Uncategorised

 

      

.   .          

SandBox System - Automated Malware Analysis

 

 

- Automated malware analysis Software supports multiple analysis methods (static, dynamic, hybrid, hardware visualization, emulation) in order to detect hidden, unexecuted activities or encrypted modules of malware.
- Support to analyze malware on many different environments at the same time: Windows XP, Win7, Win8, Win10 (32 and 64 bit);
- Support to analyze many file formats as EXE, PDF, DOC, DOCX, DOCXM, XLS, PPT, HWP, NK, CHM, JAR, WSF, HTA, VBS, JS, etc;
- Analysis results include detailed information about the malware behavior that performed on memory, on the hard drive, on the registry system, interacting with the network;
- Support to analyze data on memory (memory dump), Pcap file;
- Combined use of various analytic and detection technologies: YARA, MAEC;
- Support to integrate with VirusTotal.com;
- Support to compare different analytical results;
- Support to create reports with many formats: PDF, XML, JSON, HTML.

Mobility Digital Evidence Collection, Recovery and Analysis Management System:

 

- Collect data, digital data in the field.
- Backup and store digital data to ensure integrity.
- Support for quick analysis of phone data, memory cards in the field.
- Diagnose and recover slightly damaged data on standard SATA, IDE, SAS, SSD, memory cards and memory chips.
- Supporting plugin API for 3rd parties to integrate many digital data analysis tools for special investigations.
- Print quickly reports in the field.

 

Social Listening System

- Gather information from social networks and the Internet.
- Storage of collected data: news, news sources, image, video, profile.
- Analyzing information, giving emotions, categorizing topics, building social relationships.
- Provide technology to support the third party to participate in analyzing data.

Social Listening

Social Listening and Social Database Management for Army:
This is the software built on the above social listening technology, with the following features:
- Building a database of information on military-related peoples for information query and investigation on social networks and the Internet.
- Monitoring, collecting and managing online information of the above target group related to the Military.
- Timely detecting risks of leaking confidential information when subjects post it on the Internet.
- Investigate all information related to social networks and Internet users.
- And many military-related features.

Digital Evidence Collection, Recovery and Analysis System:

- Digital data analysis using specialized high-performance forensic equipment.

- Restore the operating system environment, the operating environment of digital evidence.
- Diagnose and recover damaged data on standard SATA, IDE, SAS, SSD, memory cards and memory chips.
- Analyze, search for digital evidence and related data, support investigation.
- Supporting plugin API for 3rd parties to integrate many digital data analysis tools for special investigations.

     

            

 

 

 

Coming Soon...

Website Attack Threat Intelligence System:     

 

                 

- Domain monitoring.
- Monitoring the status of the Website.
- Website monitoring on Blacklist.
- Website monitoring on DeepWeb.
- Vulnerabilities Management of the Website.
- Notification over SMS, Email.
- Supporting plugin API for 3rd parties integration.

Distribution Management System:

The System can provide to implement in multi-level and on multiple of server. 

 

 

System management features:
- Update the anti-virus software version for higher update servers;
- Online statistics and reporting of malware infection and compliance with security policies of the whole system;
- Receive and respond to information from administrators of Regional Centers;
- Export reports in Word, Excel formats;
- Remote control to lower level servers;
- Operating malware incident response in the whole system.

User management features:
- Centralized and comprehensive management, including: Software license, installed version, update status, information about software usage history;
- Statistics, reporting in real time: Statistics by malware type, by equipment; network access history; connection history of removable memory devices (USB, memory cards, removable hard drives);
- Remote control: Scans and provides information about malware, device information (computer specification, installed software, IP address, MAC address...);
- Real-time monitoring of online users.

 

OFFER: CALL +65 6222-5522

(Wall Mount / Pedestal Stand sold separately)

Goods subjected to GST