Presentation is loading. Please wait.

Presentation is loading. Please wait.

E-Detective Ethernet LAN Interception System (with Real-Time Content Reconstruction) - 2010 Decision Group www.edecision4u.com.

Similar presentations


Presentation on theme: "E-Detective Ethernet LAN Interception System (with Real-Time Content Reconstruction) - 2010 Decision Group www.edecision4u.com."— Presentation transcript:

1 E-Detective Ethernet LAN Interception System (with Real-Time Content Reconstruction) - 2010 Decision Group www.edecision4u.com

2 Introduction to E-Detective LAN Internet Monitoring, Data and Record Keeping & Network Content Forensics Analysis Solution Solution for:  Organization Internet Monitoring/Network Behavior Recording  Auditing and Record Keeping for Banking and Finance Industry  Forensics Analysis and Investigation,  Legal and Lawful Interception (LI) Compliance Solution for: Sarbanes Oxley Act (SOX), HIPAA, GLBA, SEC, NASD, E-Discovery etc. FX-30N FX-06 FX-100FX-120 E-Detective Standard System Models and Series (Appliance based) User can also opt to purchase software license only from us and use their own hardware/server.

3 1010101010 1001100111 1011011101 1100011011 Email Webmail IM/Chat HTTP File Transfer Telnet 1010101010 10100101010 Using port-mirroring or SPAN port E-Detective System Architecture Display Reports Capture Packets Reassemble & Decode Reconstruct Back to Actual Content Store Save Archive E-Detective Architecture

4 E-Detective – Mirror Mode Implementation Organization or Corporate Network Deployment

5 E-Detective – Bridge Mode Implementation

6 E-Detective Lawful Interception Solutions Telco/ISP Lawful Interception

7 E-Detective Sample Screenshots - Reports Homepage – Top-Down Drill to Details Reporting

8 IM/Chat (Yahoo, MSN, ICQ, QQ, IRC, Google Talk Etc.) Email Webmail HTTP (Link, Content, Reconstruct, Upload Download) File Transfer FTP, P2P Others Online Games Telnet etc. E-Detective Internet Protocols Supported

9 Sample: Email (POP3, SMTP and IMAP)

10 Sample: Webmail – Yahoo Mail, Gmail, Hotmail etc… Webmail Type: Yahoo Mail, Gmail, Windows Live Hotmail, Giga Mail and others

11 Sample: IM -Yahoo, MSN, ICQ, IRC, QQ, GTalk etc…

12 Sample: File Transfer – FTP Upload/Download

13 Sample: File Transfer – P2P File Sharing Supports P2P such as Bittorent, eMule/eDonkey, Fasttrack, Gnutella

14 Sample: HTTP (Web Link, Content and Reconstruction) Whois function provides you the actual URL Link IP Address HTTP Web Page content can be reconstructed

15 Sample: HTTP Upload/Download

16 Sample: HTTP Video Streaming (FLV Format) Video Stream (FLV format): Youtube, Google Video, Metacafe. Playback of Video File

17 Sample: Telnet Session (with Play Back)

18 Sample: VoIP Calls (with Play Back) Play back of reconstructed VoIP audio file using Media Player Support RTP Codec such as G.711a-law, G,711µ-law, G.726, G.729, iLBC

19 Sample: Unknown or Non-Reconstructable

20 Admin: System Access Authority Assignment Authority – Visibility and Operation in Group (with User defined) Authority - Visibility Authority - Operation Authority Groups with Users

21 Export & Backup – Auto (by FTP) and Manual Auto (with FTP) Backup Manual Backup Download ISO or Burn in to CD/DVD Reserved Raw Data Files and Backup Reconstructed Data Comes with Hashed Export Function

22 Alert and Notification – Alert with Content Alert configured from different service categories and different parameters such as key word, account, IP etc. Alert can be sent to Administrator by Email or SMS if SMS Gateway is available. Throughput alert function also available!

23 Search – Free Text, Condition, Association Complete Search – Free Text Search, Conditional Search, Similar Search and Association Search Conditional Search Free Text Search Association Search

24 File Checksum (Hash) – Check File Content Integrity Shows the file lists and user can import files to check and compare with the files that has been captured by the system. Compare file content integrity. Abuser might have changed file name and send out the file to competitor.

25 Bookmark (for Review Next Time) Bookmark items and allow the review of the items. Bookmark items can also be exported.

26 Reporting – Network Service Usage - Daily Drill Down Reporting Capabilities

27 Reporting – Network Service Usage - Weekly Drill Down Reporting Capabilities

28 Reporting – Top Websites Viewed (Users)

29 Reporting – Online IP – Account Lists

30 Reporting – Daily Excel Log Report Manually or Automatically Generate Daily Log Report In Excel File Format.

31 References – Implementation Sites and Customers  Criminal Investigation Bureau  The Bureau of Investigation Ministry of Justice  National Security Agency (Bureau) in various countries  Intelligence Agency in various countries  Ministry of Defense in various countries  Counter/Anti Terrorism Department  National Police, Royal Police in various countries  Government Ministries in various countries  Federal Investigation Bureau in various countries  Telco/Internet Service Provider in various countries  Banking and Finance organizations in various countries  Others Notes: Due to confidentiality of this information, the exact name and countries of the various organizations cannot be revealed.

32 E-Detective Online Demo https://60.251.127.208 (root/000000)https://60.251.127.208 Decision Group www.edecision4u.com


Download ppt "E-Detective Ethernet LAN Interception System (with Real-Time Content Reconstruction) - 2010 Decision Group www.edecision4u.com."

Similar presentations


Ads by Google