All Members
Alphabet List of Member's
Search by Company name
Membership Details
Become a Member
Member's Charter
Members Service Handbook
18 Nov 2017
মোস্তাফা জব্বারকে ডব্লিউইউবির আজীবন সম্মাননা
04 Nov 2017
বেসিসের শিশু প্রোগ্রামিং কার্যক্রমে ব্যাপক আগ্রহ
03 Nov 2017
ডিজিটাল প্রযুক্তি ব্যবহারে ডিজিটাল দক্ষতাও চাই
01 Nov 2017
বেসিসের অতিরিক্ত সাধারণ সভা অনুষ্ঠিত
31 Oct 2017
ডিজিটাল দক্ষতা ছাড়া সাধারণ শিক্ষায় কোন পেশা হবেনা : মোস্তাফা জব্বার
More News
Home » Members' » List of Products & Services
Fred Intelligence Limited » List of Products & Services
Cyber Security Training
Security Training


We Conduct Cyber Security Training 



Cyber Security Awareness Training 



COBIT5, CISA, CISSP, ECSA, CEH, ISO27001, PCIDSS



  


SIEM Solution
IT Security Log & Event Management


A product designed for security information and event management (SIEM).  ESM collects security log data from an enterprise's security technologies, operating systems, applications and other log sources, and analyzes that data for signs of compromise, attacks or other malicious activity. If something malicious is detected, the product acts accordingly by generating alerts to security administrators or initiating an automated response to stop the malicious activity.


POS Machine Security
POS


 



We Secure POS/ATM/PC/Server Machine as well as destruct (Software Sanitization)  the data remanence before it  send to disposal asset.


Sandbox
Other Applications


 



We do on premises customized Sandbox for Banking Sector as well as confidential business like others organization



  


Anti Apt Solution
IT Security


 



We do on preemies dedicate Anti Apt Solution..



  


We do on premises Network Intrusion detection & Prevention System
Network Security


 



We do on premises Network Intrusion detection & Prevention System



      






Vulnerability Protection Solution
IT Security


   Vulnerability Protection



We do Host Based IPS which Protect your Pc/Servers Vulnerability Protection


Data Destruction Solutiuon (Software Sanitization)
IT Security


 



Data Destruction Solutions for Disposal of Asset like (Hard Disk, ATM, POS etc).



  


Linear Construction Project Management
Construction Project Management


   Trimble TILOS combines time and location to give you a smarter, easier way to create accurate, optimized project plans, and to quickly update these plans as schedule changes occur.



 



Smarter. Easier. Accurate. Optimized.



Creating linear project plans using traditional Gantt software can be cumbersome and inaccurate. Trimble® TILOS transforms the way linear project plans are created by integrating a scaled diagram of your project with a comprehensive project management system tailored for Railway, Road, Pipeline, Tunnel and Transmission line projects. TILOS combines time and location to give you a smarter, easier way to create accurate, optimized plans, and to quickly update these plans as schedule changes occur.


Network Forensics and Lawful Interception Total Solutions Provide
Cyber Security


E-Detective

Wireless-Detective

E-Detective Decoding Centre

Enterprise Data Guard System

Data Retention Management System

Cyber Crime Investigation Training

NIT (Network Investigation Toolkit)

Network Packet Forensic Analysis Training

FIT (Forensics Investigation Toolkit)

VoIP Detective

HTTPS/SSL Interceptor

E-Detective LEMF Solution Suite

Centralized Management System

Enterprise Data Guard System

National Security Surveillance Training

Lawful Interception Training

Satellite Digital Signal Analysis System    


Data Retention Management System
Cyber Security


 Data Retention Management System (DRMS) is designed for viewing

Intercepted Data centrally from multiple frontend E-Detective, ED2S, NIT2/WD

and iMonitor/EDDM Systems.

Provides a User Friendly GUI, and easy to import and view the Contents

especially for large amount of Intercepted Data.

Capable to view multiple data Files at the same time.

Works with E-Detective and ED2S systems by Automatic transport function via

FTP, and allows reconstructed Data File in each frontend system to be stored in DRMS Server centrally.

Search and Advance Search functions provided for data scoping and primary link analysis.

Easy Management of reconstructed Data Files centrally with multiple EDetective and ED2S systems.

Integration with 3rd party data or text mining, link analysis system or Hadoop File System  


E-Detective Decoding Centre
Cyber Security


 Designed for Off-line Packet Reconstruction

Protocol decoding engine with integration capability to other system

Multi-Users and Case Base Management

Administrator can create different project/case for different

user/investigator to conduct Internet raw data parser and

forensics analysis task on the system

Various Content of Internet Applications Decoding

Email (POP3, SMTP, IMAP), Webmail (Yahoo Mail, Gmail, Hotmail

etc.) IM (Yahoo, MSN, ICQ, QQ, UT, IRC, Google Talk, Skype Voice

Call Log), File Transfer (FTP, P2P), HTTP (Link, Content,

Reconstruct, Upload/Download, Video Stream), Telnet, Online

Games, VoIP, Webcam (Yahoo, MSN)…etc.

EDDM is LI Version Product of EDDC

Cutting-edge Offline Decoding Device  


VoIP-Detective
Cyber Security


 User may opt to purchase the complete Appliance (Hardware + Software) or only purchase Software from us. User may use their own dedicated server for  installing the software.  



Capable to intercept and capture (through

Mirror Mode or Tap Deployment), decode and

reconstruct VoIP RTP sessions.

• Supports voice calls of SIP.

• Supported CODECS: G.711-a law, G.711-u

law, G.729, G.723 and ILBC.

• Capable to play back the reconstructed VoIP

sessions.

National Security Surveillance Training
Security Training


Topic include:

National Security vs National Development

Rumor and its Nature

Social Sentinel vs Target Surveillance

Methodology of Full Scale of Network Surveillance at National Level

Deployment of Network Surveillance

Case Study on Different CountriesIntroduction to National Security Surveillance Training 


Social riot is a common phenomenon in every country in the world. By advanced communication technology, fast spread of social uprising may cause a serious national security issue impacting on social and economic development. In this course, we will introduce common nature of social uprising, how to conduct social sentinel surveillance, data analysis with practical case study.     
 



    


Wireless-Detective
Cyber Security

WLAN Analytics/Forensics/Legal Interception System

Support Wireless LAN 802.11a/b/g/n Scanning & Packet Capturing

Automatically WEP Key Cracking (WPA Optional Module)

Decode and Reconstruct WLAN packets

Capture/Decode/Display are All-in-One

Satellite Digital Signal Analysis System
Cyber Security


Satellite Digital Signal Analysis System

For generic digital signal analysis of satellite communication

Present reconstructed content data of both unilateral download and upload links

Provide signal analysis on both L2 and L3 levels

Provide correlation analysis with both download and upload links

Suitable for network forensic analysis on satellite digital communication


User ID
Password
Can't login?

Copyright © 2017 BASIS. All rights reserved.