slaider
Product catalog:

The best solution in the field
protection of information

slaider
Information Security

The best solution in the
protection of information

slaider
Communication network

The best solution in the
protection of information

slaider
Monitoring cyberspace
early warning

The best solution in the
protection of information

slaider
Integrated information system

The best solution in the
protection of information

slaider
Mobile phone monitoring
and the positioning system

The best solution in the
protection of information

slaider
Radio Frequency Detector
and an interference generator

The best solution in the
protection of information

» Catalog
All products
Information Security
Communication network
Monitoring cyberspace early warning
Integrated information system
Mobile phone monitoring   and the positioning system
Radio Frequency Detector   and an interference generator
Digital forensics
All-in-one Face RECOGNITION SYSTEM

All-In-One Portable Face Recognition System is a high-precision, real-time, dynamic face recognition system, which can work all the time and be quickly deployed. This system is based on the world’s leading intelligent face recognition algorithm and is designed and optimized by our artificial intelligence hardware design team. This system is a high-performance and high-precision active intelligent mobile monitoring device.

All-in-one Face RECOGNITION SYSTEM
Write the E-Mail, we will contact you within days.



3D-based Panoramic Video Surveillance System

Integrated with digital geometry technology, information visualization, video fusion and large scale data concurrent processing, the system will construct a creative 3D-based video surveillance platform, to provide intelligent visualized tool for command/control and decision-making.

3D-based Panoramic Video Surveillance System
Write the E-Mail, we will contact you within days.



Handheld

Handheld Anti-UAV Device is a professional control device transmitting high-intensity electromagnetic waves to interfere with all kinds of small and medium-sized commercial UAVs’ flight control systems and satellite positioning systems to invalidate them. Through reasonable operations, it can let the controlled UAV loss of control, turn back, to be drove away, forced to land or crash.

Handheld
Write the E-Mail, we will contact you within days.



Data Recovery System

Data recovery system is a forensic data recovery tool which can help you acquire and recover data from
both good and damaged storage media like HDD simply and easily. Having integrated with main functions
as disk diagnostics, disk imaging, file recovery, file carving, firmware recovery, reporting, write protection
and hash calculation, more functional features as fragment recovery. Data recovery system can generate
and output detailed reports so that the investigation process can be clearly documented.

Data Recovery System
Write the E-Mail, we will contact you within days.



GSM PASSIVE INTERCEPTION SYSTEM

The device is a multi-band fully passive GSM interception system. It is designed to record the entire traffic occurring between Base Transmitting Stations (BTS) and Mobile Stations (MS) located within the system’s operational range. This means tens or even hundreds of simultaneous calls. The device allows user to scan, analyze, intercept, monitor or record short messages and phone calls from GSM mobiles, regardless of whether they are encrypted by A5/1 or A5/2 algorithm or not.

GSM PASSIVE INTERCEPTION SYSTEM
Write the E-Mail, we will contact you within days.



Video Forensics System

Video Forensics System (hereinafter as VFS) is a forensically sound system for video extraction, recovery and analysis. Through VFS, it helps clarify the visual evidence and restore the truth rapidly.

Video Forensics System
Write the E-Mail, we will contact you within days.



Mobile Forensics System

MFS (Mobile Forensic System) is a new integrated, comprehensive solution for data acquiring, recovering and analysis of mobile phones. With high performance devices and sufficient accessories, you can use MFS to accomplish forensics works in fields or labs. Moreover, it is fast, portable, intuitive. MFS is a trustworthy platform for law enforcement agencies, military, intelligence agencies and e-discovery investigators all over the world.

Mobile Forensics System
Write the E-Mail, we will contact you within days.



Digital Forensics Lab

Digital Forensics Lab (DFL) is where forensic personnel conduct inspected material acceptance, evidence acquisition, forensic analysis, and finally uncover digital evidence and provide a court-admitted report.
Our proven DFL is built for deep-level digital forensics investigation, with powerful processing, standard workflows, professional reports, and evidence integrity assurance. It empowers you to perform forensics through mountain of data, handle various data types and process multiple cases simultaneously, all within a stable and collaborative environment.

Digital Forensics Lab
Write the E-Mail, we will contact you within days.



