The SuperImager’s main application (the unit’s software) supports many imaging methods like Mirror Image, Encase E01/Ex01, and Linux-DD.
Here are some of the tasks the unit can be used for:
1) Multiple Parallel Forensic Capture: Mirror (bit by bit), Linux-DD, E01/Ex01 (with full compression) formats, Mixed-Format DD/E01, copy the whole drive or only part of it.
2) Run a Selective Imaging (Targeted Imaging) of files, folders, and partitions with file extension filters, including metadata and HASH (for example, run 8 independent sessions of E01 capture with 16 native SAS/SATA ports and 16 E01 compression engines simultaneously).
3) Perform Forensic Imaging from many Suspect drives to one large Evidence drive; in append mode (can perform forensic imaging from 15 Suspect drives to one large Evidence drive).
4) Upload many Forensic images to a network (SMB, CIFS, NFS).
5) Erase data from Evidence drive - using DoD (ECE, E), Security Erase, Enhanced Security, or Sanitize Erase protocols.
6) View the data directly on the Ubuntu Desktop screen.
7) Encrypt the data while capturing (using the AES256 engine).
8) HASH the data while capturing – run all the 4, MD5, SHA-1, SHA-2, and SHA-512 HASH engines simultaneously.
9) Run a quick Keyword Search on the Suspect drive before capture.
10) Run Multiple Cellphone/Tablets data Extraction and Analysis using a third-party application on the Windows 10 side.
11) Run a Forensic Triage application (Windows 10) to capture and view the targeted data.
12) Run a full Forensic Analysis application like Encase/Nuix/FTK/Axion.
13) Run Virtual Drive Emulator before the data is captured (Linux).
14) Encryption and Decryption on the fly of drives that contain sensitive information.
15) Easily reconfigure the unit’s ports, where each target port can be reconfigured as a source or target, enabling the user to run 8:8 sessions or upload 16 images to a network.
16) Convert the unit’s 10 USB 3.2 ports to SATA ports and run additional imaging (using some USB 3.0 to SATA adapters).
17) Use the unit as a “Write Blocker” device: This feature enables the SuperImager unit to function as a secure bridge between workstations on a network to Suspect drives attached to the SuperImager unit by using the iSCSI protocol over a network connection.
A forensic investigator using a workstation or laptop in one location can access a Suspect drive in different places in the Write block mode.
This unit is not expandable.
The SuperImager unit will be connected to the same network, and the Suspect drives will be attached to the SuperImager unit in read-only mode. The SuperImager unit will act as a “write blocker” for any of the unit’s attached storage, such as SAS, SATA, USB, 1394, FC, SCSI, and NVMe.
The unit is designed to help expedite the forensic imaging process, especially in facilities with a large backlog in imaging drives, by performing parallel forensic imaging in a true optimized multiple session's application.
Additional operations: HASH authentication, drive diagnostics, and automation of process with scripting.