Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

AccessData Releases Mobile Network Forensics Solution

AccessData has announced the release of SilentRunner Mobile, a network forensics solution designed to deliver network surveillance and analysis with plug-and-play deployment capability. SilentRunner Mobile is targeted for use in law enforcement, government and corporate investigations, while allowing for distributed installation to facilitate ongoing cyber security monitoring and analysis.

AccessData has announced the release of SilentRunner Mobile, a network forensics solution designed to deliver network surveillance and analysis with plug-and-play deployment capability. SilentRunner Mobile is targeted for use in law enforcement, government and corporate investigations, while allowing for distributed installation to facilitate ongoing cyber security monitoring and analysis.

SilentRunner Mobile allows users to monitor, capture, analyze and graphically visualize network traffic to see exactly what a suspect or exploit is doing during an investigation. Captured network activity can be played back on demand and users can quickly access network traffic when surveillance is determined to be necessary. Want to play back a VOIP conversation that took place over a network? Captured VoIP calls can be played back in seconds.

Other additions to SilentRunner Mobile include the following:

Web-based Network Overview – An interface built using SilverLight provides real-time visibility into all network communications

100Mb per second Collection Engine

Web-based Collector Interface
 – Interface delivers complete command and control over multiple collectors.

Chat Webmail and Social Media Support Built-in chat query allows users to view AOL, Google Talk, MSN Messenger, Yahoo and more. Built-in webmail query to collect Gmail, Hotmail and Yahoo content. In addition, users can record all posts to Twitter and Facebook and query data for keywords, URLs, pictures and more.

Easier Access to Email Content – Users can search for data within attachments and any fields within email communications.

Advertisement. Scroll to continue reading.

Improved Email Alerting and Alert Content Extraction – 
Users receive real-time alert notifications via email. • Improved Web Reconstruction Reporting
Report on keyword searching, file transfers, video files and more within captured Web traffic.

Improved Filtering Options – 
Import external filter files. For example, simply import an Excel spreadsheet of 2000 IP addresses.

More information is available at AccessData.Com.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Cybercrime

Daniel Kelley was just 18 years old when he was arrested and charged on thirty counts – most infamously for the 2015 hack of...

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.