Computer Forensics System

CFS (Computer Forensic System) is an integrated and comprehensive solution for computer forensics. With high performance devices and sufficient accessories, you can use CFS on the field or in a lab. Moreover, it is fast, portable and intuitive. CFS is a trusted platform for law enforcement agencies, military, intelligence agencies and e-discovery investigators all over the world.

Computer Forensics System
Write the E-Mail, we will contact you within days.



Vulnerability Management System

Vulnerability management system is capable of detecting all vulnerability risks in the network, providing professional and effective security analysis and repair advice, and auditing repair result according to security management process so as to reduce attack influence to the largest extent.

 

Vulnerability Management System
Write the E-Mail, we will contact you within days.



Penetration Test System

Automatic penetration test system focuses on automatic simulation of hacker penetration and integrates functions modules such as automatic penetration, vulnerability verification and social engineering. It is used for red team to test defense result of security system and for improving employees’ security awareness.

 

Penetration Test System
Write the E-Mail, we will contact you within days.



Next Generation Firewall

Privis firewall is independent designed next generation firewall which provides comprehensive security protection from layer 2 to layer 7 for the mobile Internet era. Privis firewall can achieve in – depth analysis of users, applications and content to provide users high performance, visualization, accurate and effective integration of application layer security protection system.

 

Next Generation Firewall
Write the E-Mail, we will contact you within days.



Privis 3.1 Cloud Key

A NIST/CSE certified hardware based cryptographic offload engine that deploys the latest USB 3.1 10Gbps speed with AES ECB or CBC 256-bit strength.
Allow user to encrypt data in place by selecting target file/folder on any host computer detectable storage drives, including those cloud drives.
You own the physical key and no one else has it.

Privis 3.1 Cloud Key
Write the E-Mail, we will contact you within days.



USB Encryptor 2.0

USB pass-through dongle with AES 256-bit hardware encryption.   The Privis USB Encryptor is a USB ciphering dongle that transparently encrypts data stored inside any USB drive including Blu-Ray DVD, DVD R/W, CD-R, thumb drive, hard disk or any flash card inserted into a USB card reader. Installation is easy. Simply insert the USB drive […]

USB Encryptor 2.0
Write the E-Mail, we will contact you within days.



Cryptophone

Smartphone with Security Applications Installed SecCall are application that realize secure VOIP voice and secure IM communications respectively. Smartphone installed thet application together with TF crypto card fulfill these secure service. SecCall is the application for secure packet domain calls and is the application for instant messaging including text, voice-text and pictures.

Cryptophone
Write the E-Mail, we will contact you within days.



SIP-based VoIP Security System

Developed by Privis under its sole intellectual property, SIP-based VoIP Security System provides end-to-end encryption services to SIP-based VoIP system. Attaching it to soft switch / IMS network without any changes to network topology and communications infrastructure, it offers systematic, high-strength, and high-quality VoIP secure communication solutions. 

SIP-based VoIP Security System
Write the E-Mail, we will contact you within days.



Secure Walkie-talkie

Secure Walkie-talkie provides a convenient and secure way for voice communication. Its high-strength crypto algorithm defends against any malicious eavesdropping. It is an ideal communication device for government, military, and data-sensitive agencies.

Secure Walkie-talkie
Write the E-Mail, we will contact you within days.



SEC-34 IP Encryptor (VPN)

VPN encryptor adopts self-designed security operating system and provides comprehensive security functions to meet data security protection needs in various network environments.
Besides data encryption, VPN encryptor can also provide some traditional security functions such as packet filtering, DDOS anti-attack, anti-virus and hot standby etc.

SEC-34 IP Encryptor (VPN)
Write the E-Mail, we will contact you within days.



SEC-33 Tel/Fax Encryptor

SEC-33 Tel/Fax Encryptor applies to various public or private phone networks like PSTN, emergency satellite communication system etc. to make end-to-end encryption for client important phone call and fax information. The encryptor guarantees data security while in transmission line, thus effectively prevents clients’ sensitive information from being intercepted through transmission line.

SEC-33 Tel/Fax Encryptor
Write the E-Mail, we will contact you within days.



SEC-30 Link Encryptor

Since it is rather easy for the adversaries to intercept signal of microwave, troposcatter and satellite communications, measures have to be taken to preserve the confidentiality of the data being transmitted. The most effective way to protect data confidentiality is to have it encrypted before transmission.

SEC-30 Link Encryptor
Write the E-Mail, we will contact you within days.



