SlideShare a Scribd company logo
1 of 9
Download to read offline
COMPANYPROFILE
LOGIK EYE FORENSICS
HOUSE 11 (FIRST FLOOR), ROAD -30, SECTOR –7, UTTARA MODEL TOWN, DHAKA-1230
+8801766442199 support@logikeyeforensics.com https://logikeyeforensics.com
+8801326249533
LogikEye is a comprehensive cyber security solution & services along with infrastructurelevel
World Class Solutions and services provider having deep expertise in addressing the most
complicated security issues and challenges facing modern enterprises to protect their brand,
value and reputation against the ever-evolving threat landscape.
LogikEye is a consulting and IT Security & Infrastructure solution/service provider committed to
deliver Product/solutions and professional services/ post implementation support to meet the
business objectives of our clients utilizing cost effective delivery model over 10 years. LogikEye
started its journey in 2006 in Dhaka, Bangladesh.
LogikEye also provides advanced cyber security solutions and services that help clients define
cyber security strategy, identify and remediate threats and risks, and achieve operational
readiness to reduce the risk of targeted attacks and breaches.
Our diverse management and advisory team draws upon experience gained globally in working
with the world leading software and telecommunication giants as well as military communities.
Vision
To make IT as an understandable and value adding participator in IT and Non-IT industry.
Mission
Absolute commitment to the highest obtainable standard of quality service through
technology towards humanity.
Office : House 11, Road 30 , Sector 07, Uttara Model Town Dhaka 1230.
COMPANY OVERVIEW
Our founder and Managing Director, Mehedi Hasan, and
our Operational Director, Jahedi Arman, are fortunate
enough to have illustrious careers in the Cyber Security
and digital forensic field in Bangladesh. LogikEye’s
success, however, has not been built on their
accomplishments but by the many individuals, who over
the past 13 years were, and still are, a part of our family —
those we call The Superman.
The company currently consists of a team of 5 full-time
colleagues who have joined LogikEye as experts in their
field, or who have shown potential and developed
internally to a level where they can stand proudly as a
leader and expert in their field.
Mehedi Hasan, our MD, established the Computer
Crime Investigation Unit and created different types of
hardware device for the Bangladesh Law enforcement
intelligence in 2013. Mehedi was the chairman of the
CCA Foundation Working Party on Cyber Crime from
2013 to till now. He has been the Consultant of the
Director GeneralForce of Intelligence Examiner’s Cyber
Forensic Forum from 2011 to 2016. He was also
aInstructor of the CID on Cyber Security from 2014 to
2015. He was also aInstructor of the ministry of women
and childaffairs on Cyber Security from 2014 to 2020.
COMPANY BACKGROUND
ATLEAST 50% OFTHE WORLDS POPULATION
HASACCESSTOTHE INTERNET
MILLION
EVERYYEARINAFRICATHERE ARE
+354MILLIONNEWINTERNET USERS
THERE ARE MORE
CELLULAR DEVICES THAN
PEOPLELIVINGINAFRICA
67%
We follow forensically-correct methodologies by making use of internationally accepted
hardware, software, and operating procedures, which are aligned with the major law
enforcement agencies across the globe. These agencies include the FBI, Scotland Yard, US
Secret Service, as well as South Africa's own SAPS and Hawks. By making use of this sophisticated
software and the judicially tested procedures, LogikEyeis able to ensure the integrity of all
evidence collected, data disseminated, and facts placed in front of a judicial body.
We are market leaders in the areas of digital forensic investigations, IT risk management, data
recovery,andelectronicdiscovery.SomeofourpersonnelhavebeenacknowledgedbytheHigh Court
of SA as expert witnesses in their field and have conducted extensive criminal, civil, and
departmental investigations nationally and across Africa.
OF DIGITAL CRIMES IN A BUSINESS ARE
BEINGCOMMITTEDBYEMPLOYEESORWITH
THEIR CO-OPERATION
LogikEye maintains cutting edge software and
hardware and is equipped to investigate any type of
computer, operating system, and application/
program. Each forensic investigator in LogikEye
specializes in a selected area of expertise; this
ensures that LogikEye can investigate any type of
digital transgression. Personnel of LogikEye receive
on-going and advanced training to ensure that
allmembers adhere to expert requirements. LogikEye
has the capacity to handle large cases in arequired
time frame.
MOBILEFORENSIC SERVICES
The advancement of digital technology has made it possible for cell
phones to be able to replace computers in just about all functions that
werepreviouslyonlypossibleonacumbersomecomputer.Thistechnology has
also made cell phones a choice device in cybercrimes as its mobility is an
attractive option for illegal and unauthorized activity.
LogikEye is a leading service provider of mobile forensic solutions with the
capability of fast data extraction from more than 6 000
different mobile phones, Ipads, and tablets. LogikEye has the
ability to extract data in a forensically sound manner and
present it with the integrity of the data intact ensuring that the
evidence will be admissible in court.
Our services include conducting data recovery from these
