The SuperImager® Plus Desktop Pro Forensic unit is the latest generation of MediaClone desktop Forensic solutions; it is a standalone forensic imaging device with the ability to perform multiple Forensic tasks, allowing the Forensic investigator to capture data in the Lab from numerous source drives to multiple target drives simultaneously and upload them to a network extremely fast. It also enables the user to perform a full Forensic analysis using encase, Nuix Windows 10 application, capture data from multiple cellphones and run cellphone analyses, or use any third-party applications. The unit is industrial durably built with desktop-style, designed with easy-to-use touchscreen icons. In addition, it has built-in 8 SAS/SATA ports and 10 USB 3.2 ports.
The SuperImager’s main application (the unit’s software) supports many imaging methods like Mirror Image, Encase E01/Ex01, and Linux-DD.
Some of the tasks the unit can be used:
1) Multiple Parallel Forensic Capture: Mirror (bit by bit), Linux-DD, E01/Ex01 (with full compression) formats, Mixed-Format DD/E01, copy the whole drive or only parts.
2) Run a Selective Imaging (Targeted Imaging) of files, folders, and partitions with file extensions filters and file metadata, and file HASH (for example, 4 independent sessions of E01 capture with 8 native SAS/SATA ports and 16 compression engines simultaneously).
3) Perform Forensic Imaging from many Suspect drives to one large Evidence drive; in append mode (can perform forensic imaging from 7 Suspect drives to one large Evidence drive).
4) Upload many Forensic images to a network (SMB, CIFS, NFS).
5) Erase data from Evidence drive - using DoD (ECE, E), Security Erase, Enhanced Security, or Sanitize Erase protocols.
6) View the captured data directly on the monitor (Linux or Windows).
7) Encrypt the data while capturing (using the AES256 engine).
8) HASH the data while capturing – run all the four MD5, SHA-1, SHA-2, and SHA-512 HASH engines simultaneously.
9) Run a quick Keyword Search on the Suspect drive before capture.
10) Run Multiple Cellphone/Tablets data Extraction and Analysis using third-party applications (Windows 10).
11) Run Forensic Triage applications using a third-party application (Windows 10), and view the captured targeted data.
12) Run a full Forensic Analysis application like Encase/Nuix/FTK/Axiom.
13) Run Virtual Drive Emulator before the data is captured (Linux).
14) Encryption and Decryption on the fly of drives that contain sensitive information.
15) Easily reconfigure the unit’s ports, where each target port can be configured as a source or target (using it to run 4:4 imaging sessions or to upload 8 images to a network).
16) Convert the unit’s 10 USB3.1 ports to SATA ports and run more parallel sessions (with the use of some USB3.0 to SATA adapters).
17) Expand with the unit' PCIE 3.0 expansion slots and optional SCSI, 1394, NVMe storage devices.
18) NVMe one port option kit: To capture data from NVMe U.2 SSD or NVMe M.2 SSD and NVMe PCIe storage.
19) Use the unit as a “Write Blocker” device: This feature enables the SuperImager unit to function as a secure bridge between workstations on a network to Suspect drives attached to the SuperImager unit by using the iSCSI protocol over a network connection. A forensic investigator using a workstation or laptop in one location can access a Suspect drive in different places in the Write block mode. The SuperImager unit will be connected to the same network, and the Suspect drives will be attached to the SuperImager unit in read-only mode. The SuperImager unit will act as a “write blocker” for any of the unit’s attached storage, such as SAS, SATA, USB, 1394, FC, SCSI, and NVMe*.
The unit is designed to help expedite the forensic imaging process, especially in facilities where there is a large backlog in imaging drives, by performing parallel forensic imaging in a true optimized multiple session's application.
The advantage of this unit is that it supports imaging from mixed media of SAS/SATA/USB/NVMe*.
*with the one-port NVMe option
Additional operations: HASH authentication, drive diagnostics, and automation of process using scripting.