Secure VoIP and IM Communication System

Without any changes to network topology (IMS/soft switch) and communication infrastructure, it provides VoIP service with secure encryption protection, and seamlessly integrates with 3G, 4G IP mobile terminals. A SIP-based VoIP security system is built.

Secure VoIP and IM Communication System
Write the E-Mail, we will contact you within days.



Cryptophone

Smartphone with Security Applications Installed SecCall are application that realize secure VOIP voice and secure IM communications respectively. Smartphone installed thet application together with TF crypto card fulfill these secure service. SecCall is the application for secure packet domain calls and is the application for instant messaging including text, voice-text and pictures.

Cryptophone
Write the E-Mail, we will contact you within days.



SIP-based VoIP Security System

Developed by Privis under its sole intellectual property, SIP-based VoIP Security System provides end-to-end encryption services to SIP-based VoIP system. Attaching it to soft switch / IMS network without any changes to network topology and communications infrastructure, it offers systematic, high-strength, and high-quality VoIP secure communication solutions. 

SIP-based VoIP Security System
Write the E-Mail, we will contact you within days.



Secure Walkie-talkie

Secure Walkie-talkie provides a convenient and secure way for voice communication. Its high-strength crypto algorithm defends against any malicious eavesdropping. It is an ideal communication device for government, military, and data-sensitive agencies.

Secure Walkie-talkie
Write the E-Mail, we will contact you within days.



SEC-34 IP Encryptor (VPN)

VPN encryptor adopts self-designed security operating system and provides comprehensive security functions to meet data security protection needs in various network environments.
Besides data encryption, VPN encryptor can also provide some traditional security functions such as packet filtering, DDOS anti-attack, anti-virus and hot standby etc.

SEC-34 IP Encryptor (VPN)
Write the E-Mail, we will contact you within days.



SEC-33 Tel/Fax Encryptor

SEC-33 Tel/Fax Encryptor applies to various public or private phone networks like PSTN, emergency satellite communication system etc. to make end-to-end encryption for client important phone call and fax information. The encryptor guarantees data security while in transmission line, thus effectively prevents clients’ sensitive information from being intercepted through transmission line.

SEC-33 Tel/Fax Encryptor
Write the E-Mail, we will contact you within days.



SEC-30 Link Encryptor

Since it is rather easy for the adversaries to intercept signal of microwave, troposcatter and satellite communications, measures have to be taken to preserve the confidentiality of the data being transmitted. The most effective way to protect data confidentiality is to have it encrypted before transmission.

SEC-30 Link Encryptor
Write the E-Mail, we will contact you within days.



Vulnerability Management System

Vulnerability management system is capable of detecting all vulnerability risks in the network, providing professional and effective security analysis and repair advice, and auditing repair result according to security management process so as to reduce attack influence to the largest extent.

 

Vulnerability Management System
Write the E-Mail, we will contact you within days.



Penetration Test System

Automatic penetration test system focuses on automatic simulation of hacker penetration and integrates functions modules such as automatic penetration, vulnerability verification and social engineering. It is used for red team to test defense result of security system and for improving employees’ security awareness.

 

Penetration Test System
Write the E-Mail, we will contact you within days.



Next Generation Firewall

Privis firewall is independent designed next generation firewall which provides comprehensive security protection from layer 2 to layer 7 for the mobile Internet era. Privis firewall can achieve in – depth analysis of users, applications and content to provide users high performance, visualization, accurate and effective integration of application layer security protection system.

 

Next Generation Firewall
Write the E-Mail, we will contact you within days.



CyberInsight Radar System

CCSC system which could detect the Internet and business intranet. It can collect information of the network assets, equipments activities, geographical location, organization, service providers and other basic information. It could also recognize equipment type, equipment brand, equipment model, equipment versions, open ports, provision of services and usage of components.

 

CyberInsight Radar System
Write the E-Mail, we will contact you within days.



WebSOC Website Multi-demensional Monitoring System
Write the E-Mail, we will contact you within days.



APT Advanced Persistent Threat Detection System
Write the E-Mail, we will contact you within days.



All-in-one Face RECOGNITION SYSTEM

All-In-One Portable Face Recognition System is a high-precision, real-time, dynamic face recognition system, which can work all the time and be quickly deployed. This system is based on the world’s leading intelligent face recognition algorithm and is designed and optimized by our artificial intelligence hardware design team. This system is a high-performance and high-precision active intelligent mobile monitoring device.