devices, mapping movement of devices, extracting call logs,
data communication, emails, documents, phone book,
pictures, videos, text messages, ESN, and IMEI information.
SERVICES
1 DIGITAL FORENSIC SERVICES
2
100001101011001010000010100111001010010010001010010000001010100010010000
1000100010010010100011101001001010101000100000101001100001000000100011001
100010101001110010100110100100101000011010110010100001101011001010000010
CEYBER SECURITYSERVICES
Our company is at the forefront of providing robust and comprehensive
cybersecurity solutions tailored to safeguard the digital assets and
sensitive information of our clients. With the evolving landscape of cyber
threats, our team of skilled professionals employs cutting-edge
technologies and industry best practices to fortify your organization's
defenses. With our unwavering commitment to excellence, we stand as
your ally in the ever-evolving battle against cyber adversaries.
• Cyber Security audit
• Vulnerability Assessment and Penetration Testing (VAPT)
• Managed Security Services
• Cyber Crime Investigation & consultancy
• Cryptography & Network security service
• Ethical Hacking and Digital Forensics training
ELECTRONIC DISCOVERY
Another vital component of our services is electronic
logikeyeforensics.com a complex, multi-party litigation;
the lab can mine massive amounts of email
correspondence and other data to identify evidence
that relates to a case. Up to 70% of emails and other
documents in computer storage can be duplicated. Our
electronic discovery tools can search through the
equivalent of several warehouses full of data, remove
duplicated emails, and recover requested information
that is relevant to an investigation.Alternatively one
would have to gothrough lengthy and expensive manual
reviews of such transactions and files.
CUSTOMIZED SOFTWARE DEVELOPMENT
In we specialize in providing cutting-edge customized software development solutions tailored to
meet the unique needs of our clients. With a team of highly skilled and experienced developers,
we take pride in our ability to transform innovative ideas into robust, scalable, and efficient
software applications.
• Website design and development
• Mobile application development
• Customize software development as per customer needs
• Support or automate unique business processes
• Replaceorhelpconsolidateexistingsolutionsatlowercost
3
4
BY2020OURACCUMULATED
DIGITALUNIVERSEOFDATAWILLBE
TRILLION
GIGS
5
DATA RECOVERY
Data deleted from a computer is rarely completely lost. We can recover
data that has been lost, destroyed, deleted, or corrupted.
We work on all types of operating systems. Perpetrators or disgruntled
employees often destroy data in order to hide their transgressions, or to
render the company unable to use its own data. As part of our services,
LogikEye is able to recover this data as well as crack passwords that were
forgotten, or have been altered, by employees.
These services include:
• Data recovery from all operating systems and backups.
• Recovery of deleted or destroyed files and corrupt data.
• Cracking of passwords and decryption of data.
FRAUD TREND AND DATABASE ANALYSIS
We take a systematic approach to data analysis that begins with properly locating, scoping,
acquiring, testing, and verifying data. Once the data has been verified and moved to a stable
platform,weemployavarietyofanalysistoolsandtechniquestoanalyseandcomparethedata.
Most of our electronic data analysis focuses on the underlying business transactional data
contained in a forensic investigation. Our powerful suite of data analysis tools combines the
principles of data matching, pattern recognition, and data forensics with our extensive
experience in forensic investigations. With our technology we compare data from many different
sources within an organization (general ledger, creditors, debtors and HR) to fraud profiles and
externalreferencedatabases.Thisassistsinidentifyingpotentialirregularitiesandrelationshipsthat may
indicate fraudulent behavior.
DOMAIN HOSTING AND DATA CENTER
SERVICEING
In the realm of digital infrastructure, our company excels in providing top-tier domain hosting and
data center servicing solutions. As a trusted partner in the digital landscape, we understand the
critical importance of a reliable and secure hosting environment.
• Domainregistrationandwebhostingservice
• EmailserverhostingandCloudhosted Emailservice
• Implementing,ManagingandMaintainingcustomerDatacenter
• Storagebackupanddisasterrecoverysolutions
• DesignandimplementationofTier/RatedDataCentre
• NetworkmonitoringserviceforISPandCDNhostedservice
6
7
8
INFORMATION CONVERSION
If you are involved in a complex enquiry, involved in integrated legal notes, or overwhelmed by
your own business documents, we can convert large quantities of paper documents into usable
electronic data. We scan all types of documents and use Optical Character Recognition (OCR)
so that you can effortlessly search and manage information in a usable database. LogikEye will
transfer your paper documents into any electronic file format as per your requirements. We use
high resolution, high speed scanners which can be at our facility or deployed to your business
premises. Documents can be electronically indexed to a rate of near-perfect accuracy for data
searches.Ourteamofexperienceddatacapturerscanalsocreateanindexofallscanneddata.
