Click to Share
 

E Detective

E-Detective - Real-Time Network Forensics and Lawful Interception System

Manufacturer - Decision Group Inc
Model # - ED
Submitted By - Decision Group Inc. (Manufacturer, Developer)
Country - Taiwan
Category - Security : Network D : Ethernet

Contact   |   Link To Product   |   More Products By This Company

Specifications

FX06 :   50
FX30 :   100
FX80 :   500
FX100 :   1000
FXL :   65536

Details

E-Detective - Real-Time Network Forensics and Lawful Interception System

E-Detective is a real-time Internet interception, monitoring and forensics system that captures, decodes and reconstructs various types of Internet traffic. It is commonly used for organization Internet and behavioral monitoring, auditing, record keeping, forensics analysis and investigation as well as legal and lawful interception for lawful enforcement agencies such as Police Intelligence, Military Intelligence, Cyber Security Department, National Security Agencies, Criminal Investigation Agencies, Counter Terrorism Agencies etc. It also provides compliance solution for many standards or acts like Sarbanes Oxley Act (SOX), HIPAA, GLBA, SEC, NASD, E-Discovery and many others.

E-Detective is capable to decode, reassembly and reconstruct various Internet applications and services such as Email (POP3, IMAP and SMTP), Webmail (Yahoo Mail, Windows Live Hotmail, Gmail etc.), Instant Messaging (Yahoo, MSN, ICQ, QQ, Google Talk, IRC, UT Chat Room, Skype), File Transfer (FTP, P2P), Online Games, Telnet, HTTP (Link, Content, Reconstruct, Upload and Download, Video Streaming), VOIP (optional module) etc.

E-Detective comes with wide variety of management and administrative functions and features. It provides you various types of report with Top-Down View. Reports that can be created include Total Throughput Statistical Report, Network Service Report (Daily, Weekly basis), Top Websites etc. All statistics can be displayed in per IP Address or per User Account basis.

E-Detective also provides varieties of search functions. It provides Free Text Search (search by Key Words with Boolean support), Conditional Search, Similar Search and Association with Relationship Search. It also comes with Alert and Notification (Throughput, Conditional and Key Words Alert) functions that allow the network administrator to setup different alert rules and parameters. This allows alert to be triggered (email to be sent to administrator) once the specified content is found in the captured and reconstructed content.

Backup function allows user to backup the captured raw data files or reconstructed contents. User can setup auto backup to backup these files to external drive (NAS or SAN) through FTP upload method. Besides, user can opt for manually backup these files by burning them into CD/DVD or even downloaded them to a local hard drive/PC.

Other functions available are like Bookmark, Capture File List (Comparing the content of two files), Online IP List, Authority Assignment, Syslog Server etc. Others functions include hashed export (backup), file content comparison etc.

Tags

, network forensic, , Internet intercept, , packet interception


Disclaimer: Submitters of product listings are solely responsible for their content. PRLog can't be held liable for the contents of the product listings.   Report Abuse


Like PRLog?
9K2K1K
Click to Share