All-in-one Face RECOGNITION SYSTEM
Write the E-Mail, we will contact you within days.



3D-based Panoramic Video Surveillance System

Integrated with digital geometry technology, information visualization, video fusion and large scale data concurrent processing, the system will construct a creative 3D-based video surveillance platform, to provide intelligent visualized tool for command/control and decision-making.

3D-based Panoramic Video Surveillance System
Write the E-Mail, we will contact you within days.



Data Recovery System

Data recovery system is a forensic data recovery tool which can help you acquire and recover data from
both good and damaged storage media like HDD simply and easily. Having integrated with main functions
as disk diagnostics, disk imaging, file recovery, file carving, firmware recovery, reporting, write protection
and hash calculation, more functional features as fragment recovery. Data recovery system can generate
and output detailed reports so that the investigation process can be clearly documented.

Data Recovery System
Write the E-Mail, we will contact you within days.



GSM PASSIVE INTERCEPTION SYSTEM

The device is a multi-band fully passive GSM interception system. It is designed to record the entire traffic occurring between Base Transmitting Stations (BTS) and Mobile Stations (MS) located within the system’s operational range. This means tens or even hundreds of simultaneous calls. The device allows user to scan, analyze, intercept, monitor or record short messages and phone calls from GSM mobiles, regardless of whether they are encrypted by A5/1 or A5/2 algorithm or not.

GSM PASSIVE INTERCEPTION SYSTEM
Write the E-Mail, we will contact you within days.



Handheld

Handheld Anti-UAV Device is a professional control device transmitting high-intensity electromagnetic waves to interfere with all kinds of small and medium-sized commercial UAVs’ flight control systems and satellite positioning systems to invalidate them. Through reasonable operations, it can let the controlled UAV loss of control, turn back, to be drove away, forced to land or crash.

Handheld
Write the E-Mail, we will contact you within days.



Waterproof high power jamming system

This jamming system can be deployed in large sensitive locations such as military or governmental compounds. It can also be used in Oil and Gas Storage Facilities and fields, Security Services, Military Units, Secret Services, Museums, Border Patrol and Drug Enforcement, Customs, etc.

Waterproof high power jamming system
Write the E-Mail, we will contact you within days.



High-Power portable DDS multi-band jamming system

DJ3500, full portable multi band DDS Jamming system, is designed with a ruggedized trolley type case ,light weight, high mobility and reliance. This device is configured with 5 different jamming modules. The jamming frequency can be more than 10 Bands. Jamming frequency module can be up to 250-300watt output power.

High-Power portable DDS multi-band jamming system
Write the E-Mail, we will contact you within days.



High-Power manpackmulti – band Jamming system

Privis solutions—DJ2500, High Power Frequency Scan Convoy Jamming System, implementing the most effective and reliable RF jamming technology and equipped with a fully-integrated broadband jamming system. DJ2500 is highly portable and light weight. Easy for back pack. It plays an important role to use the heavily loaded vehicle and trolley-type devices in some extreme hard situation.

High-Power manpackmulti – band Jamming system
Write the E-Mail, we will contact you within days.



High Power Handheld Signal Jammer

Police, Bomb disposal squads, VIP protection, Special Police (S.W.A.T), military security forces, bomb squads, anti-terror units, anti-drug units, Border control units, checkpoint personnel, Meeting room, Hospitals, Banks, Churches, Conference Rooms, Classrooms and so on, such types of law enforcement personnel who benefit greatly from the deployment of any of these best-in-class portable RF jamming solutions.

High Power Handheld Signal Jammer
Write the E-Mail, we will contact you within days.



Photo-frame style signal jammer

This photo-frame style jammer is designed mainly used for indoor cellphone signal shielding, such as meeting rooms, border control units, Border Patrol and Drug Enforcement, Customs, House, Churches, Courts, Theaters, Office, classroom, checkpoint personnel, Hospitals, Recording Studios, Banks, Contract Tendering Rooms, Testing Facilities, Security Services, Military Units, Secret Services, News Conference Scene, Libraries, Museums, Prisons and so on.

Photo-frame style signal jammer
Write the E-Mail, we will contact you within days.



Write the E-Mail, we will contact you within days.