Introduction:
Welcome to LogikEye, where innovation meets security. In an era dominated by rapid technological advancements, LogikEye stands as a beacon of excellence in the realm of cyber security and digital forensics. Established with a passion for safeguarding digital landscapes, LogikEye is dedicated to providing cutting-edge solutions that empower businesses to navigate the evolving threat landscape with confidence.
About Us:
LogikEye was founded with a vision to redefine the paradigm of cyber security and digital forensics. As a customer-centric organization, we pride ourselves on delivering holistic solutions that not only protect against cyber threats but also enable businesses to harness the full potential of the digital era securely.
Mission:
Our mission at LogikEye is clear - to be the guardians of your digital assets. We strive to provide robust cyber security measures and advanced digital forensics services that empower our clients to thrive in a secure digital environment.
Vision:
At LogikEye, we envision a future where businesses operate seamlessly in a digitally connected world, free from the fear of cyber threats. Our vision is to be at the forefront of technological innovation, setting new standards in cyber security and digital forensics to create a safer digital space for all.
Core Values:
Innovation: We embrace innovation as the cornerstone of our solutions. By staying ahead of the technological curve, we empower our clients with the latest advancements in cyber security.
Integrity: We uphold the highest standards of integrity in all our interactions. Transparency and honesty are at the heart of our business practices.
Customer-Centric: Our clients are at the center of everything we do. We are committed to understanding their unique needs and delivering tailored solutions.
Collaboration: We believe in collaborative partnerships, both within our team and with our clients. Together, we create stronger, more resilient digital ecosystems.
Our Services:
1. Cyber Security Solutions:
Network Security: LogikEye ensures the integrity of your digital infrastructure by safeguarding against unauthorized access and cyber attacks.
Endpoint Security: We secure end-user devices, preventing malicious activities and ensuring the protection of critical data.
Incident Response: LogikEye provides swift and effective responses to cyber incidents, minimizing potential damage and mitigating future risks.
2. Digital Forensics:
Data Recovery: Our advanced forensics techniques enable the retrieval of lost or compromised data, ensuring business continuity.
Incident Investigation: LogikEye conducts thorough investigations to identify root causes and vulnerabilities in the event of a security incident.
Expert Witness Services: We offer expert testimony and support in legal proceedings related to digital evidence.
Our Team:
Behind LogikEye is a team of highly skilled professionals, each an expert in their respective fields. Our dive
2. LogikEye is a comprehensive cyber security solution & services along with infrastructurelevel
World Class Solutions and services provider having deep expertise in addressing the most
complicated security issues and challenges facing modern enterprises to protect their brand,
value and reputation against the ever-evolving threat landscape.
LogikEye is a consulting and IT Security & Infrastructure solution/service provider committed to
deliver Product/solutions and professional services/ post implementation support to meet the
business objectives of our clients utilizing cost effective delivery model over 10 years. LogikEye
started its journey in 2006 in Dhaka, Bangladesh.
LogikEye also provides advanced cyber security solutions and services that help clients define
cyber security strategy, identify and remediate threats and risks, and achieve operational
readiness to reduce the risk of targeted attacks and breaches.
Our diverse management and advisory team draws upon experience gained globally in working
with the world leading software and telecommunication giants as well as military communities.
Vision
To make IT as an understandable and value adding participator in IT and Non-IT industry.
Mission
Absolute commitment to the highest obtainable standard of quality service through
technology towards humanity.
Office : House 11, Road 30 , Sector 07, Uttara Model Town Dhaka 1230.
COMPANY OVERVIEW
3. Our founder and Managing Director, Mehedi Hasan, and
our Operational Director, Jahedi Arman, are fortunate
enough to have illustrious careers in the Cyber Security
and digital forensic field in Bangladesh. LogikEye’s
success, however, has not been built on their
accomplishments but by the many individuals, who over
the past 13 years were, and still are, a part of our family —
those we call The Superman.
The company currently consists of a team of 5 full-time
colleagues who have joined LogikEye as experts in their
field, or who have shown potential and developed
internally to a level where they can stand proudly as a
leader and expert in their field.
