{"id":3008,"date":"2023-03-31T17:36:03","date_gmt":"2023-03-31T10:36:03","guid":{"rendered":"https:\/\/htiservices.vn\/?post_type=portfolio&#038;p=3008\/"},"modified":"2023-04-05T11:01:24","modified_gmt":"2023-04-05T04:01:24","slug":"digital-forensic-solutions-qator-series-ijb","status":"publish","type":"portfolio","link":"https:\/\/htiservices.vn\/en\/dich-vu\/digital-forensic-solutions-qator-series-ijb\/","title":{"rendered":"Digital forensic solutions Qator Series- IJB"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row wrap_container=&#8221;yes&#8221; el_class=&#8221;dvu01&#8243;][vc_column][vc_column_text css_animation=&#8221;fadeInUp&#8221; el_class=&#8221;tieude-left&#8221;]<\/p>\n<p style=\"text-align: justify;\">Dealing with internal data leaks or information breaches will be easier and faster when the business is proactive. Understanding this urgent need, HTI Services is pleased to bring Qator Series software solutions from the IJB Group &#8211; Korea&#8217;s leading corporation providing digital forensic solutions for digital investigation, internal audit and information security.<\/p>\n<figure id=\"attachment_2874\" aria-describedby=\"caption-attachment-2874\" style=\"width: 800px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2874\" src=\"https:\/\/htiservices.vn\/wp-content\/uploads\/2023\/02\/qator-series-1-300x195.png\" alt=\"qator series\" width=\"800\" height=\"521\" srcset=\"https:\/\/htiservices.vn\/wp-content\/uploads\/2023\/02\/qator-series-1-768x500.png 768w, https:\/\/htiservices.vn\/wp-content\/uploads\/2023\/02\/qator-series-1-640x417.png 640w, https:\/\/htiservices.vn\/wp-content\/uploads\/2023\/02\/qator-series-1-400x260.png 400w, https:\/\/htiservices.vn\/wp-content\/uploads\/2023\/02\/qator-series-1-367x239.png 367w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><figcaption id=\"caption-attachment-2874\" class=\"wp-caption-text\">Qator Series \u2013 Digital Forensic Cyber Security Solutions<\/figcaption><\/figure>\n<p style=\"text-align: justify;\">Founded in 2009, IJB Group operates and researches in the field of digital forensics, offering a diverse portfolio of comprehensive digital forensic solutions such as: Mobile Forensics, Corporate Audit, e-Discovery, Privacy Protection and Digital Analysis solutions. IJB Group\u2019s products have been used in Korean government agencies and large corporations such as Samsung, Hyundai, Kia, SK, CJ, &#8230;<\/p>\n<p style=\"text-align: justify;\">Developed by a team with more than 10 years of experience in the forensic field, the Qator Series software solutions are considered to go beyond the limits of traditional digital forensic solutions. Not only recognized in Korea, IJB is also very well received in Japan when it entered this market in 2012.<\/p>\n<p style=\"text-align: justify;\">From December 2022, HTI Group and IJB Group have officially signed an exclusive distribution contract. Arcording that, HTI Group is the exclusive distribtor of IJB\u2019s products in Vietnam market.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;2900&#8243; img_size=&#8221;800&#215;600&#8243; onclick=&#8221;custom_link&#8221; link=&#8221;https:\/\/htiservices.vn\/en\/qator-enterprise-investigative-solutions-for-internal-data-breaches\/&#8221; label=&#8221;&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"porto-sicon-box  wpb_custom_1efe903570d178ff0a9b7bfa5febd3a4 style_1 default-icon flex-wrap\"><div class=\"porto-sicon-default\"><div id=\"porto-icon-142295402869d470f767c89\" class=\"porto-just-icon-wrapper porto-sicon-img\" style=\"font-size: 48px;\"><img loading=\"lazy\" decoding=\"async\" class=\"img-icon\" alt=\"\" src=\"https:\/\/htiservices.vn\/wp-content\/uploads\/2023\/02\/qatorenterprise-tach-nen.png\" width=\"2000\" height=\"2000\" \/><\/div><\/div><div class=\"porto-sicon-header\"><a class=\"porto-sicon-box-link\" href=\"https:\/\/htiservices.vn\/en\/qator-enterprise-investigative-solutions-for-internal-data-breaches\/\"><h3 class=\"porto-sicon-title\" style=\"\">Qator Enterprise<\/h3><\/a><\/div> <!