DRING by Ankur Srivastava and dsats 2.2 |
DSATS DRING by Ankur Srivastava consists of its own DNS, DHCP, Mail, HTTP
Publisher: |
DSATS by Dr. Ankur Srivastava |
|
Downloads: |
1 |
Software Type: |
Freeware, 0.00 |
File Size: |
578K |
OS: |
Windows All |
Update Date: |
04 February, 2023 |
Deep Network Monitoring (DRING)- DSATS has released a deep network analysis software (within a virtual application) that can monitor all connections from within a network. Deep Network Monitoring (DRING) consists of its own DNS, DHCP, Mail, HTTP and associated proxy servers so that it can serve as a one stop server within a corporate network to provide security and monitor connections. DRING is not a simple monitoring suite but also enables security of devices in the Bring Your Own Device (BYOD) corporate landscape. DRING once installed on a device provides following features: - Analysis of Secure Socket Layer (SSL) data communication - 802.11x WiFi communications and hashes - WiMax, GSM/3G/4G and 5G - Low frequency radio monitoring - Ability to decode hardware attacks from external ports and internal chipset - Internal or company owned device management features that include password bypass and activity monitoring - TCP, UDP and Networking protocols along with detailed analysis by each IP, MAC or machine name. DRING enables device security across network end points by providing the following features: - Remotely wipe data - Detect non compliant devices and fix compliance and reporting - Secured network access for mobile, desktop and other connected devices - Distribute local apps with a click - Setup email, scan attachment and update settings with ease - Secure file transfer and scanning services - Automatic document update and sharing Ankur Srivastava, the architect of the DRING software suite said that DRING provides an offline security solution for a small to medium size organisation and starts running out of the box. The DRING platform does not require extensive setup as it can auto detect the network topology and assist in identification of misconfigured devices, threats or vulnerabilities within a few seconds. For more information reach us at: hello@dsats.com
|