Network Packet Reconstruction Technology for Computer Forensics and Information Security   Decision Group’s  Core Value Casper Kan Chang/ CEO 2009 Sep
Digital Forensics Categories … 2.  Network Forensics   3.  Cell Phone / PDA Forensics Data recovery Password recovery Analysis Software 1.  Computer Forensics
Network forensics is  the next step of network security !! General 95 % of security breaches are internal 5% of security breaches are external Company Internal data leakage exploits  information security from within the firewall by trusted users Virus, Attack Hacker   from External
Network Packet Reconstruction Technology   Packets Captured ( Sniffer from Wire, Wireless, HTTPS/SSL). Packets Organized. Playback (Reconstruction ). Saved to database . Sniffer Packets Organize Playback Saved to Database
Core Values of E-Detective Product Series Product +  Price +  Ability +  Service  = Values The most complete product series  and solution for network  packet  reconstruction in the world. Supports network forensics and information security  auditing standards. Value priced Continued product development and  updates for new and changing network protocols. Worldwide awards. Excellent and responsive  professional customer service. Software & hardware  customization. Supports most protocols under  high network traffic globally.
Complete Solutions for Cyber Forensics Wired packet reconstruction. Wireless (802.11 a/b/g/n) packet  reconstruction. HTTPS/SSL interceptor. Off-line packet reconstruction. VOIP packet reconstruction. Network packet analysis training. Packet reconstruction development tool kit (DTK). Provides a Full range of  Software, Training and Hardware Solutions  for  Network Forensics and Information Security
Supports Most Internet Protocol Reconstruction, a Cyber Forensics and Information Security Requirement   Email :  POP3, SMTP, IMAP with attach files. Web Mail :  Yahoo Mail, Gmail, Windows Live Hotmail, Hinet, Hotmail Standard, PCHome, URL, Giga, Yam, Sina, Seednet, mail.tom.com, mail.163.com, Sohu.com, Gawab. Instant Messaging :  Yahoo Messenger, Windows Live Messenger (MSN), IRC, ICQ, UT Chat Room, Gtalk, Yahoo Web Chat, MSN Web Chat, Skype Voice Call Duration Log.  File Transfer :  FTP Upload/Download, P2P File Sharing ( BitTorrent, eMule/eDonkey,  FastTrack, Gnutella )   VoIP :  SIP, H.323 RTP Voice Sessions (Supported Codecs includes G.711, G.723, G.726, G.729 and iLBG). Video Streaming  : Youtube, Metacafe, Google Video etc and Request. HTTP :  Link, Content, Reconstruction, Upload and Download. Online Games :  More then 50 Online Games word wide. Skype :  Text Chat Recording. Telnet :  Play back Other :  Upon Request.
R&D in Computer Forensics and Information Security with 9 years experience Off-line packet reconstruction product launched. Assisted in the course development of the Central Police  University Network Security Forensics training material. 2000 2002 2004 2006 2007 2009 The first Wired Network  Forensics product is launched in Asia. The first Wireless Network Forensics Product is Launched . The first HTTPS/SSL interceptor is launched  . E-Detective became parts of the Coast Guard Digital Forensics SOP.
Continuous Product Development Next Generation Products Telecommunications Signal Forensics Product Series. GSM signal forensics analyzer. 3G Signal forensics analyzer. 3.5G Signal forensics analyzer.
E-Detective Value-Added Product Applications   ISP Internet interception systems. E-Detective is the compliance solution for ISO 27001/ISMS. Supports Thin-Client Architecture. AD  Server LDAP INTERNET Terminal Server proxy connection proxy connection HTTPS / SSL E-Detective sniff
ISP Internet Interception Systems
E-Detective for ISO 27001 / ISMS E-Detective archives network data, Internet activities and transactions of the organization’s entire network. This recorded data and content is essential for auditing and tracking. E-Detective’s implementation ensures that these organizations comply with  ISO27001 / ISMS standard.  E-Detective provides complementary solutions including solutions for network Firewall, IDS, IPS, UTM and other application software.
The Achievement of Scientists Changed the World  Galileo Galielei  The Father of Science  Louis Pasteur  The Father of Microorganism Thomas Alva Edison  The Inventor of Light Bulb
Thomas Alva Edison  The Inventor of Light Bulb Edison’s achievement came from his spirit of not allowing setbacks to lead to failures. With this courage and endless trials he found answers for all of us .  In the spirit of Thomas Edison, Decision Group implemented its forensics technology development. With sustained trials and experiments we have developed the latest in forensics technology over the past9 years.
Customer List Law Enforcement – Taiwan CIB / FBI / NSA Financial Business –  Taiwan Stock Exchange Corp … Corporation –  Foxconn, Acer, PC-home … Education -  Chung Yuan Christian University … … OEM –  Broadweb, nForce, PCI, Guardian … … ODM –  GIZA … …  Distributor / Reseller –  HTCI, ST, PCS, … … More than 6000 installations worldwide !! For network forensics and information security audit needs !!
We are constantly searching for… ...   Qualified and Committed Business Partners –  Resellers Distributor ODM/OEM Cooperation …
Decision Computers believes in a Win Win with their Partners Build benefits and cooperation.  Expand business opportunities  Share profit
About Decision Group Established in 1986 with  23 years experience  in IT industry. Strong  R&D Capability :  31 Software and Hardware engineers with 5 PhD. 10 Master Degrees 25 manufacturing engineers  Sales:  US$ 4.68M in 2007.  Headquarter : Taipei, Taiwan  Branch offices: Germany, Singapore, Hong Kong Global Presence   Address: 4/F No. 31, Alley 4, Lane 36, Sec.5, Ming-Shan East Road Taipei, Taiwan, R.O.C . Phone No : +886 2 2766 5753  Fax No : +886 2 2766 5702 E-Mail : decision@decision.com.tw  Url: www.edecision4u.com

