  Delivery system  Line tapping probes  Monitoring Center (MC) Fast deployment

9 Company Confidential Cost-to-Cost vs. Team

10 Company Confidential RELIANT

11 Company Confidential RELIANT - Monitoring Center Collect Store Content Manage Information Store data Playback Review Transcription Analysis

12 Company Confidential Comprehensive Collection Network (node) based solution  CALEA  ETSI  RELIANT Enhanced delivery interface Line tapping Trunk tapping

13 Company Confidential All Networks Wireline networks  PSTN  ISDN Wireless networks  GSM  TDMA  CDMA  APMS, DAMPS  NMT Packet data networks  ISP  GPRS  1XRTT Wireless 3G  EDGE  UMTS Microphone

14 Company Confidential All Communication Types Voice  Telephone  Microphone Facsimile Data  Dial-up modem  Internet SMS

15 Company Confidential Open Solution Comply with Standards  ETSI  CALEA Open Architecture  Open Database  Open Storage  Web Based - API Connection application  ExpoSys (push)

16 Company Confidential Information Management Hierarchical Target Management Hierarchical User Management User’s Access rights  Per target  Per Operation ™ ™ ™

17 Company Confidential Growth Products RELIANT4Data  Fax & Data processing Archive Server  Long term storage  Court evidence System Manager  Maintenance & Fault management

18 Company Confidential Archive Server (ARCS) Jukebox Media management policy Complete  Call Contents  Call Data (CRI)  Transcription Court Evidence & Playback Station

19 Company Confidential Growth Products - Cont. ExpoSys  Information distribution Open Database  RELIANT Visual Analyst Location Trac Station  Mobile subscriber location

20 Company Confidential Security AAA & Penetration protection  Authentication  Authorization  Audit Anti Virus Network Level Security

21 Company Confidential Turn Key Solution RealGate: RELIANT Enhanced delivery Store & Forward  Save Communication costs  Reliability: ammuns from network disconnection Compression  Save Communication costs Target Administration by LEA

22 Company Confidential Country wide solution

23 Company Confidential Network optimization

24 Company Confidential End to End experience Since 1984  based on AudioDisk Overall investment of 870 man- years in R&D Over 550 installed systems Over 50 countries

25 Company Confidential Total LI compliance The winning team  Products Score more points Win more games  Experience  Engineering


Download ppt "Total LI Compliance using Turn-key Applications and Solutions Rami Mittelman V.P. Product Marketing."

Similar presentations


Ads by Google