Uncategorised

Mobility Digital Evidence Collection, Recovery and Analysis Management System:

 

- Collect data, digital data in the field.
- Backup and store digital data to ensure integrity.
- Support for quick analysis of phone data, memory cards in the field.
- Diagnose and recover slightly damaged data on standard SATA, IDE, SAS, SSD, memory cards and memory chips.
- Supporting plugin API for 3rd parties to integrate many digital data analysis tools for special investigations.
- Print quickly reports in the field.

 

 

OFFER: CALL +65 6222-5522

(Wall Mount / Pedestal Stand sold separately)

Goods subjected to GST 

 

Social Listening System

- Gather information from social networks and the Internet.
- Storage of collected data: news, news sources, image, video, profile.
- Analyzing information, giving emotions, categorizing topics, building social relationships.
- Provide technology to support the third party to participate in analyzing data.

Social Listening

Social Listening and Social Database Management for Army:
This is the software built on the above social listening technology, with the following features:
- Building a database of information on military-related peoples for information query and investigation on social networks and the Internet.
- Monitoring, collecting and managing online information of the above target group related to the Military.
- Timely detecting risks of leaking confidential information when subjects post it on the Internet.
- Investigate all information related to social networks and Internet users.
- And many military-related features.

Coming Soon...

SandBox System - Automated Malware Analysis

 

 

- Automated malware analysis Software supports multiple analysis methods (static, dynamic, hybrid, hardware visualization, emulation) in order to detect hidden, unexecuted activities or encrypted modules of malware.
- Support to analyze malware on many different environments at the same time: Windows XP, Win7, Win8, Win10 (32 and 64 bit);
- Support to analyze many file formats as EXE, PDF, DOC, DOCX, DOCXM, XLS, PPT, HWP, NK, CHM, JAR, WSF, HTA, VBS, JS, etc;
- Analysis results include detailed information about the malware behavior that performed on memory, on the hard drive, on the registry system, interacting with the network;
- Support to analyze data on memory (memory dump), Pcap file;
- Combined use of various analytic and detection technologies: YARA, MAEC;
- Support to integrate with VirusTotal.com;
- Support to compare different analytical results;
- Support to create reports with many formats: PDF, XML, JSON, HTML.