offers wide range of Layer 7 DPI, Content Forensics, Interception (Lawful
Interception, Mass Interception, Tactical Interception, Target
Interception), Anti-DDOS, Intrusion Detection & Prevention and Defensive
solutions to all group of customers. For more information, please
ET full suites of DPI and Content Monitoring Solutions
- ET i-Filter System - Provide high speed Layer 7 DPI packet
filtering solutions. Able to concurrently process few 10 thousands of
concurrent target filtering at the same time. The target filtered
content can be based on Email accounts, Web Mail accounts, IM accounts,
Key Words, URL, Credit Card, various different patterns etc...
- ET Mediation System - Provide customizable Mediation System for data
delivery compliance to ETSI standard for Lawful Interception solution.
- ET Warrant Management System - Provide customizable Warrant
Management System compliance to ETSI standard for Lawful Interception
- ET 3i System - Provide real-time L7 traffic reconstruction which
allows raw data packet stream to be decoded, reassembled and reconstructed back to
content view received/composed/sent by the target users.
- ET iRS System - Provide data retention and preservation
features to ET 3i System. Data can be stored and viewed for longer
period of time (weeks, months even up to years) according to customer
- ET iCS System - Provide centralized platform to manage ET 3i
Systems and iRS Systems which can be deployed at multiple locations or
- ET 3i Tactical System - Provide a portable Internet
interception system (Wired Interception and Wi-Fi Interception) which allows LEA to track,
trace and hunt down the suspects. This product is highly recommended for
Intelligence Data Gathering. It is capable to intercept HTTPS SSL traffic
using variety of unique methods.
Also, it is able to grab credentials like username and password of target
For more information about our products and offering, please contact us at
We provide expertise and consultancy that will help you to choose
the right products and solutions for deployment.
- Networks Taps - Traditional/Basic Taps, Distributed Taps,
Bypass Taps, Filtering Taps
- Anti-DDOS Solutions (Defense Solutions) - Solutions against Denial of Service
and flooding attack.
- Advanced Threat Protection Solutions (Defense Solutions)-
Solutions Against Hacker Malware Attacks from Internal or External
- Agent based Target Interception Solutions - Offensive
Interception Solutions to
monitor and against encrypted traffic type on target mobile devices,
PC, Notebooks etc...