We can supply you with an electronic copy of the data which can be ingested into your internal
ICT system or we can host it for you in our secure data hosting centre, which allows you secure
accesstoyourdataona24/7basisfromanylocationglobally.Ouraimistoprovideyouwiththe ability to
access your criticalbusiness information in order to effectively review and manage information.
SALES
LogikEye has been involved in cyber security and digital forensics for the past 15 years with some
of our members having more than 20 years of experience in the field. We have developed a
sound knowledge of the software and hardware tools needed to operate one of the Smart
digital forensic labs in Bangladesh. By using cutting-edge technology, for which we are also
resellers in the region, we can apply our knowledge to the advantage of our clients. This cutting-
edge technology includes the following Spying and forensic tools:
 GSM Voice Spy
 Smart GSM security system
 Anti-voice recording system
 Spy Show
 Spy camera
 Spy recorder
 Cyber security training and workshop
 Wall Listener Device
 Android Spying tools
 Ant Spyware tools
 Antivirus
LogikEye has also developed an
advanced scene kit to assist first
responderstoeffectivelyandsecurely
collect digital evidence on scenes:
9
10
A Cyber Forensic Expert’s true value is not only measured by his ability to
locate some digital evidence but more so in his ability to successfully
locate all the evidence, place the evidence in context for the
investigator, relay findings in an expert report and successfully testify as
an expert witness on any level of judicial proceeding, The expert status
of a person is measured by his qualifications, experience, lecturing and
work published, capacity and infrastructure, affiliation, and
accreditation. Measured against these standards, LogikEye is found to
be a true market leader even when compared with large international
legal and auditing firms.
PILLARS OF EXCELLENCE
EXPERIENCE
QUALIFICATIONS
CAPACITY
LECTURING
RISKMANAGEMENT
One of our strong points is the impressive trial record of our Digital Forensic Experts who have
specialized in presenting digital evidence in departmental hearings, arbitrations, civil- and criminal
courts, over the past 10 years. These experts are internationally qualified in their fields, conduct
continuoustrainingandaccreditation,conductresearchintheirfield,publishacademicworksand subject
articles, and regularly lecture in their field of expertise.
INVESTIGATIONFOOTPRINT
CYANRE HAS CONDUCTED
INVESTIGATIONS SUCCESSFULLY
IN MORE THAN
COUNTRIES
WHATSETSUSAPART
DATASECURITY
LogikEye the Digital Forensic Lab, is committed to
protect the privacy of all its clients and partners as well
as any data submitted to us, not only that which may
contain the personal and/or private information of third
parties, but all information placed in our care.
All contracts with clients and partners contain non-
disclosure agreements. Data remains the property of
the client and retained and/or destroyed as per
instruction from the owner of the data.
All employee contracts as well as sub-contractors’
contracts contain a strict confidentiality clause which
also states the proprietary rIghts of the employer, as well
as the return of all data and/or information in their
possession. Staff only utilize laptops and external
storage devices owned by LogikEye: all content
remains the property of LogikEye.
Prior to any staff member exiting the services of
LogikEye, all hardware and software is collected and
backed up in an encrypted format should any legal
action follow. No staff member may retain any LogikEye
related data, forms etc. The staff are subject to a strict
Human Resource Policy. The company has a separate
Communication Policy to maintain and manage all
computer related data and communication, as well as
protect the information held by the Company and
utilized by employees and sub-contractors.
Prior to accepting an assignment, LogikEye obtains
confirmation and a written undertaking from clients
stating that they are authorized to hand over
data/information or hardware as the case may be.
LogikEye, as a computer forensic firm, collects data in a
forensic format which immediately renders it.
Our secure data
center is remotely
monitored 24/7,
covered by infrared
cameras, and is kept
inside a digital access
controlled walk in
safe.
DATATHEFT: BANGLADESHI POLICE SERVICE
Cyber-crime is a growing international phenomenon which poses significant threats to national and financial security,
and to the integrity of data and information globally. The absence of a clear policy as well as a lack of institutionalised
mechanisms to facilitate a coordinated approach to combat cyber-crime remains a key risk factor. Cyber security has
beenprioritisedbyGovernmentwithinOutput7:“SecureCyberSpace”oftheJCPSDeliveryAgreement;withafocuson the
establishment of a coherent and integrated cyber security approach. The Cluster will invest in research in order to
understand the nature of cyber-crime and its impact on the economic and technological development of the country.
In line with this, a comprehensive cyber threat assessment will be done in order to determine cyber security baselines, as
well as the skills development requirements of cyber-crime investigators.
-AnnualPerformanceplan 2024

