All Members
Alphabet List of Member's
Search by Company name
Membership Details
Become a Member
Member's Charter
Members Service Handbook
18 Apr 2018
BASIS-CPTU Meeting Held
08 Apr 2018
BASIS Executive Council’s Installation Ceremony Held
02 Apr 2018
Syed Almas Kabir is the New President of BASIS
31 Mar 2018
BASIS Executive Council Election (2018-2020) Held
15 Mar 2018
BASIS Executive Council Election will take Place on 31 March, 2018
More News
Home » Members' » List of Products & Services
Fred Intelligence Limited » List of Products & Services
Cyber Security Training
Security Training

We Conduct Cyber Security Training 

Cyber Security Awareness Training 



SIEM Solution
IT Security Log & Event Management

A product designed for security information and event management (SIEM).  ESM collects security log data from an enterprise's security technologies, operating systems, applications and other log sources, and analyzes that data for signs of compromise, attacks or other malicious activity. If something malicious is detected, the product acts accordingly by generating alerts to security administrators or initiating an automated response to stop the malicious activity.

POS Machine Security


We Secure POS/ATM/PC/Server Machine as well as destruct (Software Sanitization)  the data remanence before it  send to disposal asset.

Other Applications


We do on premises customized Sandbox for Banking Sector as well as confidential business like others organization


Anti Apt Solution
IT Security


We do on preemies dedicate Anti Apt Solution..


We do on premises Network Intrusion detection & Prevention System
Network Security


We do on premises Network Intrusion detection & Prevention System


Vulnerability Protection Solution
IT Security

   Vulnerability Protection

We do Host Based IPS which Protect your Pc/Servers Vulnerability Protection

Data Destruction Solutiuon (Software Sanitization)
IT Security


Data Destruction Solutions for Disposal of Asset like (Hard Disk, ATM, POS etc).


Linear Construction Project Management
Construction Project Management

   Trimble TILOS combines time and location to give you a smarter, easier way to create accurate, optimized project plans, and to quickly update these plans as schedule changes occur.


Smarter. Easier. Accurate. Optimized.

Creating linear project plans using traditional Gantt software can be cumbersome and inaccurate. Trimble® TILOS transforms the way linear project plans are created by integrating a scaled diagram of your project with a comprehensive project management system tailored for Railway, Road, Pipeline, Tunnel and Transmission line projects. TILOS combines time and location to give you a smarter, easier way to create accurate, optimized plans, and to quickly update these plans as schedule changes occur.

Network Forensics and Lawful Interception Total Solutions Provide
Cyber Security



E-Detective Decoding Centre

Enterprise Data Guard System

Data Retention Management System

Cyber Crime Investigation Training

NIT (Network Investigation Toolkit)

Network Packet Forensic Analysis Training

FIT (Forensics Investigation Toolkit)

VoIP Detective

HTTPS/SSL Interceptor

E-Detective LEMF Solution Suite

Centralized Management System

Enterprise Data Guard System

National Security Surveillance Training

Lawful Interception Training

Satellite Digital Signal Analysis System    

Data Retention Management System
Cyber Security

 Data Retention Management System (DRMS) is designed for viewing

Intercepted Data centrally from multiple frontend E-Detective, ED2S, NIT2/WD

and iMonitor/EDDM Systems.

Provides a User Friendly GUI, and easy to import and view the Contents

especially for large amount of Intercepted Data.

Capable to view multiple data Files at the same time.

Works with E-Detective and ED2S systems by Automatic transport function via

FTP, and allows reconstructed Data File in each frontend system to be stored in DRMS Server centrally.

Search and Advance Search functions provided for data scoping and primary link analysis.

Easy Management of reconstructed Data Files centrally with multiple EDetective and ED2S systems.

Integration with 3rd party data or text mining, link analysis system or Hadoop File System  

E-Detective Decoding Centre
Cyber Security

 Designed for Off-line Packet Reconstruction

Protocol decoding engine with integration capability to other system

Multi-Users and Case Base Management

Administrator can create different project/case for different

user/investigator to conduct Internet raw data parser and

forensics analysis task on the system

Various Content of Internet Applications Decoding

Email (POP3, SMTP, IMAP), Webmail (Yahoo Mail, Gmail, Hotmail

etc.) IM (Yahoo, MSN, ICQ, QQ, UT, IRC, Google Talk, Skype Voice

Call Log), File Transfer (FTP, P2P), HTTP (Link, Content,

Reconstruct, Upload/Download, Video Stream), Telnet, Online

Games, VoIP, Webcam (Yahoo, MSN)…etc.

EDDM is LI Version Product of EDDC

Cutting-edge Offline Decoding Device  

Cyber Security

 User may opt to purchase the complete Appliance (Hardware + Software) or only purchase Software from us. User may use their own dedicated server for  installing the software.  

Capable to intercept and capture (through

Mirror Mode or Tap Deployment), decode and

reconstruct VoIP RTP sessions.

• Supports voice calls of SIP.

• Supported CODECS: G.711-a law, G.711-u

law, G.729, G.723 and ILBC.

• Capable to play back the reconstructed VoIP


National Security Surveillance Training
Security Training

Topic include:

National Security vs National Development

Rumor and its Nature

Social Sentinel vs Target Surveillance

Methodology of Full Scale of Network Surveillance at National Level

Deployment of Network Surveillance

Case Study on Different CountriesIntroduction to National Security Surveillance Training 

Social riot is a common phenomenon in every country in the world. By advanced communication technology, fast spread of social uprising may cause a serious national security issue impacting on social and economic development. In this course, we will introduce common nature of social uprising, how to conduct social sentinel surveillance, data analysis with practical case study.     


Cyber Security

WLAN Analytics/Forensics/Legal Interception System

Support Wireless LAN 802.11a/b/g/n Scanning & Packet Capturing

Automatically WEP Key Cracking (WPA Optional Module)

Decode and Reconstruct WLAN packets

Capture/Decode/Display are All-in-One

Satellite Digital Signal Analysis System
Cyber Security

Satellite Digital Signal Analysis System

For generic digital signal analysis of satellite communication

Present reconstructed content data of both unilateral download and upload links

Provide signal analysis on both L2 and L3 levels

Provide correlation analysis with both download and upload links

Suitable for network forensic analysis on satellite digital communication

User ID
Can't login?

Copyright © 2018 BASIS. All rights reserved.