More Related Content

PDF
I spy. The world of info Security from the known to the unknown.
PPTX
Fundamentals of Network security
PDF
Source Address Validation Everywhere, by Paul Vixie [APNIC 38 / Technical Key...
PPT
Defending the campus juniper nerworks
PPT
Blug Talk
PDF
Decision group company_profile_2017
PPT
ITE v5.0 - Chapter 10
PDF
Networking and communications security – network architecture design
I spy. The world of info Security from the known to the unknown.
Fundamentals of Network security
Source Address Validation Everywhere, by Paul Vixie [APNIC 38 / Technical Key...
Defending the campus juniper nerworks
Blug Talk
Decision group company_profile_2017
ITE v5.0 - Chapter 10
Networking and communications security – network architecture design

What's hot (20)

PDF
Supply Chain Attack Backdooring Your Networks
PDF
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
PDF
woot15-paper-novella
PDF
The Post Covid-19 Cybersecurity World - Where Is It Headed?
PDF
Trend Internet of Things
PPTX
Email Security Presentation
PPTX
Network Security Projects
PPT
Pretty good privacy
DOC
Network security
PPT
Tech 101: Understanding Firewalls
PDF
Wireless hacking tools.jpeg
PDF
REVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODS
PPT
Network Security
PPT
Discovery Home S B Chapter 9
PDF
Linux IOT Botnet Wars and the Lack of Basic Security Hardening - OSCON 2018
PPT
ITE v5.0 - Chapter 11
PPTX
CCNA RS_ITN - Chapter 4
PPTX
IoT Security - Preparing for the Worst
PDF
Importance of Using Firewall for Threat Protection
PPT
ECE 6570 Class01
Supply Chain Attack Backdooring Your Networks
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
woot15-paper-novella
The Post Covid-19 Cybersecurity World - Where Is It Headed?
Trend Internet of Things
Email Security Presentation
Network Security Projects
Pretty good privacy
Network security
Tech 101: Understanding Firewalls
Wireless hacking tools.jpeg
REVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODS
Network Security
Discovery Home S B Chapter 9
Linux IOT Botnet Wars and the Lack of Basic Security Hardening - OSCON 2018
ITE v5.0 - Chapter 11
CCNA RS_ITN - Chapter 4
IoT Security - Preparing for the Worst
Importance of Using Firewall for Threat Protection
ECE 6570 Class01
Ad

Viewers also liked (7)