More Related Content

Similar to Company profile logikeye.pdf

ITExpertUS Corporate (CyberSecurity) 2023.pptx
ITExpertUS Corporate (CyberSecurity) 2023.pptxITExpertUS Corporate (CyberSecurity) 2023.pptx
ITExpertUS Corporate (CyberSecurity) 2023.pptxhoshangvashisht1
 
Cleared Job Fair Job Seeker Handbook March 7, BWI, MD
Cleared Job Fair Job Seeker Handbook March 7, BWI, MDCleared Job Fair Job Seeker Handbook March 7, BWI, MD
Cleared Job Fair Job Seeker Handbook March 7, BWI, MDClearedJobs.Net
 
StoneWork Solutions Brochure _ English
StoneWork Solutions Brochure _ EnglishStoneWork Solutions Brochure _ English
StoneWork Solutions Brochure _ Englishoscar_garcia_arano
 
CSI Promotional Brochure
CSI Promotional BrochureCSI Promotional Brochure
CSI Promotional BrochureKaganMinare
 
Managed services web
Managed services webManaged services web
Managed services webDean North
 
Managed services web
Managed services webManaged services web
Managed services webMark Howie
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv
 
ZIGRAM Introduction September 2020
ZIGRAM Introduction September 2020ZIGRAM Introduction September 2020
ZIGRAM Introduction September 2020ZIGRAM
 
NXLEVL Capabilities Brief-2017
NXLEVL Capabilities Brief-2017NXLEVL Capabilities Brief-2017
NXLEVL Capabilities Brief-2017Bobby L. Sheppard
 
The Role of IT Infrastructure Services in Enabling Remote Work Success
The Role of IT Infrastructure Services in Enabling Remote Work SuccessThe Role of IT Infrastructure Services in Enabling Remote Work Success
The Role of IT Infrastructure Services in Enabling Remote Work SuccessDevLabs Global
 

Similar to Company profile logikeye.pdf (20)

ITExpertUS Corporate (CyberSecurity) 2023.pptx
ITExpertUS Corporate (CyberSecurity) 2023.pptxITExpertUS Corporate (CyberSecurity) 2023.pptx
ITExpertUS Corporate (CyberSecurity) 2023.pptx
 
Company_Profile_Updated_17032016
Company_Profile_Updated_17032016Company_Profile_Updated_17032016
Company_Profile_Updated_17032016
 
Cleared Job Fair Job Seeker Handbook March 7, BWI, MD
Cleared Job Fair Job Seeker Handbook March 7, BWI, MDCleared Job Fair Job Seeker Handbook March 7, BWI, MD
Cleared Job Fair Job Seeker Handbook March 7, BWI, MD
 
StoneWork Solutions Brochure _ English
StoneWork Solutions Brochure _ EnglishStoneWork Solutions Brochure _ English
StoneWork Solutions Brochure _ English
 
CSI Promotional Brochure
CSI Promotional BrochureCSI Promotional Brochure
CSI Promotional Brochure
 
braincavesoft-com-cyber-security.pdf
braincavesoft-com-cyber-security.pdfbraincavesoft-com-cyber-security.pdf
braincavesoft-com-cyber-security.pdf
 
braincavesoft-com-cyber-security (1).pdf
braincavesoft-com-cyber-security (1).pdfbraincavesoft-com-cyber-security (1).pdf
braincavesoft-com-cyber-security (1).pdf
 
Managed services web
Managed services webManaged services web
Managed services web
 
Managed servoes 2mb
Managed servoes 2mbManaged servoes 2mb
Managed servoes 2mb
 
Managed services web
Managed services webManaged services web
Managed services web
 
Tesseract Service Portfolio
Tesseract Service PortfolioTesseract Service Portfolio
Tesseract Service Portfolio
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
 
Brochure of ICSS
Brochure of ICSS Brochure of ICSS
Brochure of ICSS
 
IT Support Services - BrainCave Soft.pdf
IT Support Services - BrainCave Soft.pdfIT Support Services - BrainCave Soft.pdf
IT Support Services - BrainCave Soft.pdf
 
ZIGRAM Introduction September 2020
ZIGRAM Introduction September 2020ZIGRAM Introduction September 2020
ZIGRAM Introduction September 2020
 
Consulthink Overview
Consulthink OverviewConsulthink Overview
Consulthink Overview
 
NXLEVL Capabilities Brief-2017
NXLEVL Capabilities Brief-2017NXLEVL Capabilities Brief-2017
NXLEVL Capabilities Brief-2017
 
The Role of IT Infrastructure Services in Enabling Remote Work Success
The Role of IT Infrastructure Services in Enabling Remote Work SuccessThe Role of IT Infrastructure Services in Enabling Remote Work Success
The Role of IT Infrastructure Services in Enabling Remote Work Success
 
Uptime Group
Uptime GroupUptime Group
Uptime Group
 

More from Mehedi Hasan

Cyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdfCyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdfMehedi Hasan
 
Hackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptxHackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptxMehedi Hasan
 
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...Mehedi Hasan
 
Cyber security and Ethical Hacking Course.pdf
Cyber security and Ethical Hacking Course.pdfCyber security and Ethical Hacking Course.pdf
Cyber security and Ethical Hacking Course.pdfMehedi Hasan
 
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdfCYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdfMehedi Hasan
 
Wall Listening Devices.pdf
Wall Listening Devices.pdfWall Listening Devices.pdf
Wall Listening Devices.pdfMehedi Hasan
 
Syllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical HackingSyllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical HackingMehedi Hasan
 
Smart voice security system
Smart voice security systemSmart voice security system
Smart voice security systemMehedi Hasan
 
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICESONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICESMehedi Hasan
 
Nuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docxNuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docxMehedi Hasan
 
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptxInformation Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptxMehedi Hasan
 
Cyber Crime Awareness.pptx
Cyber Crime Awareness.pptxCyber Crime Awareness.pptx
Cyber Crime Awareness.pptxMehedi Hasan
 