-- header --><div class=\"porto-sicon-description\" style=\"\">\n<p style=\"text-align: justify;\">A forensic analysis program for effective investigation of cyber security incidents.<\/p>\n<p><a href=\"https:\/\/htiservices.vn\/en\/qator-enterprise-investigative-solutions-for-internal-data-breaches\/\">See more<\/a><\/div> <!-- description --><\/div><!-- porto-sicon-box -->[\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;]<div class=\"porto-sicon-box  wpb_custom_1efe903570d178ff0a9b7bfa5febd3a4 style_1 default-icon flex-wrap\"><div class=\"porto-sicon-default\"><div id=\"porto-icon-184979322769d470f767f82\" class=\"porto-just-icon-wrapper porto-sicon-img\" style=\"font-size: 48px;\"><img loading=\"lazy\" decoding=\"async\" class=\"img-icon\" alt=\"\" src=\"https:\/\/htiservices.vn\/wp-content\/uploads\/2023\/02\/qatorlive-tach-nen.png\" width=\"2000\" height=\"2000\" \/><\/div><\/div><div class=\"porto-sicon-header\"><a class=\"porto-sicon-box-link\" href=\"https:\/\/htiservices.vn\/en\/qator-live-a-system-that-can-perform-rapid-analysis-at-the-site-of-investigation\/\"><h3 class=\"porto-sicon-title\" style=\"\">Qator Live<\/h3><\/a><\/div> <!-- header --><div class=\"porto-sicon-description\" style=\"\">\n<p style=\"text-align: justify;\">Supports rapid, automated forensic investigation of on-site devices.<\/p>\n<p><a href=\"https:\/\/htiservices.vn\/en\/qator-live-a-system-that-can-perform-rapid-analysis-at-the-site-of-investigation\/\">See more<\/a><\/div> <!-- description --><\/div><!-- porto-sicon-box -->[\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;2901&#8243; img_size=&#8221;800&#215;600&#8243; onclick=&#8221;custom_link&#8221; link=&#8221;https:\/\/htiservices.vn\/en\/qator-live-a-system-that-can-perform-rapid-analysis-at-the-site-of-investigation\/&#8221; label=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;2903&#8243; img_size=&#8221;800&#215;600&#8243; onclick=&#8221;custom_link&#8221; link=&#8221;https:\/\/htiservices.vn\/en\/qator-forensic-a-powerful-forensic-analysis-program\/&#8221; label=&#8221;&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"porto-sicon-box  wpb_custom_1efe903570d178ff0a9b7bfa5febd3a4 style_1 default-icon flex-wrap\"><div class=\"porto-sicon-default\"><div id=\"porto-icon-209747180569d470f768206\" class=\"porto-just-icon-wrapper porto-sicon-img\" style=\"font-size: 48px;\"><img loading=\"lazy\" decoding=\"async\" class=\"img-icon\" alt=\"\" src=\"https:\/\/htiservices.vn\/wp-content\/uploads\/2023\/02\/qatorforensic-tach-nen.png\" width=\"2000\" height=\"2000\" \/><\/div><\/div><div class=\"porto-sicon-header\"><a class=\"porto-sicon-box-link\" href=\"https:\/\/htiservices.vn\/en\/qator-forensic-a-powerful-forensic-analysis-program\/\"><h3 class=\"porto-sicon-title\" style=\"\">Qator Forensic<\/h3><\/a><\/div> <!-- header --><div class=\"porto-sicon-description\" style=\"\">\n<p style=\"text-align: justify;\">Convenient, straightforward investigation supported by automated analysis and various operating system artifacts.<\/p>\n<p><a href=\"https:\/\/htiservices.vn\/en\/qator-forensic-a-powerful-forensic-analysis-program\/\">See more<\/a><\/div> <!-- description --><\/div><!-- porto-sicon-box -->[\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space height=&#8221;100&#8243;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row wrap_container=&#8221;yes&#8221; el_class=&#8221;dvu01&#8243;][vc_column][vc_column_text css_animation=&#8221;fadeInUp&#8221; el_class=&#8221;tieude-left&#8221;] Dealing with internal data leaks or information breaches will be easier and faster when the business is proactive. Understanding this urgent need, HTI Services is pleased to bring Qator Series software solutions from the IJB Group &#8211; Korea&#8217;s leading corporation providing digital forensic solutions for digital investigation, internal audit and [&hellip;]<\/p>\n","protected":false},"featured_media":2071,"template":"","meta":{"inline_featured_image":false,"footnotes":""},"portfolio_cat":[321],"portfolio_skills":[656,655,654,653],"class_list":["post-3008","portfolio","type-portfolio","status-publish","has-post-thumbnail","hentry","portfolio_cat-dich-vu-en","portfolio_skills-digital-forensic","portfolio_skills-digital-forensic-solutions","portfolio_skills-ijb","portfolio_skills-qator-enterprise-ijb"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Digital forensic solutions Qator Series- IJB - htiservices.vn<\/title>\n<meta name=\"description\" content=\"Investigate and analyze malware that may threaten system security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/htiservices.vn\/en\/dich-vu\/digital-forensic-solutions-qator-series-ijb\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital forensic solutions Qator Series- IJB - htiservices.vn\" \/>\n<meta property=\"og:description\" content=\"Investigate and analyze malware that may threaten system security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/htiservices.vn\/en\/dich-vu\/digital-forensic-solutions-qator-series-ijb\/\" \/>\n<meta property=\"og:site_name\" content=\"htiservices.vn\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-05T04:01:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/htiservices.vn\/wp-content\/uploads\/2022\/08\/data-breach.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"802\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/htiservices.vn\\\/en\\\/dich-vu\\\/digital-forensic-solutions-qator-series-ijb\\\/\",\"url\":\"https:\\\/\\\/htiservices.vn\\\/en\\\/dich-vu\\\/digital-forensic-solutions-qator-series-ijb\\\/\",\"name\":\"Digital forensic solutions Qator Series- IJB - htiservices.vn\",\"isPartOf\":{\"@id\":\"\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/htiservices.vn\\\/en\\\/dich-vu\\\/digital-forensic-solutions-qator-series-ijb\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/htiservices.vn\\\/en\\\/dich-vu\\\/digital-forensic-solutions-qator-series-ijb\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/htiservices.vn\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/data-breach.webp\",\"datePublished\":\"2023-03-31T10:36:03+00:00\",\"dateModified\":\"2023-04-05T04:01:24+00:00\",\"description\":\"Investigate and analyze malware that may threaten system security.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/htiservices.vn\\\/en\\\/dich-vu\\\/digital-forensic-solutions-qator-series-ijb\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/htiservices.vn\\\/en\\\/dich-vu\\\/digital-forensic-solutions-qator-series-ijb\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/htiservices.vn\\\/en\\\/dich-vu\\\/digital-forensic-solutions-qator-series-ijb\\\/#primaryimage\",\"url\":\"https:\\\/\\\/htiservices.vn\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/data-breach.webp\",\"contentUrl\":\"https:\\\/\\\/htiservices.vn\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/data-breach.webp\",\"width\":1200,\"height\":802,\"caption\":\"\u0111i\u1ec1u tra n\u1ed9i b\u1ed9 v\u1ec1 r\u00f2 r\u1ec9 d\u1eef li\u1ec7u\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/htiservices.vn\\\/en\\\/dich-vu\\\/digital-forensic-solutions-qator-series-ijb\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Trang ch\u1ee7\",\"item\":\"https:\\\/\\\/htiservices.vn\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Digital forensic solutions Qator Series- IJB\"}]},{\"@type\":\"WebSite\",\"@id\":\"\\\/#website\",\"url\":\"\\\/\",\"name\":\"HTI Services\",\"description\":\"htiservices.vn\",\"publisher\":{\"@id\":\"\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"\\\/#organization\",\"name\":\"HTI Services\",\"url\":\"\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/htiservices.vn\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/logo-1.svg\",\"contentUrl\":\"https:\\\/\\\/htiservices.vn\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/logo-1.svg\",\"width\":110,\"height\":48,\"caption\":\"HTI Services\"},\"image\":{\"@id\":\"\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Digital