Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

AccessData Releases Mobile Network Forensics Solution

AccessData has announced the release of SilentRunner Mobile, a network forensics solution designed to deliver network surveillance and analysis with plug-and-play deployment capability. SilentRunner Mobile is targeted for use in law enforcement, government and corporate investigations, while allowing for distributed installation to facilitate ongoing cyber security monitoring and analysis.

AccessData has announced the release of SilentRunner Mobile, a network forensics solution designed to deliver network surveillance and analysis with plug-and-play deployment capability. SilentRunner Mobile is targeted for use in law enforcement, government and corporate investigations, while allowing for distributed installation to facilitate ongoing cyber security monitoring and analysis.

SilentRunner Mobile allows users to monitor, capture, analyze and graphically visualize network traffic to see exactly what a suspect or exploit is doing during an investigation. Captured network activity can be played back on demand and users can quickly access network traffic when surveillance is determined to be necessary. Want to play back a VOIP conversation that took place over a network? Captured VoIP calls can be played back in seconds.

Other additions to SilentRunner Mobile include the following:

Web-based Network Overview – An interface built using SilverLight provides real-time visibility into all network communications

100Mb per second Collection Engine

Web-based Collector Interface
 – Interface delivers complete command and control over multiple collectors.

Chat Webmail and Social Media Support Built-in chat query allows users to view AOL, Google Talk, MSN Messenger, Yahoo and more. Built-in webmail query to collect Gmail, Hotmail and Yahoo content. In addition, users can record all posts to Twitter and Facebook and query data for keywords, URLs, pictures and more.

Advertisement. Scroll to continue reading.

Easier Access to Email Content – Users can search for data within attachments and any fields within email communications.

Improved Email Alerting and Alert Content Extraction – 
Users receive real-time alert notifications via email. • Improved Web Reconstruction Reporting
Report on keyword searching, file transfers, video files and more within captured Web traffic.

Improved Filtering Options – 
Import external filter files. For example, simply import an Excel spreadsheet of 2000 IP addresses.

More information is available at AccessData.Com.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Ransomware

The Hive ransomware website has been seized as part of an operation that involved law enforcement in 10 countries.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.