PPTX
Computer forensics
PPTX
Pandas
PPT
Computer forensics
PPTX
Computer forensics
PPT
Computer forensics
PPT
computer forensics
PPTX
Computer forensics powerpoint presentation
Computer forensics
Pandas
Computer forensics
Computer forensics
Computer forensics
computer forensics
Computer forensics powerpoint presentation
Ad

Similar to Core Values Decision Sept (20)

PPT
Cyber Security 1215
PPT
Cyber Security Isaca Bglr Presentation 24th July
PDF
Cyber Forensics
PDF
Network Forensics.pdf
PPT
Network forensics1
PPTX
cyberforensicsv2-191113184409.pptx
PPTX
Remote forensics fsec2016 delija draft
PPTX
INTRODUCTION TO CYBERFORENSICS AND ITS APPLICATION IN CYBERSECURITY
PDF
Wired and Wireless Network Forensics
PPTX
cyberforensicsv2-191113184409.pptx
PDF
Fusing digital forensics, electronic discovery and incident response
PPTX
Cyber Forensics Overview
PPTX
DIGITAL FORENSICS, MULTIMEDIA AND INCIDENT RESPONSE.pptx
DOCX
1. What are two items to consider when creating a malware analysis.docx
PDF
Test Bank for Guide to Computer Forensics and Investigations, 5th Edition
PPT
cyber forensics - TYPES OF CYBER FORENSICS.ppt
PPT
SoleraNetworks
PDF
Collecting and analyzing network-based evidence
PPT
computer forensics, involves the preservation, identification, extraction, an...
PPTX
Network Forensics
Cyber Security 1215
Cyber Security Isaca Bglr Presentation 24th July
Cyber Forensics
Network Forensics.pdf
Network forensics1
cyberforensicsv2-191113184409.pptx
Remote forensics fsec2016 delija draft
INTRODUCTION TO CYBERFORENSICS AND ITS APPLICATION IN CYBERSECURITY
Wired and Wireless Network Forensics
cyberforensicsv2-191113184409.pptx
Fusing digital forensics, electronic discovery and incident response
Cyber Forensics Overview
DIGITAL FORENSICS, MULTIMEDIA AND INCIDENT RESPONSE.pptx
1. What are two items to consider when creating a malware analysis.docx
Test Bank for Guide to Computer Forensics and Investigations, 5th Edition
cyber forensics - TYPES OF CYBER FORENSICS.ppt
SoleraNetworks
Collecting and analyzing network-based evidence
computer forensics, involves the preservation, identification, extraction, an...
Network Forensics

