MediaClone
MediaClone SuperImager Plus Desktop XL Standalone Forensic Imaging Unit
Standalone, industrial drive forensic imager Lab unit. The unit is extremely fast and secure. It is built with the latest hardware technology to achieve the most efficient drive forensic imaging, performing at a very high speed, with the ability to image multiple drives at the same time. The unit supports 8 SATA/SAS, 10 USB3.1, 4 FC, one SCSI storage devices; and configured with Dual Open OS of Linux OS for Forensic data imaging/virtual emulator and Windows 10 for full forensic analysis, cellphone data extraction and analysis, and triage data collection. The user can run multiple, parallel, simultaneous forensic imaging operations from many storage devices, with 4 HASH values, and with an encryption on the fly. The unit has wide expansion capabilities.
Description
- Multiple Parallel Forensic Capture: Mirror (bit by bit), Linux-DD, E01/Ex01 (with full compression) formats, Mixed-Format DD/E01, copy the whole drive or only parts.
- Run a Selective Imaging (Targeted Imaging) of files, folders, and partitions with file extensions filters (for example, 4 independent sessions of E01 capture with 8 native SAS/SATA ports and 16 compression engines simultaneously).
- Perform Forensic Imaging from many Suspect drives to one large Evidence drive; in append mode (can perform forensic imaging from 7 Suspect drives to one large Evidence drive).
- Upload many Forensic images to a network (SMB, CIFS, NFS).
- Erase data from Evidence drive - using DoD (ECE, E), Security Erase, Enhanced Security, or Sanitize erase protocols.
- View the data directly on the Ubuntu Desktop screen, or on the Windows Screen.
- Encrypt the data while capturing (using the AES256 engine).
- HASH the data while capturing – run all the three, SHA-1, SHA-2, and MD5 HASH engines, at the same time.
- Run a quick Keyword Search on the Suspect drive prior to capture.
- Run Multiple Cellphone/Tablets data Extraction and Analysis using a third-party application on the Windows 10 side.
- Run Forensic Triage application using a third-party application on the Windows 10 side, prepare Forensic Triage keys, and view the captured targeted data.
- Run a full Forensic Analysis application like Encase/Nuix/FTK.
- Run Virtual Drive Emulator prior to the data being captured on the Linux side (this option is enabled on this unit).
- Encryption and Decryption on the fly of drives that contain sensitive information.
- Easily reconfigure the unit’s ports, where each of the target port can be configured as source or target for running 4:4 sessions, or to run an upload of 8 storages to a network.
- Convert the unit’s 10 USB3.1 ports to SATA ports and run more parallel sessions (with the use of some USB3.0 to SATA adapters).
- Expand with the PCIE 3.0 expansion slots, and optional 8 SAS/SATA Expansion Box (bringing the total of SAS/SATA ports to 16, with very little speed degradation), SCSI, 1394, TB, NVMe, FC storage devices.
8 SAS/SATA ports, 10 USB3.0 ports, 8 SAS Extender ports, 4 Fiber Channel ports, one SCSi port