Mehedi Hasan, our MD, established the Computer
Crime Investigation Unit and created different types of
hardware device for the Bangladesh Law enforcement
intelligence in 2013. Mehedi was the chairman of the
CCA Foundation Working Party on Cyber Crime from
2013 to till now. He has been the Consultant of the
Director GeneralForce of Intelligence Examiner’s Cyber
Forensic Forum from 2011 to 2016. He was also
aInstructor of the CID on Cyber Security from 2014 to
2015. He was also aInstructor of the ministry of women
and childaffairs on Cyber Security from 2014 to 2020.
COMPANY BACKGROUND
ATLEAST 50% OFTHE WORLDS POPULATION
HASACCESSTOTHE INTERNET
MILLION
EVERYYEARINAFRICATHERE ARE
+354MILLIONNEWINTERNET USERS
THERE ARE MORE
CELLULAR DEVICES THAN
PEOPLELIVINGINAFRICA
67%
4. We follow forensically-correct methodologies by making use of internationally accepted
hardware, software, and operating procedures, which are aligned with the major law
enforcement agencies across the globe. These agencies include the FBI, Scotland Yard, US
Secret Service, as well as South Africa's own SAPS and Hawks. By making use of this sophisticated
software and the judicially tested procedures, LogikEyeis able to ensure the integrity of all
evidence collected, data disseminated, and facts placed in front of a judicial body.
We are market leaders in the areas of digital forensic investigations, IT risk management, data
recovery,andelectronicdiscovery.SomeofourpersonnelhavebeenacknowledgedbytheHigh Court
of SA as expert witnesses in their field and have conducted extensive criminal, civil, and
departmental investigations nationally and across Africa.
OF DIGITAL CRIMES IN A BUSINESS ARE
BEINGCOMMITTEDBYEMPLOYEESORWITH
THEIR CO-OPERATION
LogikEye maintains cutting edge software and
hardware and is equipped to investigate any type of
computer, operating system, and application/
program. Each forensic investigator in LogikEye
specializes in a selected area of expertise; this
ensures that LogikEye can investigate any type of
digital transgression. Personnel of LogikEye receive
on-going and advanced training to ensure that
allmembers adhere to expert requirements. LogikEye
has the capacity to handle large cases in arequired
time frame.
MOBILEFORENSIC SERVICES
The advancement of digital technology has made it possible for cell
phones to be able to replace computers in just about all functions that
werepreviouslyonlypossibleonacumbersomecomputer.Thistechnology has
also made cell phones a choice device in cybercrimes as its mobility is an
attractive option for illegal and unauthorized activity.
LogikEye is a leading service provider of mobile forensic solutions with the
capability of fast data extraction from more than 6 000
different mobile phones, Ipads, and tablets. LogikEye has the
ability to extract data in a forensically sound manner and
present it with the integrity of the data intact ensuring that the
evidence will be admissible in court.
Our services include conducting data recovery from these
devices, mapping movement of devices, extracting call logs,
data communication, emails, documents, phone book,
pictures, videos, text messages, ESN, and IMEI information.
SERVICES
1 DIGITAL FORENSIC SERVICES
2
5. 100001101011001010000010100111001010010010001010010000001010100010010000
1000100010010010100011101001001010101000100000101001100001000000100011001
100010101001110010100110100100101000011010110010100001101011001010000010
CEYBER SECURITYSERVICES
Our company is at the forefront of providing robust and comprehensive
cybersecurity solutions tailored to safeguard the digital assets and
sensitive information of our clients. With the evolving landscape of cyber
threats, our team of skilled professionals employs cutting-edge
technologies and industry best practices to fortify your organization's
defenses. With our unwavering commitment to excellence, we stand as
your ally in the ever-evolving battle against cyber adversaries.
