Cen­tral­ized Law­ful Mon­i­tor­ing

Voice&Data - - LAWFUL MONITORING -

Across all op­er­a­tors’ net­works based on one tech­nol­ogy for se­cu­rity re­quire­ments get­ting pri­macy

Mul­ti­ple means of com­mu­ni­ca­tion us­ing one means for law­ful mon­i­tor­ing

Pur­chase based on the needs of the se­cu­rity agen­cies

Cap­tured tar­geted out­puts avail­able to LEAS in an uni­form for­mat

Syn­chro­niza­tion for post-pro­cess­ing and an­a­lyt­ics is easy

Cap­tured out­puts are se­cure at de­fined lo­ca­tion of ac­cess

Tar­get def­i­ni­tion and pro­cess­ing of cap­tured records is hap­pen­ing in real- time

Pro­vi­sion­ing of new fea­tures and scal­ing up of op­er­a­tions is com­par­a­tively eas­ier

Mon­i­tor­ing of roam­ing tar­gets and au­dit of op­er­a­tor’s net­works is tak­ing place in re­al­time

Cen­tral ad­min­is­tra­tion fa­cil­i­tates ease of op­er­a­tion

Tar­gets get in­ter­cepted any­where in the coun­try

Con­fi­den­tial­ity is fully main­tained, since the tar­get def­i­ni­tion is done by LEA who have ac­cess to mon­i­tor­ing net­work

Num­ber of LEAS hav­ing ac­cess is to­tally in hands of ad­min­is­tra­tor of the cen­tral­ized mon­i­tor­ing plat­form

Independen­t of op­er­a­tor, full au­dit trail avail­able to mon­i­tor any mis­use

Ad­min­is­tra­tor con­trols black­list of IDS that can­not be mon­i­tored

Cor­re­la­tion of CDR (and LDRS) across mul­ti­ple op­er­a­tors is easy and the his­tor­i­cal anal­y­sis is quickly doable at the cen­tral server level

Newspapers in English

Newspapers from India

© PressReader. All rights reserved.