• Premium IT-Security Produkte
  • RFID Security
  • Digitale Forensik
  • LEA & Rugged Produkte
  • Sonderbeschaffung
  • Premium IT-Security Produkte
  • RFID Security
  • Digitale Forensik
  • LEA & Rugged Produkte
  • Sonderbeschaffung

Digital Forensic Imager Unit

4.900,00 €
inkl. MwSt., zzgl. Versand
Auf Lager
Lieferzeit: 7 Tag(e)

Beschreibung


Digital Forensic Imager


SuperImager Plus 7” Mini Portable Forensic Imaging Unit with i7 Mobile CPU and Cellphone Data Extraction, dual boot


Forensic Imager Portable Field unit with i7 4th generation mobile CPU, running Dual Boot of Linux OS for Forensic data imaging and virtual emulator, and Windows 10 for cellphone data extraction and analysis and triage data collection. The unit is Portable, compact, easy to carry, and an extremely fast hardware unit. It is built with 3 ports of SATA and 4 ports of USB3.0. The unit can be powered with an external Li-Polymer battery.


The SuperImager® Plus 7” Mini Forensic unit is a Portable Compact Forensic imager with the ability to perform multiple Forensic tasks, allowing the Forensic investigator to capture data in the field from multiple source drives to multiple target drives simultaneously and extremely fast. It also enables the user capture data from multiple cellphones and run cellphone analyses, or any third-party application. The unit is compact and easy to carry, with built-in 3 SATA (with a secure and keyed SATA power connector) and 4 USB3.0 ports, 1 port of 1 Gigabit/s Ethernet, and 1 port of HDMI. The SuperImager’s main application (the unit’s software) supports many imaging methods like Mirror Image, Encase E01/Ex01, and Linux-DD.


Here are some of the tasks that the unit can be used for: 1) Multiple Parallel Forensic Capture: Mirror (bit by bit), Linux-DD, E01/Ex01 (with full compression) formats, Mixed-Format DD/E01, and Selective Capture (files and folders with the use of file extension filters). Select a single partition to capture. 2) Erase data from Evidence drive - using DoD (ECE, E), Security Erase, NVMe Secure Erase, or Sanitize erase protocols. 3) View the data directly on the Ubuntu Desktop screen. 4) Encrypt the data while capturing (using the AES256 engine). 5) HASH the data while capturing – run all the three, SHA-1, SHA-2, and MD5 HASH engines, at the same time. 6) Run a quick Keyword Search on the Suspect drive prior to capture. 7) Run Multiple Cellphone/Tablets data Extraction and Analysis using a third-party application on the Windows 10 side. 8) Run Forensic Triage application using a third-party application on the Windows 10 side. 9) Run Virtual Drive Emulator prior to the data being captured on the Linux side. 10) Run Remote Capture from unopened laptops (Intel Based CPU). Additional operations that are available include HASH a drive, drive diagnostics, and scripting. The application supports forensic imaging of multiple drives, in multiple sessions, in simultaneous forensic imaging runs.