Capture and analyse for peer-to-peer networks: analyse and visualise results in IBM i2 Analyst’s Notebook.
Point Duty’s Discovery has unique capabilities that directly complement the analytical power of IBM i2 Analyst’s Notebook. These include:
Discovery uses hashes to identify files even if their names have been changed. Hashes are used to easily identify illegal files in search results. Discovery can create hash sets from existing data and Discovery can add new target files to created hash sets. Using MD5, SHA-1, MD4, Tiger Tree and more, Discovery creates hash sets of high value.
We provide firms with a high quality of service by combining a comprehensive understanding of business process requirements with a highly skilled solution consultant and support team members.
Menara Cakrawala Lt 12, Unit 05A, Jl. M.H. Thamrin No.9, RT/002, RW/001, Kelurahan Kebon Sirih, Kecamatan Menteng, Jakarta Pusat, Kode Pos 10340.