11 - 16 of 16 results

SpectorSoft Spector CNE

(Delivery: Download Only, License: 10)

Spector CNE is SpectorSoft's most popular software for conducting investigations of detailed employee computer and Internet activity. Automatically documents and archives everything your employees do on the computer and the Internet including: what web sites they are visiting, who they are instant messaging with, who they are emailing, what they are typing, when they are working and when they are playing.

Spector CNE features automated deployment, remote management tools and will record a wide range of PC activity including Email, Chat/IM, Web Surfing, Keystrokes and Programs used. Spector CNE also includes our award-winning VCR-like screen snapshot recording.

 

Spector CNE will help your company:

  • Conduct Investigations on Employees Suspected of Inappropriate Activity
  • Eliminate Leaking of Confidential Information
  • Recover Lost Crucial Communications (Email, Chat & Instant Messages)
  • Meet or Exceed Federal, Industry or Agency Compliance Requirements for Keeping Records of Company Communications and Transactions.
  • Obtain Proof to Support Accusations of Wrongdoing
  • Reduce Security Breaches
  • Detect the Use of Company Resources to Engage in Illegal or Unethical Activities
  • Limit Legal Liability (including Sexual and Racial Harassment)
  • Enforce PC and Internet Acceptable Use Policies


Spector CNE is designed for business, education and government users running a Windows based network.
 

More Information


Visit the Spector CNE Website.

Selection: Spectorsoft Spector CNE

Product no. Delivery License Price
PROD00050204-0003 Download Only 5 519.00 € *
PROD00050204-0004 Download Only 10
PROD00050204-0005 Download Only 25 1,469.00 € *
PROD00050204-0018 Download + CD 5 569.00 € *
PROD00050204-0019 Download + CD 10 789.00 € *
PROD00050204-0020 Download + CD 25 1,519.00 € *
* Prices without VAT or delivery

We also recommend



AccessData FTK

*Price upon request

Browse this category: AccessData (Exterro)

BlackBag SoftBlock

SoftBlock™ is a software-based forensic write-blocking tool. SoftBlock quickly identifies newly attached hardware devices, and mounts the device with read-only or read-write permissions according to user preference. This forensic software is built to handle the needs of both large-scale digital forensic labs and individual forensic practitioners. SoftBlock allows forensic examiners to quickly and safely preview data contained on evidentiary devices before data is imported. SoftBlock is built to run on a forensic examiner's analysis machine; no additional expensive or cumbersome hardware is needed.

Support for Mac OS X
SoftBlock™ runs on OS X 10.6.x - 10.8.x.

Scalability
SoftBlock™ handles as many hardware devices as a forensic analysis machine allows.

Mobility
Avoid purchasing expensive write-blocking hardware. SoftBlock™ blocks data transfer at the kernel-level. No additional hardware is necessary.

Device Management
A true timesaver. Quickly and safely mount and preview multiple external devices.

Seamless Workflow Integration
SoftBlock™ features an intuitive user interface. Once installed, SoftBlock™ runs in the background and is available for use on demand.

 

 


Passware Kit Enterprise

Reduce time spent on recovering passwords and get more control over corporate security.

Passware Kit Enterprise helps IT professionals, system administrators and security experts to solve password related problems, which frequently occur in corporate environment.

 

 

Key Features

  • Recovers passwords for 200+ file types and decrypts hard disks providing an all-in-one user interface
  • Supports batch file processing
  • Scans computers for password-protected files (Encryption Analyzer included)
  • Supports Distributed and Cloud Computing password recovery
  • Includes 1-year Subscription to updates

 

General Features

  • Instantly recovers many password types
  • Instantly decrypts MS Word and Excel files up to version 2003 (5 Credits for Decryptum attack included)
  • Resets passwords for Local and Domain Windows Administrators instantly
  • Recovers encryption keys for hard drives protected with BitLocker in minutes, including BitLocker ToGo
  • Decrypts TrueCrypt, FileVault2, and PGP volumes in minutes
  • Resets passwords for Local and Domain Windows Administrators instantly
  • Recovers passwords for Windows users from a memory image or a standalone SAM file
  • Recovers passwords for Facebook, Google, and other websites from live memory images or hibernation files New!
  • Recovers passwords for iTunes backups: both iPad and iPhone
  • Instantly recovers passwords for email, websites and network connections from standalone registry files
  • Extracts passwords from encrypted Mac keychain files
  • Extracts passwords from Windows/Unix/Mac hashes
  • Provides 9 different password recovery attacks (and any combination of them) with an easy-to-use setup wizard and drag & drop attacks editor
  • Uses multiple-core CPUs and NVIDIA and ATI GPUs efficiently to speed up the password recovery process by up to 100 times Updated!
  • Uses Tableau TACC hardware accelerators to speed up the password recovery process by up to 25 times

