Decision Group’s Core Value Casper Kan Chang/ CEO

Slides:



Advertisements
Similar presentations
A Flexible Cloud-Computing Platform Focus on solving business problems
Advertisements

Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
Software Bundle ViPNet Secure Remote Access Arrangement using ViPNet Mobile © Infotecs.
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Decision Group Forensics Investigation Toolkit (FIT) Layer 7 Content Reconstruction Tool.
PowerPoint presentation of first 25 pages of instructional manual Edith Fabiyi Essentials of Internet Access.
| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
Click to continue Network Protocols. Click to continue Networking Protocols A protocol defines the rules of procedures, which computers must obey when.
Meganet Corporation VME Office Meganet Corporation Meganet Corporation is a leading worldwide provider of data security to Governments, Military,
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
Page 1 / 18 Internet Traffic Monitor IM Page 2 / 18 Outline Product Overview Product Features Product Application Web UI.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Offerings For Service Providers Ceedo Client Workspace Virtualization.
Lawful Interception & Packet Forensics Analysis System Casper Kan Chang Decision Group June 2010.
ISecurity Complete Product Series For System i. About Raz-Lee Internationally renowned System i solutions provider Founded in 1983; 100% focused on System.
Internet, Intranet and Extranets
Network Forensics and Lawful Interception Total Solutions Provider
Decision Group Inc Contents Introduction and Company Brief Corporate Milestones Globalized Company Solution and Technology Solution Position in.
DECISION GROUP The Pioneer of IT Forensics Taipei, Germany, Hong Kong, Singapore.
Chapter 9 The Internet: Information Technology Infrastructure for the Digital Firm.
Securing Instant Messaging Matt Hsu. Outline Introduction Instant Messaging Primer Instant Messaging Vulnerabilities and Exploits Securing Instant Messaging.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
A Product of Corporate Instant Messenger Enterprise Communication and Collaboration with Secure Instant Messaging Copyright © ANGLER.
Presence Applications in the Real World Patrick Ferriter VP of Product Marketing.
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
DECISION Group Inc.. Decision Group Mediation Device for Internet Access Provider.
Communications & Data Services The Evolution of Communications Cathy Avgiris EVP/GM May 10, 2012.
For more notes and topics visit:
? INTERNET WHAT, WHY, HOW. DEFINITION The Internet is a massive public spiderweb of computer connections. It connects personal computers, laptops, tablets,
The Internet Present By Tianyi Xiao ID : C  The Internet is a global system of interconnected computer networks that use the standard Internet.
Market Analysis Decision Group.
Cyber Crime & Investigation IT Security Consultant
Surveillance Equipment For Internet Activities It is a Internet activities surveillance equipment designed for sniffer package from networking, converter.
Lawful Interception & Packet Forensics Analysis System for Telecom and ISP Special promotion:- EDDC : Off-line Packet Reconstruction & Network Forensics.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
ShareTech 2015 Next-Gen UTM.
Application Layer CHAPTER 2. Announcements and Outline  Administrative Items  Questions? Recap 1.Introduction to Networks 1.Network Type 2.N etwork.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Introduction to Barracuda IM Firewall. Two Security Products in One Public IM Management –Manages traffic from public IM clients, including AIM, Yahoo!
Online gaming  Online gaming is very popular today and is a very big industry.  Online gaming is when people from all over the world come together.
Decision Group Inc. E-DETECTIVE Decision Group Inc.
E-Detective HTTPS/SSL Interception – MITM & Proxy Decision Group
Communication Systems The Internet The largest wide area network in the world. It is made up of thousands of linked networks. What.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
E-Detective Decoding Centre (EDDC) Offline Decoding & Reconstruction Solution Decision Group
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
Kuliah Pengantar Teknologi Informasi Coky Fauzi Alfi cokyfauzialfi.wordpress.com Internet (2)
E-Detective Ethernet LAN Interception System (with Real-Time Content Reconstruction) Decision Group
THE INTERNET. TABLE OF CONTENT CONNECTING TO THE INTERNET ELECTRONIC MAIL WORLD WIDE WEB INTERNET SERVICES.
E-Detective Network Investigation Toolkit - NIT (2010) Decision Group
Raya for Information Technology. About US  Raya IT, established in 1998, operates in the field of systems integration and IT business solutions.  A.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 Internet II A consortium of more than 180 universities, government agencies, and private businesses.
DECISION Group Inc.. Decision Group Monitoring Center Solution on Internet Access for LEA or Intelligence.
Decision Group April 2010 Market Analysis. Agenda  Market  DPI/DPC Market Size  Market Segments  Forensic Solution Market  Competitors  Decision.
Chapter 9 Sending and Attachments. Sending and Attachments FAQs: – How does work? – How do I use local ? – How do I use Web-based.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Electronic mail News File transfer protocol Chat Instant messaging Online services Online shopping.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Forensics Investigation Toolkit (FIT) Offline Raw Data Files Parsing and Reconstruction Tools (Windows) Decision Group
Introduction to Barracuda IM Firewall
Instructor Materials Chapter 5 Providing Network Services
Officeatwork 365 Document Designer Allows Organizations to Design Brand- and Legal- Compliant Templates and Documents Globally OFFICE 365 APP BUILDER PROFILE:
IWRITER 365 Offers Seamless, Easy-to-Use Solution for Using, Designing, Managing, and Sharing All Your Company Templates in Microsoft Office 365 OFFICE.
CHAPTER 2 Application Layer.
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Introduction to Networks
E-commerce Infrastructure Web Servers / Web Clients / Web Browsers
Bonrix Software Systems
Presentation transcript:

Decision Group’s Core Value Casper Kan Chang/ CEO Network Packet Reconstruction Technology for Computer Forensics and Information Security Decision Group’s Core Value Casper Kan Chang/ CEO

Digital Forensics Categories … 3. Cell Phone / PDA Forensics Data recovery Password recovery Analysis Software 1. Computer Forensics 2. Network Forensics

Network forensics is the next step of network security !! Internal data leakage exploits information security from within the firewall by trusted users General 95 % of security breaches are internal 5% of security breaches are external Company Virus, Attack Hacker from External

Network Packet Reconstruction Technology Packets Captured ( Sniffer from Wire, Wireless, HTTPS/SSL). Packets Organized. Playback (Reconstruction ). Saved to database . Sniffer Packets Saved to Database Organize Playback

Core Values of E-Detective Product Series The most complete product series and solutions for network packet reconstruction in the world. Supports network forensics and information security auditing standards. Value priced Supports most protocols under high network traffic globally. Continued product development and updates for new and changing network protocols. Software & hardware customization. Worldwide awards. Excellent and responsive professional customer service. Product + Price + Ability + Training Service = Values

Complete Solutions for Cyber Forensics Wired packet reconstruction. Wireless (802.11 a/b/g/n) packet reconstruction HTTPS/SSL interceptor Off-line packet reconstruction VOIP packet reconstruction Lawful Interception Suite Packet Reconstruction Development Toolkit (DTK) E-Detective Decoding Centre Enterprise Data Guard System Central Management System Data Retention Management System (FIT) Forensics Investigation Toolkit (NIT) Network Investigation Toolkit iMonitor iWarrant iMediator E-Detective Decoding Centre Cyber forensics training programs for LI, Cyber Intelligence, and Protocol Analysis We Provide a Full range of Software, Training and Hardware Solutions for Network Forensics and Information Security

More than 180 Internet Service Decoders Supports Most Internet Protocol Reconstruction, a Cyber Forensics and Information Security Requirement Email : POP3, SMTP, IMAP with attach files. Web Mail : Yahoo Mail, Gmail, Windows Live Hotmail, Hinet, Hotmail Standard, PCHome, URL, Giga, Yam, Sina, Seednet, mail.tom.com, mail.163.com, Sohu.com, Gawab. Instant Messaging : Yahoo Messenger, Windows Live Messenger (MSN), IRC, ICQ, UT Chat Room, Gtalk, Yahoo Web Chat, MSN Web Chat, Skype Voice Call Duration Log. File Transfer : FTP Upload/Download, P2P File Sharing ( BitTorrent, eMule/eDonkey, FastTrack, Gnutella ) VoIP : SIP, RTP Voice Sessions (Supported Codecs includes G.711, G.726, G.729 and iLBG). Video Streaming : Youtube, Metacafe, Google Video and Request. HTTP : Link, Content, Reconstruction, Upload and Download. Online Games : More then 70+ Online Games word wide. Skype : Text Chat Recording. Telnet : Play back Social Network Service: Facebook, Twitter, Plurk Mobile Devices: APP & Web Services on iPhone and Android, (BYOD) Other : Upon Request. More than 180 Internet Service Decoders