• Cyber Security audit
• Vulnerability Assessment and Penetration Testing (VAPT)
• Managed Security Services
• Cyber Crime Investigation & consultancy
• Cryptography & Network security service
• Ethical Hacking and Digital Forensics training
ELECTRONIC DISCOVERY
Another vital component of our services is electronic
logikeyeforensics.com a complex, multi-party litigation;
the lab can mine massive amounts of email
correspondence and other data to identify evidence
that relates to a case. Up to 70% of emails and other
documents in computer storage can be duplicated. Our
electronic discovery tools can search through the
equivalent of several warehouses full of data, remove
duplicated emails, and recover requested information
that is relevant to an investigation.Alternatively one
would have to gothrough lengthy and expensive manual
reviews of such transactions and files.
CUSTOMIZED SOFTWARE DEVELOPMENT
In we specialize in providing cutting-edge customized software development solutions tailored to
meet the unique needs of our clients. With a team of highly skilled and experienced developers,
we take pride in our ability to transform innovative ideas into robust, scalable, and efficient
software applications.
• Website design and development
• Mobile application development
• Customize software development as per customer needs
• Support or automate unique business processes
• Replaceorhelpconsolidateexistingsolutionsatlowercost
3
4
BY2020OURACCUMULATED
DIGITALUNIVERSEOFDATAWILLBE
TRILLION
GIGS
5
6. DATA RECOVERY
Data deleted from a computer is rarely completely lost. We can recover
data that has been lost, destroyed, deleted, or corrupted.
We work on all types of operating systems. Perpetrators or disgruntled
employees often destroy data in order to hide their transgressions, or to
render the company unable to use its own data. As part of our services,
LogikEye is able to recover this data as well as crack passwords that were
forgotten, or have been altered, by employees.
These services include:
• Data recovery from all operating systems and backups.
• Recovery of deleted or destroyed files and corrupt data.
• Cracking of passwords and decryption of data.
FRAUD TREND AND DATABASE ANALYSIS
We take a systematic approach to data analysis that begins with properly locating, scoping,
acquiring, testing, and verifying data. Once the data has been verified and moved to a stable
platform,weemployavarietyofanalysistoolsandtechniquestoanalyseandcomparethedata.
Most of our electronic data analysis focuses on the underlying business transactional data
contained in a forensic investigation. Our powerful suite of data analysis tools combines the
principles of data matching, pattern recognition, and data forensics with our extensive
experience in forensic investigations. With our technology we compare data from many different
sources within an organization (general ledger, creditors, debtors and HR) to fraud profiles and
externalreferencedatabases.Thisassistsinidentifyingpotentialirregularitiesandrelationshipsthat may
indicate fraudulent behavior.
DOMAIN HOSTING AND DATA CENTER
SERVICEING
In the realm of digital infrastructure, our company excels in providing top-tier domain hosting and
data center servicing solutions. As a trusted partner in the digital landscape, we understand the
critical importance of a reliable and secure hosting environment.
• Domainregistrationandwebhostingservice
• EmailserverhostingandCloudhosted Emailservice
• Implementing,ManagingandMaintainingcustomerDatacenter
• Storagebackupanddisasterrecoverysolutions
• DesignandimplementationofTier/RatedDataCentre
• NetworkmonitoringserviceforISPandCDNhostedservice
6
7
8
7. INFORMATION CONVERSION
If you are involved in a complex enquiry, involved in integrated legal notes, or overwhelmed by
your own business documents, we can convert large quantities of paper documents into usable
electronic data. We scan all types of documents and use Optical Character Recognition (OCR)
so that you can effortlessly search and manage information in a usable database. LogikEye will
transfer your paper documents into any electronic file format as per your requirements. We use
high resolution, high speed scanners which can be at our facility or deployed to your business
premises. Documents can be electronically indexed to a rate of near-perfect accuracy for data
searches.Ourteamofexperienceddatacapturerscanalsocreateanindexofallscanneddata.
We can supply you with an electronic copy of the data which can be ingested into your internal
ICT system or we can host it for you in our secure data hosting centre, which allows you secure
accesstoyourdataona24/7basisfromanylocationglobally.Ouraimistoprovideyouwiththe ability to
access your criticalbusiness information in order to effectively review and manage information.