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...Mehedi Hasan
 
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...Mehedi Hasan
 
Cyber crime and investigation training
Cyber crime and investigation trainingCyber crime and investigation training
Cyber crime and investigation trainingMehedi Hasan
 
সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ
সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ
সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ Mehedi Hasan
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigationMehedi Hasan
 
Remote control system (rcs)
Remote control system (rcs)Remote control system (rcs)
Remote control system (rcs)Mehedi Hasan
 
Live memory forensics
Live memory forensicsLive memory forensics
Live memory forensicsMehedi Hasan
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security Mehedi Hasan
 

More from Mehedi Hasan (20)

Cyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdfCyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdf
 
Hackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptxHackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptx
 
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
 
Cyber security and Ethical Hacking Course.pdf
Cyber security and Ethical Hacking Course.pdfCyber security and Ethical Hacking Course.pdf
Cyber security and Ethical Hacking Course.pdf
 
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdfCYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
 
Wall Listening Devices.pdf
Wall Listening Devices.pdfWall Listening Devices.pdf
Wall Listening Devices.pdf
 
Syllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical HackingSyllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical Hacking
 
Smart voice security system
Smart voice security systemSmart voice security system
Smart voice security system
 
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICESONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
 
Nuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docxNuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docx
 
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptxInformation Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptx
 
Cyber Crime Awareness.pptx
Cyber Crime Awareness.pptxCyber Crime Awareness.pptx
Cyber Crime Awareness.pptx
 
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
 
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
 
Cyber crime and investigation training
Cyber crime and investigation trainingCyber crime and investigation training
Cyber crime and investigation training
 
সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ
সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ
সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
 
Remote control system (rcs)
Remote control system (rcs)Remote control system (rcs)
Remote control system (rcs)
 
Live memory forensics
Live memory forensicsLive memory forensics
Live memory forensics
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
 

Recently uploaded

Top Call Girls In Indira Nagar Lucknow ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
Top Call Girls In Indira Nagar Lucknow ( Lucknow  ) 🔝 8923113531 🔝  Cash PaymentTop Call Girls In Indira Nagar Lucknow ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment
Top Call Girls In Indira Nagar Lucknow ( Lucknow ) 🔝 8923113531 🔝 Cash Paymentanilsa9823
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...aditipandeya
 
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our EscortsVIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escortssonatiwari757
 
Mumbai Call Girls Colaba Pooja WhatsApp 7738631006 💞 Full Night Enjoy
Mumbai Call Girls Colaba Pooja WhatsApp  7738631006  💞 Full Night EnjoyMumbai Call Girls Colaba Pooja WhatsApp  7738631006  💞 Full Night Enjoy
Mumbai Call Girls Colaba Pooja WhatsApp 7738631006 💞 Full Night EnjoyPooja Nehwal
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...aditipandeya
 
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...anilsa9823
 
Top Call Girls In Arjunganj ( Lucknow ) ✨ 8923113531 ✨ Cash Payment
Top Call Girls In Arjunganj ( Lucknow  ) ✨ 8923113531 ✨  Cash PaymentTop Call Girls In Arjunganj ( Lucknow  ) ✨ 8923113531 ✨  Cash Payment
Top Call Girls In Arjunganj ( Lucknow ) ✨ 8923113531 ✨ Cash Paymentanilsa9823
 
High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼‍❤️‍💋‍🧑🏽 8923113531 𓀇 VIP ...
High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼‍❤️‍💋‍🧑🏽 8923113531 𓀇 VIP ...High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼‍❤️‍💋‍🧑🏽 8923113531 𓀇 VIP ...
High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼‍❤️‍💋‍🧑🏽 8923113531 𓀇 VIP ...gurkirankumar98700
 
Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323Pooja Nehwal
 
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...anilsa9823
 
ServiceNow Field Service Management: Transforms Field Operations for Success
ServiceNow Field Service Management: Transforms Field Operations for SuccessServiceNow Field Service Management: Transforms Field Operations for Success
ServiceNow Field Service Management: Transforms Field Operations for SuccessCyntexa
 
(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...
(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...
(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...Hot Call Girls In Sector 58 (Noida)
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...aditipandeya
 
Product Catalog Bandung Home Decor Design Furniture
Product Catalog Bandung Home Decor Design FurnitureProduct Catalog Bandung Home Decor Design Furniture
Product Catalog Bandung Home Decor Design Furniturem3resolve
 

Recently uploaded (14)

Top Call Girls In Indira Nagar Lucknow ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
Top Call Girls In Indira Nagar Lucknow ( Lucknow  ) 🔝 8923113531 🔝  Cash PaymentTop Call Girls In Indira Nagar Lucknow ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment
Top Call Girls In Indira Nagar Lucknow ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...
 
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our EscortsVIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escorts
 
Mumbai Call Girls Colaba Pooja WhatsApp 7738631006 💞 Full Night Enjoy
Mumbai Call Girls Colaba Pooja WhatsApp  7738631006  💞 Full Night EnjoyMumbai Call Girls Colaba Pooja WhatsApp  7738631006  💞 Full Night Enjoy
Mumbai Call Girls Colaba Pooja WhatsApp 7738631006 💞 Full Night Enjoy
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...
 
