Single Integrated Interception Solution.
All networks. All vendors. All technologies.
Central Management. Modular and scalable.
Multi-country and multi-vendor support.
Flexible Workflow Management.
Automated handover conform various
international lawful interception standards
Lawful Interception focuses on lawfully intercepting digital communications to support legal and/or criminal investigations. Including telephone networks and the Internet as well as wireless voice and data networks. With Lawful Interception we deliver end-to-end solutions for lawfully intercepting, storing and analysing communication content. We provide carrier grade Network Forensics and Lawful Interception solutions that enable our clients to pinpoint the communications they are after and the easily tap in.
Our Network Forensics and Lawful Interception solutions are installed in 25+ countries at Government agencies, Telco Operators and Internet Service Providers.
Facilitates auditing processes and SLA Management.
Streamline and automate the end-to-end disclosure process.
Supports dedicated and hosted data retention deployments.
Disclosure Management allows users to enter disclosure requests with specific parameters in order to retrieve the requested information from a number of available data sources and to deliver the right results. The data retrieval process of Disclosure Management may consist of multiple consecutive data queries at different data sources in order to construct the required data set. After retrieving the data, the results may be validated and converted into the required format.
Disclosure Management makes the results available for the operator who may verify them and send them to the requesting authority. To cater for customer specific process flows and to support teams as opposed to single operators, Disclosure Management can be extended with workflow management based on a standard-based Business Process engine. One Disclosure Management system can administer and segregate many different networks to enable managed service models, for support of multi-tenant networks and multi-country networks.
On demand Location Tracking.
For tactical or emergency situations.
Comply to Regulations.
Provide access location information for MVNO’s and MNO’s.
Easy to integrate with other location based systems.
To Law Enforcement location information is a vital source of input in many cases. As a result different regulations require location information to be supplied as part of an intercepted call. This can be driven by criminal investigations in which case Lawful Interception and Data Retention law mandate the availability of location information to complement information about intercepted calls or stored call records. But also regulation that applies to emergency calls demand location information to be available when a call is made.
Multi-Operator and Multi-Network.
Support in one device.
Actual Cell Coverages.
Reduce search area of your target.
User Friendly GUI.
Real-time updated coverage information.
Cell Monitor is a purpose-built device with a small form factor that collects information on cells in mobile networks. Its ability to host op to 12 modems allows measurements to take place in parallel. This simultaneous collects formation on cells of different operators and technologies (2G, 3G and 4G) while mounted on a vehicle for drive testing or installed at a fixed location. The device can carry out continuous measurements and binds that to a specific location through the internal GPS receiver. The measurement information can be real-time uploaded to a central server. With the collected information, coverage maps for GSM / 2G, 3G and 4G networks can be created through our back-end application for all available operators and all networks. In case operator-provided coverage information are available, the measurements can be used to improve the existing coverage maps by overlaying it with the measurements of the Cell Monitor. This functionality is supported through a separately available back-end application that can process the information from multiple devices.
Defend your mobile network caused by disasters
Selective network availability.
Access Class Management.
Prioritize network availability for first responders
Network Protect is a modular solution that can protect the mobile network against overload situations caused by disasters and other planned or unplanned events. It does this by barring at cell level. Network Protect is a complete solution for Network and Subscriber Barring Control that is built around a central management system. It integrates all necessary network equipment, databases and includes a Graphical User Interface to visualize the network and affected areas. Cells can be bared at access class level enabling the operator to differentiate between the barring of private subscribers and emergency services.
Prevent Customer Data Leakage.
Protect subscribers privacy.
Complies with Privacy Legislation.
Prevent negative media exposure.
Cost effective Threat Management.
Fraud Management, Risk Control and prevent Revenue Loss.
SS7 Secure is HLSS answer to today's SS7 Threats. SS7 Secure provides telecom operators with extensive security functions for the SS7 protocol protecting your subscriber’s privacy and preventing the exposure of your network elements towards the international SS7 network. SS7 Secure consists of a number of applications that implement screening functions for SS7 messages, preventing the exploitation of vulnerabilities in the SS7 protocol. SS7 Secure not only prevents the sending of spam on the costs of other subscribers or the operator but also prevents that SMS and phone calls can be redirected. With SS7 Secure, the individual subscribers can also no longer be identified and their locations and encryption keys remain private.
Within SS7 Secure the following services are covered: MAP screening, CAP screening, SCCP Global Title screening and SMS Home Routing screening.
Secure your Boardroom.
Keep your communications confidential.
Prevent Industrial Espionage.
Protect your company assets.
Protect Governmental Buildings and Headquarters.
Intrusion Detector is HLSS solution to secure your boardroom, to prevent industrial espionage and to protect governmental buildings and headquarters against eavesdropping activities.
Intrusion Detector solution consists of the Command & Control Centre and one or more sensor devices. These sensor devices are setup in a geostationary setup, e.g. attached to buildings or structures and they are able to provide a (static) overview of all mobile cells in range. Using this static overview, the sensor devices in combination with the command & control centre application will be able to detect ‘anomalies’ within the area covered. In most cases these anomalies will be a kind of devices like IMSI Catchers. But also jammers and the use of so called (legal) femto cells for corporate use will be detected.
Intrusion Detector will be delivered with a GUI that will easily be able to depict the cells in range and pinpoint / highlight the anomalies clearly.
SOCIAL MEDIA INSIGHTS
Fraud detection and compliance.
Discover direct and indirect relations of an individual or an organisation.
Discover unusual connections.
Discover original identities of aliases.
Support “Know Your Customer”(KYC) compliance.
By tracking more data, more frequently.
There is more information available on everything, more than ever before, due to the overwhelming proliferation of structured data and the mass, unstructured cyber data. Access to this data does not guarantee though precise, meaningful or timely insight that is of relevance to your business or organization.
Social Media insights provide unique tools to extract valuable, accurate and actionable information from publicly available data sources, and in particular social media data sources. By using our tools, our customers can efficiently deal with topics of interest, such as vulnerability and threat exposure, fraud detection & compliance and unusual connection detection.
Social Media Insight will provide you with a 360 degree of insight on your case of interest.
With Social Media Insights we provide a true OSINT “in-a-box” solution and it is the only product in its competition domain that works throughout the whole value chain: discovery, collection and analysis. With unique algorithms to reach into the rich and efficiently extract from big data, using cross dimension search capabilities, linguistic tools and exec summaries, Social Media Insights provides a comprehensive coverage of the OSINT market needs.
Our fully web-based and intuitive user interface is designed to be used by analysts who are either fresh or experienced. Providing the best user experience as can be expected from an OSINT application.