computer forensics Home Page    Information Security and Computer Network Forensics Expert
- English - Français- Deutsch - Español - 日本語 - 繁體中文 -

 Total Solutions for Computer Network Forensic  Request software testing  

 

 

Products

HIGH-PERFORMANCE Network Packet Capture and WIRE-SPEED Packet Decode solutions for Wired and Wireless environment which support Ethernet, Wireless 802.11 a/b/g/n (WiFi), HTTPS/SSL, VoIP Interceptor technology for the Network Forensics , Lawful Interception and Information Security.

Wikipedia definition : Network Forensics, Lawful Interception , Information Security .

 

Tactic Lawful Interception Package

Tactic Lawful Interception Operation is the way investigator uses lawful interception device to collect the traffic from operator POP center or internet exchange gateway, and have it analyzed for crime investigation or intelligence collection. It is for temporary deployment instead of permanent operation and must be used for specific case by authorized personnel with approval by court. Traffic must be directed into interception point by the help of network management staff of operator or international exchange gateway. The only difference for tactic LI is that target user provision data may not be available directly from traffic, but it can be available by link analysis on the intercepted data. Decision Group provide the total solution of tactic lawful interception package for cyber investigation, lab and training of LEA, and it can be easily upgrade into ETSI-compliant LI platform.

Download:

- Brochure Download 3.38MB
- Package Contents 926KB
- Presentation Slides 1.60MB

Lawful Interception Suite (LI Suite) for Packet Data Network 

Decision Group’s Lawful Interception Suite (LI Suite) for Packet Data Network provides all the hardware and software needed for targeted network surveillance based on a court-issued warrant. The suite includes iMediator, iMonitor, our EDDM module that decodes and reconstructs network packets, and the evidence archiving manager – Data Retention Management System.

Download:
- Presentation Slides 1.69MB

Cloud Computing Application

Internet User Behavior Management Service by Cloud Computing Technology Offered Jointly by eDataNet and Decision Group

Download:
Data Sheets  683KB

E-Detective
Real-Time Network Forensics and Lawful Interception System

Download:
- Brochure 1.33MB
-
Hardware Specs 36KB
- Software Specs 256KB
- User Manual
- Presentation Slides 2.81 MB
(Read Instructions) - Online Demo Site (Login: root/000000)
Sample Appliance-Server Photo, HP ProLiant 380

Wireless-Detective
Real-Time Wireless Forensics and Lawful Interception System

Download:
- Brochure 3.19MB
- Hardware Specs 35 KB
- Software Specs 252KB
- User Manual
- Presentation Slides
5.6 MB
- Advanced technology of Distributed Wireless
  Network Interception
141KB
Sample Appliance Photo, Lenovo X200

E-Detective Decoding Centre (EDDC)
Network Forensics Packet Reconstruction Tool


Download:
- Brochure 1.14MB
- Hardware Specs 35 KB
- Software Specs 125KB
- User Manual
- Presentation Slides4.81 MB
Sample Appliance-Server Photo, HP ProLiant 160

HTTPS/SSL Network Packet Forensics Device
HTTPS/SSL Real-Time Forensics and Lawful Interception System

Download:
- Brochure 854KB
- Hardware Specs

- Software Specs 136KB
- User Manual
- Presentation Slides 6.33 MB
Sample Appliance-Server Photo, HP ProLiant 160

VoIP-Detective
VoIP & Real-Time Forensics and Lawful Interception System

Download:
- Brochure 260KB
- Hardware Specs 47.8KB
- Software Specs 192KB
- User Manual
- Presentation Slides 1.02MB
Sample Appliance-Server Photo, HP ProLiant 160

Network Investigation Toolkit/2nd Generation (NIT2) & 3rd Generation (NIT3)
Introduction of Network Investigation Tool

Download:
-
NIT2 Brochure 1.86MB
NIT3 Brochure 4.48M
- Hardware/Software Spec 88 KB
- User Manual
- Presentation Slides 2.83 MB
- Data Sheets
Sample Appliance Photo, Lenovo X200

E-Detective Data Guard System (EDGS)

Intranet Traffic Interception & Real-Time Reconstruction System
Market: SME, Enterprise, Government
Models: EDGS
Download: Presentation Slides 4.63MB

Download: Brochure 1.14MB

Sample Appliance-Server Photo, HP ProLiant 380



Forensics Investigation Toolkit (FIT)
Introduction of Forensics Investigation Tool

Download:
- Brochure 949KB
- Presentation Slides 2.62 MB
- Data Sheets 2.37MB
- FIT User Guide 1.22MB
ED Backup Server & ED Data Retention and Management System (DRMS)
E-Detective Backup Data Viewing System

Download:

- Software Specs 85KB
- Presentation Slides 1.06MB
- Backup Server Catalog 960kB

Sample Appliance-Server Photo, HP ProLiant 160


 

Central Management System (CMS)
Managing Distributed ED and DRMS systems.


Download:
-- Hardware Specs 35 KB
- Presentation Slides 779 KB

Sample Appliance-Server Photo, HP ProLiant 380

WPA-PSK and WPA2-PSK Cracking Module

 

Download:
WPA-PSK and WPA2-PSK Cracking Module

Performance and Stress Test Report on E-Detective 500 and 1000 models

 

Network Packet Forensics Analysis Training (NPFAT)


Download:
- Training Schedule
- Content List 56.6KB

- Presentation Slides 858KB
- Instructor Profile
Cyber Crime Investigation Course

Combined with theory and real practice of case study, this program will provide you lot of information on cyber crime investigation by 4 aspects:

  1. The Nature of Cyber Crime
  2. Cyber Fraud
  3. Procedure of Lawful Investigation on Cyber Crime
  4. Case Study on Internal Threat and Information Security Issues

iMonitor

Download:
- Brochure 2.90MB
- Presentation Slides 938KB

iMediator

Download:
- Brochure 919KB
-Presentation Slides 3.08MB
-Specification 51.9KB

E-Detective Market Analysis

Download:
Market Analysis

     Presentation Slides for All Products

Awards and Recognitions

 

Picture:Light of R&D Award given by Europe 2008


 

Picture:7th Golden Penguin R&D Award from Industrial Bureau of Economic Ministry , 2009/12/1


Strong R&D Capability


    Full Range Network Forensics Technology
Site Map                                                                    Chinese Version Website              © Copyright Decision Group