SALES
LogikEye has been involved in cyber security and digital forensics for the past 15 years with some
of our members having more than 20 years of experience in the field. We have developed a
sound knowledge of the software and hardware tools needed to operate one of the Smart
digital forensic labs in Bangladesh. By using cutting-edge technology, for which we are also
resellers in the region, we can apply our knowledge to the advantage of our clients. This cutting-
edge technology includes the following Spying and forensic tools:
GSM Voice Spy
Smart GSM security system
Anti-voice recording system
Spy Show
Spy camera
Spy recorder
Cyber security training and workshop
Wall Listener Device
Android Spying tools
Ant Spyware tools
Antivirus
LogikEye has also developed an
advanced scene kit to assist first
responderstoeffectivelyandsecurely
collect digital evidence on scenes:
9
10
8. A Cyber Forensic Expert’s true value is not only measured by his ability to
locate some digital evidence but more so in his ability to successfully
locate all the evidence, place the evidence in context for the
investigator, relay findings in an expert report and successfully testify as
an expert witness on any level of judicial proceeding, The expert status
of a person is measured by his qualifications, experience, lecturing and
work published, capacity and infrastructure, affiliation, and
accreditation. Measured against these standards, LogikEye is found to
be a true market leader even when compared with large international
legal and auditing firms.
PILLARS OF EXCELLENCE
EXPERIENCE
QUALIFICATIONS
CAPACITY
LECTURING
RISKMANAGEMENT
One of our strong points is the impressive trial record of our Digital Forensic Experts who have
specialized in presenting digital evidence in departmental hearings, arbitrations, civil- and criminal
courts, over the past 10 years. These experts are internationally qualified in their fields, conduct
continuoustrainingandaccreditation,conductresearchintheirfield,publishacademicworksand subject
articles, and regularly lecture in their field of expertise.
INVESTIGATIONFOOTPRINT
CYANRE HAS CONDUCTED
INVESTIGATIONS SUCCESSFULLY
IN MORE THAN
COUNTRIES
WHATSETSUSAPART
9. DATASECURITY
LogikEye the Digital Forensic Lab, is committed to
protect the privacy of all its clients and partners as well
as any data submitted to us, not only that which may
contain the personal and/or private information of third
parties, but all information placed in our care.
All contracts with clients and partners contain non-
disclosure agreements. Data remains the property of
the client and retained and/or destroyed as per
instruction from the owner of the data.
All employee contracts as well as sub-contractors’
contracts contain a strict confidentiality clause which
also states the proprietary rIghts of the employer, as well
as the return of all data and/or information in their
possession. Staff only utilize laptops and external
storage devices owned by LogikEye: all content
remains the property of LogikEye.
Prior to any staff member exiting the services of
LogikEye, all hardware and software is collected and
backed up in an encrypted format should any legal
action follow. No staff member may retain any LogikEye
related data, forms etc. The staff are subject to a strict
Human Resource Policy. The company has a separate
Communication Policy to maintain and manage all
computer related data and communication, as well as
protect the information held by the Company and
utilized by employees and sub-contractors.
Prior to accepting an assignment, LogikEye obtains
confirmation and a written undertaking from clients
stating that they are authorized to hand over
data/information or hardware as the case may be.
LogikEye, as a computer forensic firm, collects data in a
forensic format which immediately renders it.
Our secure data
center is remotely
monitored 24/7,
covered by infrared
cameras, and is kept
inside a digital access
controlled walk in
safe.
DATATHEFT: BANGLADESHI POLICE SERVICE
Cyber-crime is a growing international phenomenon which poses significant threats to national and financial security,
and to the integrity of data and information globally. The absence of a clear policy as well as a lack of institutionalised
mechanisms to facilitate a coordinated approach to combat cyber-crime remains a key risk factor. Cyber security has
beenprioritisedbyGovernmentwithinOutput7:“SecureCyberSpace”oftheJCPSDeliveryAgreement;withafocuson the
establishment of a coherent and integrated cyber security approach. The Cluster will invest in research in order to
understand the nature of cyber-crime and its impact on the economic and technological development of the country.
In line with this, a comprehensive cyber threat assessment will be done in order to determine cyber security baselines, as
well as the skills development requirements of cyber-crime investigators.
-AnnualPerformanceplan 2024