SuperImager Plus 8” Forensic Portable unit with NVMe and SATA mix ports

Price:

$5,000.00

Extreme Forensic Imager Portable Field unit with NVMe, SATA, and Thunderbolt 3.0 mix ports, running Dual Boot of Linux OS for Forensic data imaging and virtual emulator, and Windows 10 for full forensic analysis, cellphone data extraction/analysis, and triage data collection. The unit is Portable, compact, easy to carry, and extremely fast. It is built with 2 NVMe ports (U.2) and 2 ports of SATA3, 8 ports of USB3.1, one port of Thunderbolt 3.0, and is supplied with a Thunderbolt Expansion box with 4 SAS ports and 1 M.2 NVMe controller to serve as the third port. The user can run multiple, parallel, simultaneous forensic imaging operations from many storage devices, with 3 HASH values, and with an encryption on the fly. The unit includes a Remote Capture KIT and an Enabled Virtual Emulator option.

SuperImager Plus 8” Portable Forensic Field unit with 3 NVMe + 4 SAS/SATA + 3 SATA+ TB3.0 ports. It is a top performance Field Computer Forensic Imaging tool and Complete Digital Forensic Investigation platform The unit is Portable, Compact, easy to carry, and extremely fast. It is built with 2 NVMe U.2 data & power ports, 2 SATA3 data & power ports, e-SATA port, 8 USB3.0/3.1 ports, Thunderbolt 3.0 port.

c The unit configured with Dual Open OS of Linux for fast efficient Forensic imaging and of Windows 10 for running full Forensic Analysis (EnCase, Nuix, Axiom and others), cellphone data extraction(Cellebrite, MASB and others), and triage data collection. Under Linux, the user can run multiple, parallel simultaneous independent forensic imaging sessions (mirror image, single partition, Linux-DD, EnCase, mix E01/DD, VHD, Triage with Files and Folders) with 3 HASH values(MD5, SHA1, and SHA2 run all the three at the same time), encryption, compression, keyword search all on the fly and save images to a network. The units top speed: 31GB/min SATA SSD, 187GB/min NVMe SSD. The unit hardware is very robust running i7 11 generation CPU and with 32GB of memory, 1TB SSD, 8” LCD display.

PRODUCT DESCRIPTION

              • Total ports:
                • • 3 SATA ports: 2 SATA ports (power & data) and one e-SATA port on the main unit
                • • 4 SAS/SATA ports: 4 SAS ports on the TB Expansion Box (only data)
                • • 3 NVMe ports: 2 U.2 NVMe on the main unit (power & data) and one M.2 NVMe on the TB Expansion Box
                • • TB3.0 port

                • The unit supplied with:
                • • Remote Capture KIT
                • • Virtual Emulator (for viewing the Suspect drive prior to the capture).
                • • 2 U.2 Extension Cables.
                • • 2 U.2 to M.2 NVMe adapters.
                • • Thunderbolt 3.0 to PCI-E Expansion Box with 4 SAS ports controller + M.2 NVMe controller.

                • Features
                  1. Multiple Parallel Forensic Capture: Mirror (bit by bit), Linux-DD format, E01/Ex01 format (with full compression), Mixed-Format DD/E01, Single partition, copy the whole drive or only parts. Copy 1:6/2:4/3:3 for SATA drives, 1:1, 1:2 for NVMe SSD, 2:2 for SAS drives, or any mix between the 3 NVMe ports to 7 SATA/SAS ports or 8 USB3.0/3.1 ports.
                  2. Run a Selective Imaging (Targeted Imaging) of files, folders, and partitions with file extensions filters.
                  3. Erase data from Evidence drive prior to use – using DoD (ECE, E), Security Erase, NVMe Secure Erase, Sanitize, or User erase protocols.
                  4. View the Suspect drive directly on the Ubuntu Desktop screen using the virtual drive emulator.
                  5. Encrypt the data while capturing (using the AES256 engine) and decryption at the destination using MediaClone utility
                  6. HASH the data while capturing – run all the three, SHA-1, SHA-2, and MD5 HASH engines, at the same time.
                  7. Run a quick Keyword Search on the Suspect drive prior to capture or during the capture.
                  8. Run Multiple Cellphone/Tablets data Extraction and Analysis using a third-party application on the Windows 10 side.
                  9. Run Forensic Triage application using selective capture or by using a third-party application on the Windows 10 side.
                  10. Run a full Forensic Analysis application like Encase/Nuix/FTK/Axiom and more.
                  11. Run Virtual Drive Emulator to view the Suspect drive prior to the data being captured (Linux)
                  12. Run Remote Capture from unopened laptops – Intel Based CPU (supplied with this unit).
                  13. Use the Thunderbolt 3.0 port to capture data from from Mac using the Thunderbolt-Mac acquisition kit that supports Mac with Thunderbolt 2/3 port or 1394 port, or connect to 10GbE network with the use of TB3.0 to 10GbE adapter.
                  14. Unlock drives with passcode such ATA, BitLocker, Opal for SED drives.
                  15. New feature – Use the SuperImager unit as a “Write Blocker” device: This new feature enables the SuperImager unit to function as a secure bridge between workstations on a network to Suspect drives attached to the SuperImager unit by using the iSCSI protocol over a network connection.A forensic investigator using a workstation or laptop in one location can access a Suspect drive in different locations in the Write block mode.The SuperImager unit will be connected to the same network and the Suspect drives will be attached to the SuperImager unit in read-only mode. The SuperImager unit will act as a “write blocker” for any of the unit’s attached storage, such as: SAS, SATA, USB, 1394, FC, SCSI, and NVMe.
Scroll to Top