Sie sind auf Seite 1von 2

.

-h

INT.ROD

X N G THE

a*,!-&I--

. I l c

-"-

Yq

+
c
L*r

networks. Designed for defense and (c~,lnW] y are fully-embedded without mating parts and ks m8 p m r foaQrintSsi aU ewstc1rnize$" inutes, they can be configwad and installed' , f existing nefwnrk topotag~.Capabilities include: Keyword, 'RMiUS, ion identif~ation; Mtering. moditicatian,and injection of packets; ng collection systems. With this modu!asplakfbrm, Packet forensics I L creaksmission packages based on customet requiwmb. Bf all, thejre so cost eR&ve, t h e n 2 dis~mbl.e--tbt

4:

'---3

Introduction
The Ei-Series is a turnkey Enterrnpt solution in an appliance platform. Uffering the most flexibte approach to network surveillance and novel approaches to rapid deployment and stealthy reporting of captured data. the 5-Series devices are unmatched in the industry.
The 5-Series has no MAC adbnws or P

Key Advantages
Customized mission packages Small form-factor, solid-state [as small as 4 square inches] No moving parts, highly reliable Battery, PoE o r wired power Hardware bypass, fail-safe Tamper detection, fail-secure Up to Gblsec throughput Deployable with no knowledge of target network topology
Supports stealth upstream reporting [practically undetectablel "Digital Dead Drop" delivery Triggers intercepts based on keywords, RADIUS, DHCP, behavior or other subject criteria Probe and Mediation capabilities Performs dialed digit extraction Packet modification, injection and replay capabilities Packet Forensics software stack and PeerTalkTM technology Advanced firmware-update keeps software up-to-date

ad-; it dynamically m q u w a d e s as the most appropriate host that sits


tapologicatly behindit. The 5-Series

can be used to intercept and recad


matching d o n s to intentat fktshmemory, or report ttrern upstfegmusing a variety of fmt(pt&. In the most hostile environments, this upstream reparting can be aaccornptishedusing a technique W makes the 5-Series' presinse undektable using standard network security mcethods,

An attractive feature of the fi-Seriesis its ability to passive& discover network topiogy--this allowz an individual to depIoy it wlth no prior knwvledge of the target network. The device can be placed in-tine and immediately act as a passive bridge while performing its mission. As intelligenceis being gathered and the device has an understandingof the network. it uses its stealth reparting techniques to return captured information or accomplirh a variety of other missions.

ThelntwnetCafe
The 5-Series is an ideal solution to the "Internet Caie Pro$lem.' Quick d e p m e n t and remote control minimize personnet risk and m m z e a x ii ~ ~ t b d mpabitities. on Small footprint and minimal power requirements make installation easy,

Solvina the lnternet Cafe Problem

_ _ -.

_.

-- -. -. -. -. -. -. _ _

Intercepted content is relayed covertly via a "Digital Dead Drop." somewhere on the Internet, sent out-of-band via 36 network or sent using the existing lnternet connection directly to the LEA.

WireLessAP

Advanced Policy Regime


The Packet Forensics policy regime allows multiple policies to operate simultaneously on the entire data stream. This means while you search for thousands of different strings deep inside each packet, you can also intercept VolP calls, extract dialed digits and correlate RADIUS and DHCP Log-ins with IP addresses. Each policy can have different resulting actions, such as forwarding packets to another analysis system or writing pen register-type Logs. Packet Forensics provides many powerful applications such as transparent web

fikring, remote pcket injection, traffic teptay and literal&T k o h n d s m m .


For technical experts, an advanced policy editor is provided. You can craft your own applications and take granular control over a l l packet processing functions.
a

Simple Scalability
With the Packet Forensics multiplatform graphical user interface, scaling an installation is as simple as stacking additional equipment, plugging it in, and clicking on a few buttons authorizing i t to execute your

-m

t0.E fU X 4.5 W I f X l -75 [M

Custom S i W l a b t e S i n Flash. Memory

SeridfkmdewithCiJ S5H Remcrte Managment Multi-&Ell~ u ,

g &
PACKET FORENSICS

PACKET FORENSICS
TEMPE, AZ 85281 U S

4 2 0 S S M I T H RD

+l I7571 3 2 0 - 2 0 0 2

WWW.PACKETFORENSICS.COM

/"

Das könnte Ihnen auch gefallen