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...
 
Top Call Girls In Arjunganj ( Lucknow ) ✨ 8923113531 ✨ Cash Payment
Top Call Girls In Arjunganj ( Lucknow  ) ✨ 8923113531 ✨  Cash PaymentTop Call Girls In Arjunganj ( Lucknow  ) ✨ 8923113531 ✨  Cash Payment
Top Call Girls In Arjunganj ( Lucknow ) ✨ 8923113531 ✨ Cash Payment
 
High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼‍❤️‍💋‍🧑🏽 8923113531 𓀇 VIP ...
High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼‍❤️‍💋‍🧑🏽 8923113531 𓀇 VIP ...High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼‍❤️‍💋‍🧑🏽 8923113531 𓀇 VIP ...
High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼‍❤️‍💋‍🧑🏽 8923113531 𓀇 VIP ...
 
Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323
 
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...
 
ServiceNow Field Service Management: Transforms Field Operations for Success
ServiceNow Field Service Management: Transforms Field Operations for SuccessServiceNow Field Service Management: Transforms Field Operations for Success
ServiceNow Field Service Management: Transforms Field Operations for Success
 
(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...
(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...
(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...
 
Product Catalog Bandung Home Decor Design Furniture
Product Catalog Bandung Home Decor Design FurnitureProduct Catalog Bandung Home Decor Design Furniture
Product Catalog Bandung Home Decor Design Furniture
 

