Download presentation
Presentation is loading. Please wait.
Published byDarby Whillock Modified over 9 years ago
1
Total LI Compliance using Turn-key Applications and Solutions Rami Mittelman V.P. Product Marketing
2
Company Confidential Total LI solution - Why ? Comply with the law Delivery Verification LEA needs it If you know how to catch the ball you know how to throw
3
Company Confidential Total LI solution - What ? STAR-GATE Full Network coverage SAS: Same Administration & Maint. RELIANT: Monitor Center RELIANT4Data: Protocol decoding System solution Security Networking
4
Company Confidential Protocol Decoding Challenge Ever-expanding communications Different access modes Dial-up Cable modem xDSL Internet, Internet, Internet New versions, applications, protocols Needs for solution Process various protocols Passive processing
5
Company Confidential RELIANT4Data: all protocols Decoding Fax Dial-up modem Internet Mobile Data Viewing
6
Company Confidential Complete Solution: Internet Internet WWW E-mail FTP Telnet VoIP Chat Mobile Internet WAP ISP Access AOL 5.0 ComuServe 2000
7
Company Confidential Data Flow - Independent Conf.
8
Company Confidential Integration with other systems Open Solution Standard Input / Output interface Integration with... Delivery system Line tapping probes Monitoring Center (MC) Fast deployment
9
Company Confidential Cost-to-Cost vs. Team
10
Company Confidential RELIANT
11
Company Confidential RELIANT - Monitoring Center Collect Store Content Manage Information Store data Playback Review Transcription Analysis
12
Company Confidential Comprehensive Collection Network (node) based solution CALEA ETSI RELIANT Enhanced delivery interface Line tapping Trunk tapping
13
Company Confidential All Networks Wireline networks PSTN ISDN Wireless networks GSM TDMA CDMA APMS, DAMPS NMT Packet data networks ISP GPRS 1XRTT Wireless 3G EDGE UMTS Microphone
14
Company Confidential All Communication Types Voice Telephone Microphone Facsimile Data Dial-up modem Internet SMS
15
Company Confidential Open Solution Comply with Standards ETSI CALEA Open Architecture Open Database Open Storage Web Based - API Connection application ExpoSys (push)
16
Company Confidential Information Management Hierarchical Target Management Hierarchical User Management User’s Access rights Per target Per Operation ™ ™ ™
17
Company Confidential Growth Products RELIANT4Data Fax & Data processing Archive Server Long term storage Court evidence System Manager Maintenance & Fault management
18
Company Confidential Archive Server (ARCS) Jukebox Media management policy Complete Call Contents Call Data (CRI) Transcription Court Evidence & Playback Station
19
Company Confidential Growth Products - Cont. ExpoSys Information distribution Open Database RELIANT Visual Analyst Location Trac Station Mobile subscriber location
20
Company Confidential Security AAA & Penetration protection Authentication Authorization Audit Anti Virus Network Level Security
21
Company Confidential Turn Key Solution RealGate: RELIANT Enhanced delivery Store & Forward Save Communication costs Reliability: ammuns from network disconnection Compression Save Communication costs Target Administration by LEA
22
Company Confidential Country wide solution
23
Company Confidential Network optimization
24
Company Confidential End to End experience Since 1984 based on AudioDisk Overall investment of 870 man- years in R&D Over 550 installed systems Over 50 countries
25
Company Confidential Total LI compliance The winning team Products Score more points Win more games Experience Engineering
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.