Benefits for IT Professionals

  • This complete password recovery solution provides corporate security administrators with the full control over employees’ computers and files. System administrators, IT professionals and help desk personnel can now get access to any business file whenever required. Many types of passwords are recovered or reset instantly, while advanced acceleration methods are used to recover difficult passwords.

Demo Limitations

  • Demo version recovers either the first 3 letters of passwords, or passwords containing no more than 3 characters.
  • Demo version allows each of the attacks to work for up to 1 minute.
  • For Windows 8/7/2008/Vista/XP/2003/2000/NT Administrators, demo version resets a 'Demo12345' password only.
  • For BitLocker hard drive images, demo version displays encryption keys partially.
  • Demo version decrypts hard disk images no more than 64MB in size.
  • Demo version does not include a Decryptum PIN for instant online decryption of Word/Excel files.

Magnet IEF Triage

  • Recover data from social networking communications, instant messenger chats, cloud-based artifacts, P2P file sharing apps, mobile backups, webmail, web browser history, pictures and videos
  • Mount & Search volume shadow copies on a live system
  • Proprietary carving technique recovers more data from unallocated space & RAM
  • Searches entire logical or physical drives: E01, Ex01, L01, Lx01, AD1 and dd images
  • Searches Files including the pagefile.sys, hiberfil.sys, and more
  • Ability to search multiple drives, images, file & folders in a single search
  • Leave no digital footprints on target computer with “Stealth mode”
  • Use “Quick Search” preset to see what’s there and focus the investigation
  • Review results in real-time without having to wait for search to complete
  • Target search by artifact type, keyword and location on hard drive
  • Multi-threaded support for multi-core processors improving search speed
  • Rebuild web pages in their original format on the date they were visited
  • Parsed search queries for user keyword searches on major search engines
  • Web history categorization - dating, cloud, classified, chat and social media sites, malware sites, pornographic sites, or create your own custom categories
  • Search, filter, and bookmark important evidence
  • Export report in html, pdf, excel, csv, and tab-delimited formats
  • Share “Portable Case Folder” with other investigators and stakeholders
  • View results in a visual graphical timeline
  • Developed by a former police officer & forensic examiner
  • Validated by DOD Cyber Crime Center
  • Validated by the National Institute of Justice
  • Trusted by thousands of organizations in over 90 countries
  • Integrity of file metadata maintained- no data is altered
  • IEF provides the file offset/physical location of data to manually verify all results
  • Be confident in the results when testifying in court
  • And much more!
Browse this category: Magnet

Data Extractor Express

The Data Extractor Express is a specialized software product functioning in tandem with the PC-3000 Express hardware-software product. It is intended for recovering data from SATA (Serial ATA) and ATA (IDE) HDDs 3.5″, 2.5″, 1.8″, 1.0″, USB HDD, SSHD (Solid State Hybrid Drive) etc. Together with the PC-3000 Express hardware-software it forms the most powerful and efficient professional solution for your data recovery business.

  • Works with all of the most popular file systems: FAT, exFAT, NTFS, EXT2/3/4, HFS+, UFS1/2, XFS, ReiserFS, VMFS
  • VMDK (VMWare) images are supported
  • The Data Extractor Express has modes used in forensic investigations

The Data Extractor Express is capable of working with 4 HDD drives simultaneously. Drives can be connected to PC-3000 Express ports (2xSATA, 2xSATA/PATA), motherboard ports (xSATA, xUSB etc) or represented as HDD images.

The PC-3000 Express allows you to repair physically damaged HDD drives in factory mode. SATA drives use UDMA133 reading mode while PATA drives use UDMA100 reading mode.

Using the Data Extractor Express you can create full (sector-by-sector) or partial data copies from the damaged drive to a good one connected to the port of the PC-3000 Express board, the motherboard or in image-files.


11 - 16 of 16 results