Network Surveillance System
Deep Eye is a comprehensive completely indigenous Network Surveillance System which offers the IT Security team of an organization a chance to monitor the internet activities and the flow of traffic in the organization. The system enables the users to detect –
- Leakage of confidential information
- Compromised or Hacked Systems
- Internet activities of all users
- E-mail ID, the mail is sent from
- E-Mail ID, the mail is sent to
- IP address of a Sub ISP to intercept all traffic from a suspicious network
- The keyword content in the mail or attachment
The system is capable of monitoring the following services:
Ability to decode wide range of protocols and applications in Packet switched data which includes –
- Webmail (includes yahoo, hotmail etc) packets
- Outlook express and other such Clients
- Chats and other instant messenger
- All FTP and TFTP Transfers
- All visited websites
- Peer to Peer networks
- All browsed images
- Audio and Video over IP
- Voice over Internet Protocol (VOIP)
Functionality -
- Central Monitoring and analysis architecture
- Different privileges assigned to every user with escalation as and when required
- Perform Deep packet inspection for all internet traffic including attachments which include –
- Word files
- Excel sheets
- Presentations
- Images
- XML
- GUI available to add / delete / modify search parameters
- Auto distinction between relevant and irrelevant data
- Flexible and extensible to serve different users
- Automatic Integration with decoding application
- All flow of data would be captured and saved for future forensics and investigation. The duration for saving the date would be decided by the organization
- Stand alone network surveillance system.
Monitor -
All mails sent and received. Track –
- Yahoo, Hotmail, rediffmail etc
- POP and SMTP mails
- All GET and POST requests
- Chats and instant messages
- All blogs and websites visited
- All audio and video over IP Network
- All files transfers (FTP and TFTP)
- All printed documents
- All suspect IP’s
- Identify all compromised systems and the attacking servers
Features -
DeepEye has the ability to index, search, and reconstruct all network traffic into meaningful flows, including network artifacts. In-depth packet analysis skills are not needed to uncover and replay meaningful network activities. The forensics software suite also lets you see who or what is using the most bandwidth on the network or pinpoint any anomaly. The system includes:
Report Generation
Deepeye Reports provide an easy way to identify what data is being captured by the system, what looks suspicious, and what might require further investigation
DeepEye Search
DeepEye Search provides simple web-like search capabilities so anyone can search, locate, and view actual network communications in the way they were originally delivered, eliminating the need for IT intervention. IT and business users alike can search for email threads, IM dialogue, Microsoft Word documents, browser sessions, keywords, VPN sessions, etc. and reconstruct these specific communication flows or network activities from within a complete historical record of network traffic. Results are delivered in their native format for easy recognition.