D.I.R.T.TM Data Interception by Remote Transmission
D.I.R.T.<SUP><FONT SIZE=1>TM</FONT></SUP
D.I.R.T.TM - Data Interception by Remote Transmission is a powerful remote control monitoring tool that allows stealth monitoring of all activity on one or more target computers simultaneously from a remote command center.

No physical access is necessary. Application also allows agents to remotely seize and secure digital evidence prior to physically entering suspect premises.

Assisting the law enforcement community since June 6th, 1998

Requirements: Agency letterhead is required before information will be forwarded on this product. Sale is restricted to bona fide law enforcement, governmental and military agencies. Codex Data Systems, Inc. is the creator and sole source of this product.
E-Mail: for additional information, please contact: Sales@codexdatasystems.com

S.O.M.B.R.A.TM Security Oversight Manager
by Remote Administration
S.O.M.B.R.A.<SUP><FONT SIZE=1>TM</FONT></SUP
SOMBRATM is a powerful remote supervision tool that provides system administrators and security personnel the means to insure employee compliance with the organizations computer useage policy.

SOMBRATM allows supervisory personnel to monitor hundreds of workstations simultaneously including on-site, off-site and authorized tele-commuters.

Fully compliant with U.S. Code.

Release Date - 3rd Quarter 2001
Available Now!

Requirements: Sale of this product is unrestricted. Codex Data Systems, Inc. is the creator and sole source of this product.
E-Mail: for additional information, please contact: Sales@codexdatasystems.com

B.A.I.T.TM Binary Audit Identification Transfer
B.A.I.T.<SUP><FONT SIZE=1>TM</FONT></SUP
B.A.I.T.TM - Binary Audit Identification Transfer is a powerful intrusion detection tool
that allows the user to create
"trackable" electronic documents.

Unauthorized intruders who access, download and view these "tagged" documents will be identified ( including their location ) to security personnel.

B.A.I.T. also allows security personnel to trace the chain of custody and chain of command of all who possess the stolen electronic documents.

Requirements: Sale of this software is unrestricted. Codex Data Systems, Inc. is the creator and sole source of this product.
E-Mail: for additional information, please contact: Sales@codexdatasystems.com

PC PhoneHomeTM Theft Protection and Recovery Software
for Laptops & PCs
PC PhoneHome<SUP><FONT SIZE=1>TM</FONT></SUP
PC PhoneHomeTM - is a powerful software application that will track and locate a lost or stolen PC or Laptop anywhere in the world.

Easy installation. Completely transparent to user. If your PC PhoneHome protected computer is lost or stolen, all you need to do is make a report to the local police and call to our 24 hour command center.

Our recovery specialists will assist local law enforcement in the recovery of your property.

Survives Format C: and FDISK!
Requirements: Sale of this product is unrestricted. Codex Data Systems, Inc. is the creator and sole source of this product.
E-Mail: for additional information, please contact: Sales@codexdatasystems.com

"Exploding the Myth" WorkShopTM Exploding the Myth of Computer
& Information Security Workshop
Exploding the Myth<SUP><FONT SIZE=1>TM</FONT></SUP
The "Exploding the Myth" WorkshopTM
will demonstrate why computer and information security needs to be an ever vigilant work in progress.

There is no such thing as digital privacy and we'll prove it!

We will demonstrate the tools and techniques used by the "Spies Among Us" to steal your most proprietary data... This one day workshop is a must for anyone truly interested in privacy and computer/information security.

Topics and demonstrations will include:
"Off- the-shelf" hardware & software products capable of stealing your data, Surreptitious Hard Drive Duplication & Examination, Encryption & Password Cracking Techniques, Covert Information Acquistion & Remote Monitoring of Personnel, Data & Hardware.

Friday - September 21st, 2001 in New York
Requirements: This course is open to law enforcement, government, military, private investigators, system administrators, corporate security personnel, etc. Codex Data Systems, Inc. is the creator and sole source of this seminar. Call for dates & locations
E-Mail: for additional information, please contact: Sales@codexdatasystems.com

C.A.S.E.TM Comprehensive Audit & Systematic Examination Program
Comprehensive Audit & Systematic Examination Program<SUP><FONT SIZE=1>TM</FONT></SUP
The Comprehensive Audit & Systematic Examination ProgramTM - was created to assist organizations in the implementation and enforcement of a sound computer usage policy.
CDS legal staff can assist its customers in creating a custom computer usage policy.

CDS staff can provide training and supervise employees to insure complete compliance of usage policy.

Corporate computer usage policy will dictate permissable computer usage and prohibitions which include but are not limited to:

E-mail policy, monitoring policy, access controls, use of encryption, access to restricted areas, web surfing, downloading of files/images, etc.

Using our proprietary software, CDS technical survey staff can supervise and enforce employee compliance in an ongoing or periodic program designed to a company's specific need.
CDS can also supervise offsite tele-commuters.

Requirements: Sale of this product and service is unrestricted. Codex Data Systems, Inc. is the creator and sole source of this product/service. Please call for additional info.
E-Mail: for additional information, please contact: Sales@codexdatasystems.com

Forensic Evidence Acquistion ServicesTM Forensic Evidence Acquisition Services
Digital Forensic Services<SUP><FONT SIZE=1>TM</FONT></SUP
Forensic Evidence Acquisition Services TM
CDS forensic experts can provide management with a potent arsenal of digital tools at its disposal. Services include but are not limited to:
Lost Password & File Recovery
Location & Retrieval of Deleted and Hidden Files
File & E-Mail Decryption
E-Mail Supervision & Authentication
Threatening E-mail traced to source
Identification of Internet Activity
Computer Usage Policy & Supervision
Remote PC & Network Monitoring
Tracking & Location of Stolen Electronic Files
"Honeypot" Sting Operations
Location & Identity of Unauthorized SW Users
Theft Recovery Software for Laptops & PCs
Investigative & Security Software Creation
Protection from Hackers & Viruses
Requirements: Sale of this product and service is unrestricted. Codex Data Systems, Inc. is the creator and sole source of this product/service. Please call for additional info.
E-Mail: for additional information, please contact: Sales@codexdatasystems.com

Cyberwarfare Strategic Research & Development
Cyberwar<SUP><FONT SIZE=1>TM</FONT></SUP
CDS maintains a Tactical Division which is charged with the research and development of cyberwarfare and information warfare tools for use by the U.S. military establishment.
Requirements: Agency letterhead is required before information will be forwarded on these products. Sale is restricted to bona fide U.S. military agencies ONLY. Codex Data Systems, Inc. is the creator and sole source of these products.
E-Mail: for additional information, please contact: Sales@codexdatasystems.com

Strategic Alliances Strategic Alliances Sought Worldwide
Strategic Alliances<SUP><FONT SIZE=1>TM</FONT></SUP
We are seeking strategic alliances with well positioned companies worldwide to license our unique information gathering & computer security technologies.

Geographic theaters of operations are available. Software licensing and bundle deals are available.

Please contact Mr. Terrance L. Kawles, Vice President and General Counsel for further information. Serious inquiries only.

E-Mail: for additional information, please contact: Sales@codexdatasystems.com




Corporate Headquarters

Codex Data Systems, Inc.
143 Main Street
Nanuet, New York 10954 USA
Tel: 1-845-627-0011
Fax: 1-845-627-0211

E-Mail: sales@codexdatasystems.com




Back to Home Page

© Copyright 1998-2001 CodexDataSystems, Inc All Rights Reserved