Uncategorised Brands We Carry . . List of Clientele SandBox System SandBox System - Automated Malware Analysis - Automated malware analysis Software supports multiple analysis methods (static, dynamic, hybrid, hardware visualization, emulation) in order to detect hidden, unexecuted activities or encrypted modules of malware.- Support to analyze malware on many different environments at the same time: Windows XP, Win7, Win8, Win10 (32 and 64 bit);- Support to analyze many file formats as EXE, PDF, DOC, DOCX, DOCXM, XLS, PPT, HWP, NK, CHM, JAR, WSF, HTA, VBS, JS, etc;- Analysis results include detailed information about the malware behavior that performed on memory, on the hard drive, on the registry system, interacting with the network;- Support to analyze data on memory (memory dump), Pcap file;- Combined use of various analytic and detection technologies: YARA, MAEC;- Support to integrate with VirusTotal.com;- Support to compare different analytical results;- Support to create reports with many formats: PDF, XML, JSON, HTML. Contact Us Mobility Digital Evidence Mobility Digital Evidence Collection, Recovery and Analysis Management System: - Collect data, digital data in the field.- Backup and store digital data to ensure integrity.- Support for quick analysis of phone data, memory cards in the field.- Diagnose and recover slightly damaged data on standard SATA, IDE, SAS, SSD, memory cards and memory chips.- Supporting plugin API for 3rd parties to integrate many digital data analysis tools for special investigations.- Print quickly reports in the field. Social Listening Social Listening System - Gather information from social networks and the Internet.- Storage of collected data: news, news sources, image, video, profile.- Analyzing information, giving emotions, categorizing topics, building social relationships.- Provide technology to support the third party to participate in analyzing data. Social Listening and Social Database Management for Army:This is the software built on the above social listening technology, with the following features:- Building a database of information on military-related peoples for information query and investigation on social networks and the Internet.- Monitoring, collecting and managing online information of the above target group related to the Military.- Timely detecting risks of leaking confidential information when subjects post it on the Internet.- Investigate all information related to social networks and Internet users.- And many military-related features. Digital Evidence Digital Evidence Collection, Recovery and Analysis System: - Digital data analysis using specialized high-performance forensic equipment. - Restore the operating system environment, the operating environment of digital evidence.- Diagnose and recover damaged data on standard SATA, IDE, SAS, SSD, memory cards and memory chips.- Analyze, search for digital evidence and related data, support investigation.- Supporting plugin API for 3rd parties to integrate many digital data analysis tools for special investigations. Project Reference Coming Soon... Website Attack Website Attack Threat Intelligence System: - Domain monitoring.- Monitoring the status of the Website.- Website monitoring on Blacklist.- Website monitoring on DeepWeb.- Vulnerabilities Management of the Website.- Notification over SMS, Email.- Supporting plugin API for 3rd parties integration. Distribution Management Distribution Management System: The System can provide to implement in multi-level and on multiple of server. System management features:- Update the anti-virus software version for higher update servers;- Online statistics and reporting of malware infection and compliance with security policies of the whole system;- Receive and respond to information from administrators of Regional Centers;- Export reports in Word, Excel formats;- Remote control to lower level servers;- Operating malware incident response in the whole system. User management features:- Centralized and comprehensive management, including: Software license, installed version, update status, information about software usage history;- Statistics, reporting in real time: Statistics by malware type, by equipment; network access history; connection history of removable memory devices (USB, memory cards, removable hard drives);- Remote control: Scans and provides information about malware, device information (computer specification, installed software, IP address, MAC address...);- Real-time monitoring of online users. Promotion and Offer OFFER: CALL +65 6222-5522 (Wall Mount / Pedestal Stand sold separately) Goods subjected to GST