Company profile logikeye.pdf

  • 1. COMPANYPROFILE LOGIK EYE FORENSICS HOUSE 11 (FIRST FLOOR), ROAD -30, SECTOR –7, UTTARA MODEL TOWN, DHAKA-1230 +8801766442199 support@logikeyeforensics.com https://logikeyeforensics.com +8801326249533
  • 2. LogikEye is a comprehensive cyber security solution & services along with infrastructurelevel World Class Solutions and services provider having deep expertise in addressing the most complicated security issues and challenges facing modern enterprises to protect their brand, value and reputation against the ever-evolving threat landscape. LogikEye is a consulting and IT Security & Infrastructure solution/service provider committed to deliver Product/solutions and professional services/ post implementation support to meet the business objectives of our clients utilizing cost effective delivery model over 10 years. LogikEye started its journey in 2006 in Dhaka, Bangladesh. LogikEye also provides advanced cyber security solutions and services that help clients define cyber security strategy, identify and remediate threats and risks, and achieve operational readiness to reduce the risk of targeted attacks and breaches. Our diverse management and advisory team draws upon experience gained globally in working with the world leading software and telecommunication giants as well as military communities. Vision To make IT as an understandable and value adding participator in IT and Non-IT industry. Mission Absolute commitment to the highest obtainable standard of quality service through technology towards humanity. Office : House 11, Road 30 , Sector 07, Uttara Model Town Dhaka 1230. COMPANY OVERVIEW
  • 3. Our founder and Managing Director, Mehedi Hasan, and our Operational Director, Jahedi Arman, are fortunate enough to have illustrious careers in the Cyber Security and digital forensic field in Bangladesh. LogikEye’s success, however, has not been built on their accomplishments but by the many individuals, who over the past 13 years were, and still are, a part of our family — those we call The Superman. The company currently consists of a team of 5 full-time colleagues who have joined LogikEye as experts in their field, or who have shown potential and developed internally to a level where they can stand proudly as a leader and expert in their field. Mehedi Hasan, our MD, established the Computer Crime Investigation Unit and created different types of hardware device for the Bangladesh Law enforcement intelligence in 2013. Mehedi was the chairman of the CCA Foundation Working Party on Cyber Crime from 2013 to till now. He has been the Consultant of the Director GeneralForce of Intelligence Examiner’s Cyber Forensic Forum from 2011 to 2016. He was also aInstructor of the CID on Cyber Security from 2014 to 2015. He was also aInstructor of the ministry of women and childaffairs on Cyber Security from 2014 to 2020. COMPANY BACKGROUND ATLEAST 50% OFTHE WORLDS POPULATION HASACCESSTOTHE INTERNET MILLION EVERYYEARINAFRICATHERE ARE +354MILLIONNEWINTERNET USERS THERE ARE MORE CELLULAR DEVICES THAN PEOPLELIVINGINAFRICA 67%
  • 4. We follow forensically-correct methodologies by making use of internationally accepted hardware, software, and operating procedures, which are aligned with the major law enforcement agencies across the globe. These agencies include the FBI, Scotland Yard, US Secret Service, as well as South Africa's own SAPS and Hawks. By making use of this sophisticated software and the judicially tested procedures, LogikEyeis able to ensure the integrity of all evidence collected, data disseminated, and facts placed in front of a judicial body. We are market leaders in the areas of digital forensic investigations, IT risk management, data recovery,andelectronicdiscovery.SomeofourpersonnelhavebeenacknowledgedbytheHigh Court of SA as expert witnesses in their field and have conducted extensive criminal, civil, and departmental investigations nationally and across Africa. OF DIGITAL CRIMES IN A BUSINESS ARE BEINGCOMMITTEDBYEMPLOYEESORWITH THEIR CO-OPERATION LogikEye maintains cutting edge software and hardware and is equipped to investigate any type of computer, operating system, and application/ program. Each forensic investigator in LogikEye specializes in a selected area of expertise; this ensures that LogikEye can investigate any type of digital transgression. Personnel of LogikEye receive on-going and advanced training to ensure that allmembers adhere to expert requirements. LogikEye has the capacity to handle large cases in arequired time frame. MOBILEFORENSIC SERVICES The advancement of digital technology has made it possible for cell phones to be able to replace computers in just about all functions that werepreviouslyonlypossibleonacumbersomecomputer.Thistechnology has also made cell phones a choice device in cybercrimes as its mobility is an attractive option for illegal and unauthorized activity. LogikEye is a leading service provider of mobile forensic solutions with the capability of fast data extraction from more than 6 000 different mobile phones, Ipads, and tablets. LogikEye has the ability to extract data in a forensically sound manner and present it with the integrity of the data intact ensuring that the evidence will be admissible in court. Our services include conducting data recovery from these devices, mapping movement of devices, extracting call logs, data communication, emails, documents, phone book, pictures, videos, text messages, ESN, and IMEI information. SERVICES 1 DIGITAL FORENSIC SERVICES 2
  • 5. 100001101011001010000010100111001010010010001010010000001010100010010000 1000100010010010100011101001001010101000100000101001100001000000100011001 100010101001110010100110100100101000011010110010100001101011001010000010 CEYBER SECURITYSERVICES Our company is at the forefront of providing robust and comprehensive cybersecurity solutions tailored to safeguard the digital assets and sensitive information of our clients. With the evolving landscape of cyber threats, our team of skilled professionals employs cutting-edge technologies and industry best practices to fortify your organization's defenses. With our unwavering commitment to excellence, we stand as your ally in the ever-evolving battle against cyber adversaries. • Cyber Security audit • Vulnerability Assessment and Penetration Testing (VAPT) • Managed Security Services • Cyber Crime Investigation & consultancy • Cryptography & Network security service • Ethical Hacking and Digital Forensics training ELECTRONIC DISCOVERY Another vital component of our services is electronic logikeyeforensics.com a complex, multi-party litigation; the lab can mine massive amounts of email correspondence and other data to identify evidence that relates to a case. Up to 70% of emails and other documents in computer storage can be duplicated. Our electronic discovery tools can search through the equivalent of several warehouses full of data, remove duplicated emails, and recover requested information that is relevant to an investigation.Alternatively one would have to gothrough lengthy and expensive manual reviews of such transactions and files. CUSTOMIZED SOFTWARE DEVELOPMENT In we specialize in providing cutting-edge customized software development solutions tailored to meet the unique needs of our clients. With a team of highly skilled and experienced developers, we take pride in our ability to transform innovative ideas into robust, scalable, and efficient software applications. • Website design and development • Mobile application development • Customize software development as per customer needs • Support or automate unique business processes • Replaceorhelpconsolidateexistingsolutionsatlowercost 3 4 BY2020OURACCUMULATED DIGITALUNIVERSEOFDATAWILLBE TRILLION GIGS 5
