PowerPoint 簡報

Download Report

Transcript PowerPoint 簡報

Surveillance Equipment For Internet Activities
Protecting business benefits and Promoting office efficiency
It is a Internet activities surveillance equipment designed for sniffer
package from networking, converter to Email, Hotmail, Web-mail, FTP, IM
MSN/ICQ/AOL/Yahoo/QQ, Telnet and Website Browsing such protocol.
Designed through :
Sniffer
network
package
Protocol
converter
Store to
database
Why Internet Surveillance Needed?
Previously, companies can just use a PROXY and BLOCK OFF Internet sites /
applications.
Now, with so many no-cost tools of communication available in the Internet, the
customers of these companies are demanding that these channels be opened up (like, e
mail, Instant Messaging … …).
Following are results of this :
a) Abuse by staff. Indulging in personal related issues over the internet rather than
being productive at work.
b) Invitation of virus and spam mail
c) Cookies with “malicious intent” penetrating the network
d) Bandwidth wastage
3 Types Of Companies Need E-Detective :
1. Companies that install E-Detective as a Deterrent, will
inform their staffs that Internet activities are being fully
monitored.
2. Financial, Banking and Investment Companies such as
derivatives, futures, etc, all transactions to be monitored.
3. Companies like marketing, design house, high technologies,
which critically need to prevent leakage of data. Staffs
communicate with customers or vendors through web-based
system need E-Detective to archive data.
What are the staff up to …
“Seems normal on the surface …”
“What ? Porno site ? Stock trading?
E-Shopping ? All are wasting your money!!
E-Detective System Uses Sniffer Technology
Support Multi Points
Data Import
Data acquire
Support
AD server
Work with
DHCP
Over VLAN …
Use HUB, Mirror port Switch, TAP
Copy network packet to E-Detective systems
E-Detective is easy to operate …
1.
2.
3.
Just use IE Browser login system from local or remote
Uses https protocol for security protection
Multi password, user’s name and User’s Group for system login
control
E-Detective support protocol
E-Detective can capture network packet in the LAN
and decode (decrypted) raw data into normal and real
E-Mail (POP3, SMTP, IMP4, Web mail, Hot mail),
FTP, MSN, ICQ, AOL, YAHOO, QQ, TELNET and
URL Browsing such of protocol.
IP address / Computer users’ name
Columns : Status ,Pc IP, Pc Name, At Least Time, Group, You might
also sort the data by above columns by a simply clicking on the title
POP3/SMTP/ Web mail Log
POP3, SMTP, Web Mail ,
Hot Mail
Date/Time
Sender
Receiver
CC
Attachment
Subject
Size
Source File …
IM-MSN, ICQ, AOL, Yahoo, QQ Log
Date-Time
IP
User Handle
Participants
Conversation
Attach file
FTP Log
Date, Time, IP, server IP,
password, Action, File
name, File Content …
URL Browsing Log
URL Address, IP,
URL Content
Telnet Log
Date
Time
IP
Server IP
Size
User name
Password
Data Back Up
Back Up to ISO
Format Save to Hard
disk Or CD for easily
Re-storage
or Re-processed
Auto Back up
Back up
Search Record and Data Mining
SEARCH KEY
Support By IP, Mail
Account, Date, Time,
Keyword, Attach
file … etc
Report
Report
Chart Report
Report by Group
Expand storage
E-Detective allows expanded storage
like NAS, CD Libraries, Tape Storage, etc
E-Detective Model
We provide customers with E-Detective in some modules.
We challenge all sort of technical designs to meet the need of customers.
Modules
Photo
Number of
User’s can
monitor
Hard disk
size
CD R/W
Expanded
storage
Structure
ED –FX08
10 - 49
80 G
ED –FX30
50 - 200
120 G
Yes
ED –FX100
201 - 999
120 G Max 300 G
Yes
Support
1 layer
ED –FX120
1000 Up
120 G Max 300 G
Yes
Support
2 layer
1 layer
1 layer
Q&A
We support remote software update (By Internet Connection)
For more information, please visit
E-Detective’s web site
www.edecision4u.com
YOUR
Revolutionary Technology for Surveillance and
Audit of Internet Activities!!
Thank You