computer forensics Home Page    Information Security and Computer Network Forensics Expert
- English - Français- Deutsch - Español - 日本語 - 繁體中文 - 简体中文 -

 Total Solutions for Computer Network Forensic  Request software testing  

 

 

E-Detective Data Guard System (Real-Time)

Unauthorized internal/external data access and attacks to an organization’s internal file servers or database system has become a very common issue today. Today, staff in organizations can easily access information shared in the organization’s networks, including the Database (customer information/vendor information etc.) and internal confidential/non-confidential files stored within the internal network (usually at the Server Farm). We can read about cases of customer information stolen by internal staff in banks, financial organizations, or government organizations and selling this information to competitors or other parties who can profit in this market. We experience it ourselves as well when we pick up calls from banks or credit card companies with which we have never had any relationship and who ask us to subscribe to their services. All these are serious issues in all organizations that do not have sufficient protections in their internal Database and File Servers systems.

E-Detective Data Guard System is used for monitoring and logging all access and activities to internal Databases (MS SQL, MySQL, Oracle DB etc.), CIFS file servers, local email servers (POP3/SMTP/IMAP), Webmail (Zimbra Mail), FTP servers, etc. within the organization’s network. It also includes alert and notification functions which allow the Administrator to be alerted if a certain pre-configured condition is matched and triggered. It also has full range search and query capability, and a range of reporting functions. With the E-Detective Data Guard System, sensitive information will not be accessed without the administrator’s knowledge.

E-Detective Data Guard System

Diagram: E-Detective Data Guard System Mirror Mode Implementation - Organization Intranet Traffic Monitoring

More ED-GS Product Information

NPFA Training
The knowledge of network packet analysis is important for Forensic Investigators and Lawful Enforcement Agency (LEA) to carry out their daily duty.
Investigators need the ability to identify different packet types according to various Internet Protocols.
These include -
  • Email (POP3, SMTP and IMAP)
  • Web Mail (Yahoo Mail, Gmail, Hotmail)
  • Instant Messaging (Windows Live Messenger, Yahoo, ICQ )
  • FTP
  • Telnet
  • HTTP
  • VOIP
Site Map                     © Copyright 2013 Decision Group (Wikipedia 2010)