Steganography Products

Computer Forensic Products | Audio Forensics Products  | Steganography Products  | Face Recognition Products  | Network Forensics Products 
Video Forensics Products | Password Recovery Products | Secure Data Destruction Products | Mobile Forensics Products
Data Recovery Products  | Malware Detection Systems Products 

 
Steganography Analyzer Real-Time Scanner
Detect steganography artifacts and signatures in real-time over a network!

Sensitive data leakage is of utmost concern to corporate management. Data Loss Prevention (DLP) solution providers offer products with a wide range of functionality and capability. However, none of these products detect insider use of steganography.

StegAlyzerRTS is the world�s first commercially available network security appliance capable of detecting digital steganography applications and the use of those applications in real-time. StegAlyzerRTS offers a �drop-in, turn-key� capability that will not affect network throughput.

StegAlyzerRTS detects insiders downloading steganography applications by comparing the file fingerprints, or hash values, to a database of known file, or artifact, hash values associated with over 1050 steganography applications.

StegAlyzerRTS also detects insider use of steganography applications by scanning files entering and leaving the network for known signatures of over 55 steganography applications. StegAlyzerRTS detects insider theft of sensitive information hidden inside other seemingly innocuous files which are sent to an external recipient as an e-mail attachment or posted on a publicly accessible web site.

Product highlights in StegAlyzerRTS:
Detect fingerprints of over 1050 steganography applications

Detect signatures of over 55 steganography applications

Exclusive Automated Extraction Algorithm functionality for selected steganography applications gives examiners a �point-click-and-extract� interface to easily extract hidden information from suspect files 

Send real-time alerts to network security administrators

Retain copies of suspect files for further analysis

Does not impact network performance

Available in 100 Mbps and 1 Gbps aggregated throughput models

BENEFITS
Detect leakage of sensitive information and intellectual property outside the enterprise network through insider use of steganography

Detect insider use of steganography to conceal evidence of criminal activity

Real-time detection of files associated with over 1050steganography applications

Real-time detection of signatures of over 55 steganography applications

Real-time alerts to network security administrators
Enforce organizational policy prohibiting insiders from having or using steganography or other data-hiding applications on the enterprise network