To main content
Blockchain Security

eDetector

Endpoint Cybersecurity Incident Response and Evidence Collection Tool
eDetector UI

Product Summary

eDetector is a next-generation endpoint forensic system designed for cybersecurity incident investigations.

This system has consistently demonstrated excellence in forensic tasks and has been recognized by the Small Business Innovation Research (SBIR) program of the Ministry of Economic Affairs.

With memory detection technology and behavioral trace analysis, eDetector can identify malicious activities within memory, including process injection, hidden processes, kernel hooking, and connection history. It swiftly detects suspicious activities and provides root cause analysis of attacks. Through behavior analysis, the system maps process relationships and marks source IPs, assisting users in reconstructing the full incident timeline.

By combining advanced technology with intuitive tools, eDetector is a trusted solution for cybersecurity professionals conducting digital forensic investigations.

  • The new cloud version enables cross-device tracking of forensic analysis results, integrates. AI-powered report generation, and simplifies cybersecurity investigations
  • Large-scale Deployment, Automated Evidence Collection, High-Efficiency Search
  • AI-Powered Automated Report Generation
  • Endpoint Support for Various Windows and Linux Systems to Capture Critical Digital Artifacts

Description

  • Dual-Mode Service

    Available in cloud and local versions, supporting Windows 10 and 11. The cloud version allows cross-machine management and evidence analysis via a web interface, while the local version supports 64-bit platforms.

  • Easy Deployment

    Quick and simple agent deployment with a one-step installation, supporting simultaneous deployment of up to 500 agents.

  • Powerful Evidence Collection and Search

    Supports data collection from Chrome history, USB device info, program network traffic, DNS data, Windows event logs, and more, collecting over 40 types of digital evidence. The efficient search function enables quick retrieval of millions of records with real-time file listings and dynamic data search.

  • Dynamic Behavior Analysis

    Detects unknown malware through memory analysis and dynamic behavior tracking, creating execution trees, displaying loaded modules, and identifying program links and source IP addresses.

  • AI and Report Generation

    Integrates AI technologies and VirusTotal for fast report generation, capturing malware signatures and source details.

  • Yara Scanning

    Supports Yara to quickly filter malware signatures and identify potential risks.

  • Cloud-Scale Architecture

    Stable cloud services with flexible storage expansion, ensuring data confidentiality and availability. Security teams can monitor tasks and progress via a web interface, with a visual timeline for quick data overview.