forensic solutions Qator Series- IJB - htiservices.vn","description":"Investigate and analyze malware that may threaten system security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/htiservices.vn\/en\/dich-vu\/digital-forensic-solutions-qator-series-ijb\/","og_locale":"en_US","og_type":"article","og_title":"Digital forensic solutions Qator Series- IJB - htiservices.vn","og_description":"Investigate and analyze malware that may threaten system security.","og_url":"https:\/\/htiservices.vn\/en\/dich-vu\/digital-forensic-solutions-qator-series-ijb\/","og_site_name":"htiservices.vn","article_modified_time":"2023-04-05T04:01:24+00:00","og_image":[{"width":1200,"height":802,"url":"https:\/\/htiservices.vn\/wp-content\/uploads\/2022\/08\/data-breach.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/htiservices.vn\/en\/dich-vu\/digital-forensic-solutions-qator-series-ijb\/","url":"https:\/\/htiservices.vn\/en\/dich-vu\/digital-forensic-solutions-qator-series-ijb\/","name":"Digital forensic solutions Qator Series- IJB - htiservices.vn","isPartOf":{"@id":"\/#website"},"primaryImageOfPage":{"@id":"https:\/\/htiservices.vn\/en\/dich-vu\/digital-forensic-solutions-qator-series-ijb\/#primaryimage"},"image":{"@id":"https:\/\/htiservices.vn\/en\/dich-vu\/digital-forensic-solutions-qator-series-ijb\/#primaryimage"},"thumbnailUrl":"https:\/\/htiservices.vn\/wp-content\/uploads\/2022\/08\/data-breach.webp","datePublished":"2023-03-31T10:36:03+00:00","dateModified":"2023-04-05T04:01:24+00:00","description":"Investigate and analyze malware that may threaten system security.","breadcrumb":{"@id":"https:\/\/htiservices.vn\/en\/dich-vu\/digital-forensic-solutions-qator-series-ijb\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/htiservices.vn\/en\/dich-vu\/digital-forensic-solutions-qator-series-ijb\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/htiservices.vn\/en\/dich-vu\/digital-forensic-solutions-qator-series-ijb\/#primaryimage","url":"https:\/\/htiservices.vn\/wp-content\/uploads\/2022\/08\/data-breach.webp","contentUrl":"https:\/\/htiservices.vn\/wp-content\/uploads\/2022\/08\/data-breach.webp","width":1200,"height":802,"caption":"\u0111i\u1ec1u tra n\u1ed9i b\u1ed9 v\u1ec1 r\u00f2 r\u1ec9 d\u1eef li\u1ec7u"},{"@type":"BreadcrumbList","@id":"https:\/\/htiservices.vn\/en\/dich-vu\/digital-forensic-solutions-qator-series-ijb\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Trang ch\u1ee7","item":"https:\/\/htiservices.vn\/en\/"},{"@type":"ListItem","position":2,"name":"Digital forensic solutions Qator Series- IJB"}]},{"@type":"WebSite","@id":"\/#website","url":"\/","name":"HTI Services","description":"htiservices.vn","publisher":{"@id":"\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"\/#organization","name":"HTI Services","url":"\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"\/#\/schema\/logo\/image\/","url":"https:\/\/htiservices.vn\/wp-content\/uploads\/2022\/07\/logo-1.svg","contentUrl":"https:\/\/htiservices.vn\/wp-content\/uploads\/2022\/07\/logo-1.svg","width":110,"height":48,"caption":"HTI Services"},"image":{"@id":"\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/htiservices.vn\/en\/wp-json\/wp\/v2\/portfolio\/3008","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/htiservices.vn\/en\/wp-json\/wp\/v2\/portfolio"}],"about":[{"href":"https:\/\/htiservices.vn\/en\/wp-json\/wp\/v2\/types\/portfolio"}],"version-history":[{"count":0,"href":"https:\/\/htiservices.vn\/en\/wp-json\/wp\/v2\/portfolio\/3008\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/htiservices.vn\/en\/wp-json\/wp\/v2\/media\/2071"}],"wp:attachment":[{"href":"https:\/\/htiservices.vn\/en\/wp-json\/wp\/v2\/media?parent=3008"}],"wp:term":[{"taxonomy":"portfolio_cat","embeddable":true,"href":"https:\/\/htiservices.vn\/en\/wp-json\/wp\/v2\/portfolio_cat?post=3008"},{"taxonomy":"portfolio_skills","embeddable":true,"href":"https:\/\/htiservices.vn\/en\/wp-json\/wp\/v2\/portfolio_skills?post=3008"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}