The SuperImager® Plus Desktop NVMe + SATA Mixed Ports Gen-3 Forensic Lab Unit with 4 NVMe, 4 SATA, 8 USB3.0, 2 USB3.1 ports ports. The advantage of this unit that it support imagijng o SATA, USB and the latest NVMe SSD usining the same unit and cross media copy. The unit is a top performing of multiple sources to multiple targets of computer forensic Imaging in the market. The user can perform simultaneously forensic imaging from 2:2 NVMe SSD (2.5″ or M.2 SSD), and 2:2 SATA drives . The application is a full forensic suite. The top speed measure of NVMe SSD was 93.7GB/min.
Key Features: The unit hardware: i7 – 8th generation CPU, 32GB Memory, 250GB SSD internal storage, with 4 NVMe SFF-8639 ports, 4 SATA ports and 10 USB3.1 (10Gigabit/s) ports, Ubuntu 18.04LTS OS with a dual boot of Linux and Win10 Prof. The unit supplied with 4 SFF-8639 to M.2 NVMe cables and adapters and with secure brackets. (The top speed reading from an NVMe SSD is 97GB/min).
Main Usage: Lab unit for imaging from NVMe, SATA suspect drives.
The application is using Ubuntu open OS: Multi-tasks, truly simultaneous multiple forensic imaging from one or many source ports to one or many target ports with different interfaces and options. Like imaging 1:7, 4:4, 8 to a network of NVMe SSD or SATA drives or any mix of interfaces using a mirror image, DD, E01 compressed, mix mode and more. Also, the user can select to run in one imaging session 3 HASH engines (SHA1, SHA2, MD5), AES256 encryption and a quick keyword search on the fly at amazing speeds.
Usage: Under the Linux OS: Full Forensic imaging, HASH, Erase and Format, Drive Diagnostics, Virtual Emulator, Remote Capture, Encrypt, Decrypt, Keyword Search before or while the imaging, Scripting.
Under Windows 10 Pro: Load and use any third-party applications to perform: Full Forensic analysis (EnCase, Nuix, Magnet), Multiple Cellphone data extractions (Cellebrite, MSAB, Paraben) using the unit’ fast USB ports.
The user can use to the unit to:
- Forensic Imaging: E01/Ex01 format and with full compression, DD, Mirror, Mixed format DD/E01, Selective Imaging of files and folders using file extension filters (for example run E01 capture of 2 parallel simultaneous sessions using 4 NVMe SSD and with 16 CPU compression engines).
- Many to one: Perform Forensic Imaging from many Suspect drives to one large Evidence drive, in append mode.
- Upload to network: Many Forensic images to a network (SMB, CIFS, NFS).
- Erase: Erase data from many drives simultaneously using DoD(ECE, E), Security Erase, Enhanced Security, Sanitize erase modes.
- View: View the captured data directly on Ubuntu Desktop.
- Virtual Drive Emulator: boot, mount and view the Suspect drive in its native environment (mount raw drive or DD/E01 drive image), and extract important files into Evidence drive or any external storage.
- Encryption and Decryption on the fly of drives that contain sensitive information.
- Unit’s Port Role: Easily reconfigure the unit’s ports, where each of the target port can be configured as source or target for running 4:4 sessions, or to run upload 8 to network.
- USB to SATA adapters: Convert the unit’s 8 USB3.0 ports to SATA ports and run more parallel sessions (with the use of some USB3.0 to SATA adapters).
The unit is designed to help expedite the forensic imaging process, especially in facilities where there is a large backlog in imaging hard disk drives by performing many parallel forensic imaging in a true optimized multiple session’s application. The advantage of this unit that it supports imaging from mix media of SATA, USB and the new NVMe SSD.
The Unit Built-in:
4 native NVMe ports, 4 SATA ports, 8 open tray drive caddy, 8 native USB3.0 ports, 2 USB 3.1 ports, e-SATA port, 1Gigabit/s Ethernet port, HDMI port, DP port.
The Unit as Forensic Imaging Tool:
In one read pass from the “Suspect” drive, the application can run the following operations simultaneously: Forensic Imaging with E01 format and with full compression, Encryption with AES 256, simultaneously calculate 3 HASH Verification and Authentication values (MD5, SHA1, SHA2), and Saving the captured Forensic Images to many destinations such us 1) Two “Evidence” drives 2) Network 3) External compact USB3.0/e-SATA TB RAID encrypted storage 4) NAS. In addition, the user can run (optional) Virtual Drive Emulator to browse the Suspect drive under Windows, transfer and copy important files from the Suspect drive to any destination drives.
The Unit as Data Eraser:
Supports DoD and Security Erase, Enhanced Security erase, Sanitize, User erase protocols that are NIST 800-88 compliance.