Qator Enterprise™

  Remote Forensic Analysis & Security Incident Management Solution

  • Forensic investigation function
  • Investigate confidential information breach
  • Check important information distribution
  • Collect various information from client

Download Brochure (PDF)
Contact Us

Summary

  • Qator Enterprise allows users to efficiently track down information and inspect systems in case of information breach.
  • It allows users to prevent breaches by analyzing target PCs via remote inspection.
  • Search and analyze files
  • Restore deleted data
  • Time-series analysis
  • Internet/email analysis
  • Evidence imaging
  • DRM document analysis
  • Periodic data collection
  • Volatile data collection
  • Remote inspection
  • PC screen image collection
  • Inspect file use
  • Inspect PC screen
  • Set up security management policy
  • Create report

Strong Point

Going beyond the limits of traditional forensic solutions

Going beyond the limits of traditional forensic solutions that mainly analyze recorded data via data collection and analysis, Qator Enterprise allows inspection of the past behavior of a target.

 
Qator Enterprise's
analysis and inspection scope

General forensic solution's
analysis and inspection scope
Strong Media Record Data
Volatile Data
User Behavior

Key Features

Forensic Analysis Functions
Remote disk imaging
Remote disk analysis
Window files system analysis
Keyword & pattern search
Supports various views
Disk image analysis tool
Time series analysis of files
Restore deleted files
Window artifact analysis

Administration Functions
Collection control by policy
Inspector management
Time series analysis on collected data (behavior analysis by time frame)
Bookmark
Create inspection report
File distribution across multiple systems
Collection & Analysis
User's computer screen
User's system information
USB connection history
USB auto imaging
USB copied files history
Bluetooth use history
Keyboard use history
Printing history
Installed program information
File system changes
File lists
Program execution history
Change history of specific folder
Web browser use history
Collect specific types of email

Remote Forensic Image Analysis
Forensic image repository
Spontaneous analysis of remote images

Process

Operation Chart

Implementation Cases

#01 'A' company's audit team applies the online forensic tools to internal intelligence, periodic audit for major departments, and prospective retirement, and throughout this process, a large number of internal fraud cases are uncovered every year.

01. Periodic Audit
Intelligence of internal employees' fraudulent act
Periodic audit of the audit team
Audit for prospective retirees and suspicious internal/external employees

02. Online Forensic Investigation
Data collection and investigation of suspicious employees and prospective retirees in a certain period of time

03. Surrendering Suspects to Law Enforcement Agencies
Intensive investigation of suspicious employees
Face-to-face investigation and personnel transfer for suspects


#02 Audit team of 쁁 company, a Korean domestic semiconductor manufacturer, uses online forensic two times a year to perform audit for the entire business.

01. Periodic Audit
Intelligence of internal employees fraudulent act and offline analysis results
Periodic audit

02. Online Forensic Investigation

Grasp of the signs of fraudulent acts between internal users and cooperative firms
Data collection and investigation of suspicious employees and prospective retirees in a certain period of time

03. Surrendering Suspects to Law Enforcement Agencies
Face-to-face investigation and personnel transfer for suspects
Disqualification of cooperative firms
Prosecution of the suspect if necessary


#03 A Company is a Korean domestic display panel manufacturer that obtains various advanced technologies. It was a case that the company used online forensic tools and prevented the technology leakage, after receiving the intelligence of internal technology leakage attempt

01. Reception of Intelligence
Receive the intelligence of internal technology leakage attempt

02. Online Forensic Investigation

Apply online forensic tools to the investigating subjects PCs and collect data
Investigation of co-conspirators PCs after the identification co-conspirators.
Security of evidence using Data collection and disk imaging

03. Surrendering Suspects to Law Enforcement Agencies
Face-to-face investigation for suspects
Transfer evidence to the law enforcement agencies and request official investigation

PrivacyFinder
PrivacyFinder Enterprise


SecuIn Enterprise


SecuMaster


evEraser