D.I.R.T.TM | Data Interception by Remote Transmission |
No physical access is necessary. Application also allows agents to remotely seize and secure digital evidence prior to physically entering suspect premises. Assisting the law enforcement community since June 6th, 1998 |
|
|
|
|
S.O.M.B.R.A.TM |
Security Oversight Manager by Remote Administration |
SOMBRATM allows supervisory personnel to monitor hundreds of workstations simultaneously including on-site, off-site and authorized tele-commuters. Fully compliant with U.S. Code.
Release Date - 3rd Quarter 2001 |
|
| |
|
B.A.I.T.TM | Binary Audit Identification Transfer |
that allows the user to create "trackable" electronic documents. Unauthorized intruders who access, download and view these "tagged" documents will be identified ( including their location ) to security personnel. B.A.I.T. also allows security personnel to trace the chain of custody and chain of command of all who possess the stolen electronic documents. |
|
|
|
|
PC PhoneHomeTM |
Theft Protection and Recovery Software for Laptops & PCs |
Easy installation. Completely transparent to user. If your PC PhoneHome protected computer is lost or stolen, all you need to do is make a report to the local police and call to our 24 hour command center. Our recovery specialists will assist local law enforcement in the recovery of your property.
|
|
|
|
|
"Exploding the Myth" WorkShopTM |
Exploding the Myth of Computer & Information Security Workshop |
will demonstrate why computer and information security needs to be an ever vigilant work in progress. There is no such thing as digital privacy and we'll prove it! We will demonstrate the tools and techniques used by the "Spies Among Us" to steal your most proprietary data... This one day workshop is a must for anyone truly interested in privacy and computer/information security.
Topics and demonstrations will include:
|
|
|
|
|
C.A.S.E.TM | Comprehensive Audit & Systematic Examination Program |
CDS legal staff can assist its customers in creating a custom computer usage policy. CDS staff can provide training and supervise employees to insure complete compliance of usage policy. Corporate computer usage policy will dictate permissable computer usage and prohibitions which include but are not limited to: E-mail policy, monitoring policy, access controls, use of encryption, access to restricted areas, web surfing, downloading of files/images, etc.
Using our proprietary software, CDS technical survey staff can supervise and enforce employee compliance in an ongoing or periodic program designed to a company's specific need. |
|
|
|
|
Forensic Evidence Acquistion ServicesTM | Forensic Evidence Acquisition Services |
CDS forensic experts can provide management with a potent arsenal of digital tools at its disposal. Services include but are not limited to: Lost Password & File Recovery Location & Retrieval of Deleted and Hidden Files File & E-Mail Decryption E-Mail Supervision & Authentication Threatening E-mail traced to source Identification of Internet Activity Computer Usage Policy & Supervision Remote PC & Network Monitoring Tracking & Location of Stolen Electronic Files "Honeypot" Sting Operations Location & Identity of Unauthorized SW Users Theft Recovery Software for Laptops & PCs Investigative & Security Software Creation Protection from Hackers & Viruses |
|
|
|
|
Cyberwarfare | Strategic Research & Development |
|
|
|
|
|
Strategic Alliances | Strategic Alliances Sought Worldwide |
Geographic theaters of operations are available. Software licensing and bundle deals are available.
Please contact Mr. Terrance L. Kawles, Vice President and General Counsel for further information. Serious inquiries only. |
|
|
Codex Data Systems, Inc.
143 Main Street
Nanuet, New York 10954 USA
Tel: 1-845-627-0011
Fax: 1-845-627-0211