Core Values Decision Sept

  • 1. Network Packet Reconstruction Technology for Computer Forensics and Information Security Decision Group’s Core Value Casper Kan Chang/ CEO 2009 Sep
  • 2. Digital Forensics Categories … 2. Network Forensics 3. Cell Phone / PDA Forensics Data recovery Password recovery Analysis Software 1. Computer Forensics
  • 3. Network forensics is the next step of network security !! General 95 % of security breaches are internal 5% of security breaches are external Company Internal data leakage exploits information security from within the firewall by trusted users Virus, Attack Hacker from External
  • 4. Network Packet Reconstruction Technology Packets Captured ( Sniffer from Wire, Wireless, HTTPS/SSL). Packets Organized. Playback (Reconstruction ). Saved to database . Sniffer Packets Organize Playback Saved to Database
  • 5. Core Values of E-Detective Product Series Product + Price + Ability + Service = Values The most complete product series and solution for network packet reconstruction in the world. Supports network forensics and information security auditing standards. Value priced Continued product development and updates for new and changing network protocols. Worldwide awards. Excellent and responsive professional customer service. Software & hardware customization. Supports most protocols under high network traffic globally.
  • 6. Complete Solutions for Cyber Forensics Wired packet reconstruction. Wireless (802.11 a/b/g/n) packet reconstruction. HTTPS/SSL interceptor. Off-line packet reconstruction. VOIP packet reconstruction. Network packet analysis training. Packet reconstruction development tool kit (DTK). Provides a Full range of Software, Training and Hardware Solutions for Network Forensics and Information Security
  • 7. Supports Most Internet Protocol Reconstruction, a Cyber Forensics and Information Security Requirement Email : POP3, SMTP, IMAP with attach files. Web Mail : Yahoo Mail, Gmail, Windows Live Hotmail, Hinet, Hotmail Standard, PCHome, URL, Giga, Yam, Sina, Seednet, mail.tom.com, mail.163.com, Sohu.com, Gawab. Instant Messaging : Yahoo Messenger, Windows Live Messenger (MSN), IRC, ICQ, UT Chat Room, Gtalk, Yahoo Web Chat, MSN Web Chat, Skype Voice Call Duration Log. File Transfer : FTP Upload/Download, P2P File Sharing ( BitTorrent, eMule/eDonkey, FastTrack, Gnutella ) VoIP : SIP, H.323 RTP Voice Sessions (Supported Codecs includes G.711, G.723, G.726, G.729 and iLBG). Video Streaming : Youtube, Metacafe, Google Video etc and Request. HTTP : Link, Content, Reconstruction, Upload and Download. Online Games : More then 50 Online Games word wide. Skype : Text Chat Recording. Telnet : Play back Other : Upon Request.
  • 8. R&D in Computer Forensics and Information Security with 9 years experience Off-line packet reconstruction product launched. Assisted in the course development of the Central Police University Network Security Forensics training material. 2000 2002 2004 2006 2007 2009 The first Wired Network Forensics product is launched in Asia. The first Wireless Network Forensics Product is Launched . The first HTTPS/SSL interceptor is launched . E-Detective became parts of the Coast Guard Digital Forensics SOP.
  • 9. Continuous Product Development Next Generation Products Telecommunications Signal Forensics Product Series. GSM signal forensics analyzer. 3G Signal forensics analyzer. 3.5G Signal forensics analyzer.
  • 10. E-Detective Value-Added Product Applications ISP Internet interception systems. E-Detective is the compliance solution for ISO 27001/ISMS. Supports Thin-Client Architecture. AD Server LDAP INTERNET Terminal Server proxy connection proxy connection HTTPS / SSL E-Detective sniff
  • 12. E-Detective for ISO 27001 / ISMS E-Detective archives network data, Internet activities and transactions of the organization’s entire network. This recorded data and content is essential for auditing and tracking. E-Detective’s implementation ensures that these organizations comply with ISO27001 / ISMS standard. E-Detective provides complementary solutions including solutions for network Firewall, IDS, IPS, UTM and other application software.
  • 13. The Achievement of Scientists Changed the World Galileo Galielei The Father of Science Louis Pasteur The Father of Microorganism Thomas Alva Edison The Inventor of Light Bulb
  • 14. Thomas Alva Edison The Inventor of Light Bulb Edison’s achievement came from his spirit of not allowing setbacks to lead to failures. With this courage and endless trials he found answers for all of us . In the spirit of Thomas Edison, Decision Group implemented its forensics technology development. With sustained trials and experiments we have developed the latest in forensics technology over the past9 years.
  • 15. Customer List Law Enforcement – Taiwan CIB / FBI / NSA Financial Business – Taiwan Stock Exchange Corp … Corporation – Foxconn, Acer, PC-home … Education - Chung Yuan Christian University … … OEM – Broadweb, nForce, PCI, Guardian … … ODM – GIZA … … Distributor / Reseller – HTCI, ST, PCS, … … More than 6000 installations worldwide !! For network forensics and information security audit needs !!
  • 16. We are constantly searching for… ... Qualified and Committed Business Partners – Resellers Distributor ODM/OEM Cooperation …
  • 17. Decision Computers believes in a Win Win with their Partners Build benefits and cooperation. Expand business opportunities Share profit
  • 18. About Decision Group Established in 1986 with 23 years experience in IT industry. Strong R&D Capability : 31 Software and Hardware engineers with 5 PhD. 10 Master Degrees 25 manufacturing engineers Sales: US$ 4.68M in 2007. Headquarter : Taipei, Taiwan Branch offices: Germany, Singapore, Hong Kong Global Presence Address: 4/F No. 31, Alley 4, Lane 36, Sec.5, Ming-Shan East Road Taipei, Taiwan, R.O.C . Phone No : +886 2 2766 5753 Fax No : +886 2 2766 5702 E-Mail : [email protected] Url: www.edecision4u.com