Uncategorised Mobility Digital Evidence Mobility Digital Evidence Collection, Recovery and Analysis Management System: - Collect data, digital data in the field.- Backup and store digital data to ensure integrity.- Support for quick analysis of phone data, memory cards in the field.- Diagnose and recover slightly damaged data on standard SATA, IDE, SAS, SSD, memory cards and memory chips.- Supporting plugin API for 3rd parties to integrate many digital data analysis tools for special investigations.- Print quickly reports in the field. Promotion and Offer OFFER: CALL +65 6222-5522 (Wall Mount / Pedestal Stand sold separately) Goods subjected to GST Social Listening Social Listening System - Gather information from social networks and the Internet.- Storage of collected data: news, news sources, image, video, profile.- Analyzing information, giving emotions, categorizing topics, building social relationships.- Provide technology to support the third party to participate in analyzing data. Social Listening and Social Database Management for Army:This is the software built on the above social listening technology, with the following features:- Building a database of information on military-related peoples for information query and investigation on social networks and the Internet.- Monitoring, collecting and managing online information of the above target group related to the Military.- Timely detecting risks of leaking confidential information when subjects post it on the Internet.- Investigate all information related to social networks and Internet users.- And many military-related features. Project Reference Coming Soon... SandBox System SandBox System - Automated Malware Analysis - Automated malware analysis Software supports multiple analysis methods (static, dynamic, hybrid, hardware visualization, emulation) in order to detect hidden, unexecuted activities or encrypted modules of malware.- Support to analyze malware on many different environments at the same time: Windows XP, Win7, Win8, Win10 (32 and 64 bit);- Support to analyze many file formats as EXE, PDF, DOC, DOCX, DOCXM, XLS, PPT, HWP, NK, CHM, JAR, WSF, HTA, VBS, JS, etc;- Analysis results include detailed information about the malware behavior that performed on memory, on the hard drive, on the registry system, interacting with the network;- Support to analyze data on memory (memory dump), Pcap file;- Combined use of various analytic and detection technologies: YARA, MAEC;- Support to integrate with VirusTotal.com;- Support to compare different analytical results;- Support to create reports with many formats: PDF, XML, JSON, HTML. Page 2 of 3 StartPrev123NextEnd