  • 6. DATA RECOVERY Data deleted from a computer is rarely completely lost. We can recover data that has been lost, destroyed, deleted, or corrupted. We work on all types of operating systems. Perpetrators or disgruntled employees often destroy data in order to hide their transgressions, or to render the company unable to use its own data. As part of our services, LogikEye is able to recover this data as well as crack passwords that were forgotten, or have been altered, by employees. These services include: • Data recovery from all operating systems and backups. • Recovery of deleted or destroyed files and corrupt data. • Cracking of passwords and decryption of data. FRAUD TREND AND DATABASE ANALYSIS We take a systematic approach to data analysis that begins with properly locating, scoping, acquiring, testing, and verifying data. Once the data has been verified and moved to a stable platform,weemployavarietyofanalysistoolsandtechniquestoanalyseandcomparethedata. Most of our electronic data analysis focuses on the underlying business transactional data contained in a forensic investigation. Our powerful suite of data analysis tools combines the principles of data matching, pattern recognition, and data forensics with our extensive experience in forensic investigations. With our technology we compare data from many different sources within an organization (general ledger, creditors, debtors and HR) to fraud profiles and externalreferencedatabases.Thisassistsinidentifyingpotentialirregularitiesandrelationshipsthat may indicate fraudulent behavior. DOMAIN HOSTING AND DATA CENTER SERVICEING In the realm of digital infrastructure, our company excels in providing top-tier domain hosting and data center servicing solutions. As a trusted partner in the digital landscape, we understand the critical importance of a reliable and secure hosting environment. • Domainregistrationandwebhostingservice • EmailserverhostingandCloudhosted Emailservice • Implementing,ManagingandMaintainingcustomerDatacenter • Storagebackupanddisasterrecoverysolutions • DesignandimplementationofTier/RatedDataCentre • NetworkmonitoringserviceforISPandCDNhostedservice 6 7 8
  • 7. INFORMATION CONVERSION If you are involved in a complex enquiry, involved in integrated legal notes, or overwhelmed by your own business documents, we can convert large quantities of paper documents into usable electronic data. We scan all types of documents and use Optical Character Recognition (OCR) so that you can effortlessly search and manage information in a usable database. LogikEye will transfer your paper documents into any electronic file format as per your requirements. We use high resolution, high speed scanners which can be at our facility or deployed to your business premises. Documents can be electronically indexed to a rate of near-perfect accuracy for data searches.Ourteamofexperienceddatacapturerscanalsocreateanindexofallscanneddata. We can supply you with an electronic copy of the data which can be ingested into your internal ICT system or we can host it for you in our secure data hosting centre, which allows you secure accesstoyourdataona24/7basisfromanylocationglobally.Ouraimistoprovideyouwiththe ability to access your criticalbusiness information in order to effectively review and manage information. SALES LogikEye has been involved in cyber security and digital forensics for the past 15 years with some of our members having more than 20 years of experience in the field. We have developed a sound knowledge of the software and hardware tools needed to operate one of the Smart digital forensic labs in Bangladesh. By using cutting-edge technology, for which we are also resellers in the region, we can apply our knowledge to the advantage of our clients. This cutting- edge technology includes the following Spying and forensic tools:  GSM Voice Spy  Smart GSM security system  Anti-voice recording system  Spy Show  Spy camera  Spy recorder  Cyber security training and workshop  Wall Listener Device  Android Spying tools  Ant Spyware tools  Antivirus LogikEye has also developed an advanced scene kit to assist first responderstoeffectivelyandsecurely collect digital evidence on scenes: 9 10
  • 8. A Cyber Forensic Expert’s true value is not only measured by his ability to locate some digital evidence but more so in his ability to successfully locate all the evidence, place the evidence in context for the investigator, relay findings in an expert report and successfully testify as an expert witness on any level of judicial proceeding, The expert status of a person is measured by his qualifications, experience, lecturing and work published, capacity and infrastructure, affiliation, and accreditation. Measured against these standards, LogikEye is found to be a true market leader even when compared with large international legal and auditing firms. PILLARS OF EXCELLENCE EXPERIENCE QUALIFICATIONS CAPACITY LECTURING RISKMANAGEMENT One of our strong points is the impressive trial record of our Digital Forensic Experts who have specialized in presenting digital evidence in departmental hearings, arbitrations, civil- and criminal courts, over the past 10 years. These experts are internationally qualified in their fields, conduct continuoustrainingandaccreditation,conductresearchintheirfield,publishacademicworksand subject articles, and regularly lecture in their field of expertise. INVESTIGATIONFOOTPRINT CYANRE HAS CONDUCTED INVESTIGATIONS SUCCESSFULLY IN MORE THAN COUNTRIES WHATSETSUSAPART
  • 9. DATASECURITY LogikEye the Digital Forensic Lab, is committed to protect the privacy of all its clients and partners as well as any data submitted to us, not only that which may contain the personal and/or private information of third parties, but all information placed in our care. All contracts with clients and partners contain non- disclosure agreements. Data remains the property of the client and retained and/or destroyed as per instruction from the owner of the data. All employee contracts as well as sub-contractors’ contracts contain a strict confidentiality clause which also states the proprietary rIghts of the employer, as well as the return of all data and/or information in their possession. Staff only utilize laptops and external storage devices owned by LogikEye: all content remains the property of LogikEye. Prior to any staff member exiting the services of LogikEye, all hardware and software is collected and backed up in an encrypted format should any legal action follow. No staff member may retain any LogikEye related data, forms etc. The staff are subject to a strict Human Resource Policy. The company has a separate Communication Policy to maintain and manage all computer related data and communication, as well as protect the information held by the Company and utilized by employees and sub-contractors. Prior to accepting an assignment, LogikEye obtains confirmation and a written undertaking from clients stating that they are authorized to hand over data/information or hardware as the case may be. LogikEye, as a computer forensic firm, collects data in a forensic format which immediately renders it. Our secure data center is remotely monitored 24/7, covered by infrared cameras, and is kept inside a digital access controlled walk in safe. DATATHEFT: BANGLADESHI POLICE SERVICE Cyber-crime is a growing international phenomenon which poses significant threats to national and financial security, and to the integrity of data and information globally. The absence of a clear policy as well as a lack of institutionalised mechanisms to facilitate a coordinated approach to combat cyber-crime remains a key risk factor. Cyber security has beenprioritisedbyGovernmentwithinOutput7:“SecureCyberSpace”oftheJCPSDeliveryAgreement;withafocuson the establishment of a coherent and integrated cyber security approach. The Cluster will invest in research in order to understand the nature of cyber-crime and its impact on the economic and technological development of the country. In line with this, a comprehensive cyber threat assessment will be done in order to determine cyber security baselines, as well as the skills development requirements of cyber-crime investigators. -AnnualPerformanceplan 2024