Cloud Computing Application

For most enterprise accounts in the market, the issue for internal Internet access by employees usually brings benefits as well as damages. Accessing the Internet conveniently will increase the productivity of an employee in terms of fast information collection and better communication with both customers and suppliers. On the other hand, the Internet is also the major reason of data leakage and employee distraction from their job. In many enterprises, minimizing the disadvantages of employee internet access while increasing productivity is a primary concern of senior management.

 

Internet user behavior management is not a new idea. Senior management already uses log files from network management systems or active directories for that purpose in many enterprises. Unfortunately, reports from these systems, which are not designed for such purposes, don’t usually reveal many clues about employee behavior during working hours nor specify which event is abnormal. So, year after year, the situation is still the same as the internal network infrastructure grows more complicated with business development.

 

Digital Forensic Technology is a new way to manage Internet user behavior. It collects all data packets, inbound or outbound, at the router side of the network, and parses and classifies these packets, reconstructs the packets back to its original contents, and stores it in a file system in a database.

  • Instant Message Record :
    • Present date, time, account ID, IP(MAC) address, object and content of conversation and attachment.
    • Work on MSN, Web MSN, ICQ, Yahoo Message, Google Talk, QQ, IRC and UT.
    • Output conversation content of Instant Message by the condition of date into the format of Excel spreadsheet.
    • Reconstruct video, audio, origin and destination from Yahoo Messenger.
    • Provide log file of Skype with date, time, account ID, IP of sender and receiver.
    • Provide friend list of MSN, Yahoo messenger.

 

  • Provide decryption function of Gmail.

 

  • Network integration with Microsoft AD or Novell Netware server.

 

  • Provide analysis information of data packet with unknown protocol with date, time, origin and destination IP, port number, MAC, packet size, packet number in the sequence by filter request.

 

  • Archive system

 

  • The system is equipped with 2.5GHz above CPU,2GB memory and external disk array for archive image file.

 

  • Provide searching function with specified keyword and file on the archive image files by at least 100.

 

The major functions provided for enterprises are :

 

  • Prevention of internal data leakage

 

  • Deployment without change of the internal network infrastructure

 

  • Low total IT cost of ownership through services offered by ISP

 

  • Remote disaster recovery mechanism with email transaction data

 

  • Audit mechanism compliant with ISO 27001

 

  • Transaction and forensic auditing on email, instant message and VoIP systems

 

  • User network usage and daily behavior report for performance review

 

  • Confidential files and key words transmission tracking

 

The major functions provided for Home and School are :

 

  • Monitor student behavior at school from the viewpoint of Internet transactions, such as email, instant message, and set up sensitive words/jargons related to bully, pornography, drug deal, violent fight…etc.

 

  • Monitor children behavior at home from the viewpoint of Internet transactions, such as email, instant message, online game, web link…etc.
  • Network Forensics
Please contact us and request for additional information.
Please contact us and request for additional information.