Download presentation
Presentation is loading. Please wait.
Published byMilo Rice Modified over 9 years ago
2
Surveillance Equipment For Internet Activities It is a Internet activities surveillance equipment designed for sniffer package from networking, converter to Email, Hotmail, Web-mail, FTP, IM MSN/ICQ/AOL/Yahoo/QQ, Telnet and Website Browsing such protocol. Protecting business benefits and Promoting office efficiency Sniffer network package Protocol converter Store to database Designed through :
3
Why Internet Surveillance Needed? Following are results of this : a)Abuse by staff. Indulging in personal related issues over the internet rather than being productive at work. b)Invitation of virus and spam mail c)Cookies with “malicious intent” penetrating the network d)Bandwidth wastage Previously, companies can just use a PROXY and BLOCK OFF Internet sites / applications. Now, with so many no-cost tools of communication available in the Internet, the customers of these companies are demanding that these channels be opened up (like, e mail, Instant Messaging … …).
4
3 Types Of Companies Need E-Detective : 1.Companies that install E-Detective as a Deterrent, will inform their staffs that Internet activities are being fully monitored. 2.Financial, Banking and Investment Companies such as derivatives, futures, etc, all transactions to be monitored. 3.Companies like marketing, design house, high technologies, which critically need to prevent leakage of data. Staffs communicate with customers or vendors through web-based system need E-Detective to archive data.
5
What are the staff up to … “Seems normal on the surface …” “What ? Porno site ? Stock trading? E-Shopping ? All are wasting your money!!
6
E-Detective System Uses Sniffer Technology Use HUB, Mirror port Switch, TAP Copy network packet to E-Detective systems Data acquire Support AD server Work with DHCP Over VLAN … Support Multi Points Data Import
7
E-Detective is easy to operate … 1.Just use IE Browser login system from local or remote 2.Uses https protocol for security protection 3.Multi password, user’s name and User’s Group for system login control
8
E-Detective support protocol E-Detective can capture network packet in the LAN and decode (decrypted) raw data into normal and real E-Mail (POP3, SMTP, IMP4, Web mail, Hot mail), FTP, MSN, ICQ, AOL, YAHOO, QQ, TELNET and URL Browsing such of protocol.
9
IP address / Computer users’ name Columns : Status,Pc IP, Pc Name, At Least Time, Group, You might also sort the data by above columns by a simply clicking on the title
10
POP3/SMTP/ Web mail Log POP3, SMTP, Web Mail, Hot Mail Date/Time Sender Receiver CC Attachment Subject Size Source File …
11
IM-MSN, ICQ, AOL, Yahoo, QQ Log Date-Time IP User Handle Participants Conversation Attach file
12
FTP Log Date, Time, IP, server IP, password, Action, File name, File Content …
13
URL Browsing Log URL Address, IP, URL Content
14
Telnet Log Date Time IP Server IP Size User name Password
15
Data Back Up Auto Back up Back up Back Up to ISO Format Save to Hard disk Or CD for easily Re-storage or Re-processed
16
Search Record and Data Mining SEARCH KEY Support By IP, Mail Account, Date, Time, Keyword, Attach file … etc
17
Report Chart Report Report by Group
18
Expand storage E-Detective allows expanded storage like NAS, CD Libraries, Tape Storage, etc
19
E-Detective Model We provide customers with E-Detective in some modules. We challenge all sort of technical designs to meet the need of customers. ModulesPhotoNumber of User’s can monitor Hard disk size CD R/WExpanded storage Structure ED –FX0810 - 4980 G1 layer ED –FX3050 - 200120 GYes1 layer ED –FX100201 - 999120 G - Max 300 G YesSupport1 layer ED –FX1201000 Up120 G - Max 300 G YesSupport2 layer
20
Q & A For more information, please visit E-Detective’s web site www.edecision4u.com We support remote software update (By Internet Connection)
21
Thank You YOUR Revolutionary Technology for Surveillance and Audit of Internet Activities!!
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.