R&D in Computer Forensics and Information Security with 13 years experience Announced mediation device with fixed and LTE networks for Lawful Interception (LI) deployment. 2013 Central Management System with DRMS for 3-tier infrastructure on large scale distributed network at national level and EDS2 launched 2012 2011 ETSI Compliant E-Detective/LI system with IMS for Telecom launched Data Retention Management System and 10Gb E system launched 2010 Assisted in the course development of the Central Police University Network Security Forensics training material. 2009 2007 Off-line packet reconstruction product launched. 2006 E-Detective became part of the Coast Guard Digital Forensics SOP. The first HTTPS/SSL interceptor is launched. 2004 2002 The first Wireless Network Forensics Product is Launched. 2000 The first Wired Network Forensics product is launched in Asia.

Continuous Product Development Next Generation Products Lawful Interception Suite iMediator (iMD) - for lawful interception operation as mediation platform with telecom networks iMonitor (iWnt, EDDM) – for lawful interception operation as content reconstruction and monitoring system in LEA Monitoring Center

E-Detective Value-Added Product Applications Internet interception systems by transparent or forward proxy configuration. HTTPS Interceptor is the compliance solution for ISO 27001/ISMS. Supports Thin-Client Architecture. AD Server LDAP INTERNET Terminal Server proxy connection HTTPS / SSL E-Detective sniff

ISP Internet Interception Systems

E-Detective for ISO 27001 / ISMS E-Detective archives network data, Internet activities and transactions of the organization IT environment. This recorded data and content is essential for auditing and tracking. E-Detective deployment ensures that these organizations comply with ISO27001 / ISMS standard. E-Detective provides complementary functions for network Firewall, IDS, IPS, UTM, SIEM, DLP and other application software for IT security management.

The Achievement of Scientists Changed the World Louis Pasteur The Father of Microbiology Galileo Galilei The Father of Modern Science Thomas Alva Edison The Inventor of the Long-lasting Practical Light Bulb

Thomas Alva Edison The Inventor of the Long-lasting Practical Light Bulb Edison’s achievement came from his spirit of not allowing setbacks to lead to failures. With this courage and endless trials, he found answers for all of us . In the spirit of Thomas Edison, Decision Group implemented its forensics technology development. With sustained trials and experiments we have developed the latest in forensics technology over the past 13 years.

Customer List More than 6000 installations worldwide !! For network forensics and information security audit needs !! Law Enforcement –Taiwan CIB / MJIB, Malaysia, … Financial Business – TSEC, CTFI … Corporation – Foxconn, Acer, PC-home … Education - Chung Yuan Christian University … … OEM – Broadweb, nForce, PCI, Guardian … … ODM – GIZA … … Distributor / Reseller – HTCI, ST, PCS, … … More than 6000 installations worldwide !!

We are constantly searching for… ... Qualified and Committed Business Partners – Resellers Distributor ODM/OEM Cooperation …

Decision Computers believes in a Win-Win with their Partners Build benefits and cooperation. Expand business opportunities Share profits

About Decision Group Global Presence Headquarters : Taipei, Taiwan Established in 1986 with 27 years experience in IT industry. Strong R&D Capability : 40 Professional Engineers with 3 PhD and 7 Masters degrees 25 manufacturing engineers Sales: US$ 6.2M in 2012. Headquarters : Taipei, Taiwan Germany, Hong Kong, Japan, Egypt, Zimbabwe, Canada, China Global Presence Address: 4/F No. 31, Alley 4, Lane 36, Sec.5, Ming-Shan East Road Taipei, Taiwan, R.O.C . Phone No : +886 2 2766 5753 Fax No : +886 2 2766 5702 E-Mail : decision@decision.com.tw Url: www.edecision4u.com