Fred Intelligence Limited
Company Name Fred Intelligence Limited
BASIS Membership No. A497
Short Profile
Fred Intelligence Bangladesh is primarily IT, Intellectual Software & IT Security Company, started its journey since 2014.
Fred Intelligence Bangladesh is a leading IT security consulting services provider. Fred’s goal is to help enterprises design and incorporate security into their IT infrastructure in a manner which supports the enterprises business strategy.
Fred delivers IT security excellence through operational technological systems and information systems security solutions by planning, accompanying and testing information and telecommunication systems which address the security requirements of companies today as well as the changing needs of tomorrow.
Our State of the art information security services are delivered to customers nationwide. Our multidisciplinary experienced team is based on a holistic approach which enables companies to effectively reduce risks and losses related to the confidentiality, availability and reliability of their information assets.
Success Story
Anti Apt Solution, Sandbox, Network IPS, Encryption Solution
ATM POS Server Machines Security & Data Destruction solution (Software Sanitization) Before Disposal.
Year of establishment January 2014
Address Plot# Dcc Kha-56, Amena Tower, Level-4, Shahjadpur, Gulshan-2, Dhaka - 1212
Contact No. Phone: 01817031444 Fax: 01977031444
E-mail info@fredbd.com
Company website www.fredbd.com
Other websites that belongs to the company www.pchaat.com
Organization’s head in Bangladesh Bijoy K. Chowdhury
Designation CEO
Mobile/Direct Phone 01817031444
Legal Structure of the Company Private limited
Membership with other organization Microsoft, Symantec, Veritas, Sohpos, Trend Micro, ESET,
International Presence
Country N/A
Country N/A
Company Name in that country N/A
Address
Phone N/A
FAX N/A
E-mail N/A
Industry Expertise
Order of Expertise Industry Number of clients Remark
1st Expertise Banking/Financial 10 Done
2nd Expertise Insurance 10 Done
3rd Expertise Healthcare 5 N/A
4th Expertise Utility & Energy 5 N/A
5th Expertise Garments & Textile 50 N/A
Language/ Tools
Share Point, Python, Oracle, C/C++
Platform
Linux/Unix, Windows
Mobile Platform
Symbian, Palm OS, Blackberry, Windows Mobile, Apple, Android
Service Information
Description of the service Target Industry Export/Local Scale of the proposed service Platform Marketing material attached
Web Site E-commerce Local N/A CSS Yes
Software Developers Experience
Expertise Number of installations Some Clients
Other Applications 1 Reliance Insurance Limited
Product Information
Product Category Title Details Image File
Security Training Cyber Security Training

We Conduct Cyber Security Training 

Cyber Security Awareness Training 

COBIT5, CISA, CISSP, ECSA, CEH, ISO27001, PCIDSS

  

Image File
IT Security Log & Event Management SIEM Solution

A product designed for security information and event management (SIEM).  ESM collects security log data from an enterprise's security technologies, operating systems, applications and other log sources, and analyzes that data for signs of compromise, attacks or other malicious activity. If something malicious is detected, the product acts accordingly by generating alerts to security administrators or initiating an automated response to stop the malicious activity.

Image File
POS POS Machine Security

 

We Secure POS/ATM/PC/Server Machine as well as destruct (Software Sanitization)  the data remanence before it  send to disposal asset.

Image File
Other Applications Sandbox

 

We do on premises customized Sandbox for Banking Sector as well as confidential business like others organization

  

Image File
IT Security Anti Apt Solution

 

We do on preemies dedicate Anti Apt Solution..

  

Image File
Network Security We do on premises Network Intrusion detection & Prevention System

 

We do on premises Network Intrusion detection & Prevention System

      


Image File
IT Security Vulnerability Protection Solution

   Vulnerability Protection

We do Host Based IPS which Protect your Pc/Servers Vulnerability Protection

Image File
IT Security Data Destruction Solutiuon (Software Sanitization)

 

Data Destruction Solutions for Disposal of Asset like (Hard Disk, ATM, POS etc).

  

Image File
Construction Project Management Linear Construction Project Management

   Trimble TILOS combines time and location to give you a smarter, easier way to create accurate, optimized project plans, and to quickly update these plans as schedule changes occur.

 

Smarter. Easier. Accurate. Optimized.

Creating linear project plans using traditional Gantt software can be cumbersome and inaccurate. Trimble® TILOS transforms the way linear project plans are created by integrating a scaled diagram of your project with a comprehensive project management system tailored for Railway, Road, Pipeline, Tunnel and Transmission line projects. TILOS combines time and location to give you a smarter, easier way to create accurate, optimized plans, and to quickly update these plans as schedule changes occur.

Image File
Cyber Security Network Forensics and Lawful Interception Total Solutions Provide

E-Detective
Wireless-Detective
E-Detective Decoding Centre
Enterprise Data Guard System
Data Retention Management System
Cyber Crime Investigation Training
NIT (Network Investigation Toolkit)
Network Packet Forensic Analysis Training
FIT (Forensics Investigation Toolkit)
VoIP Detective
HTTPS/SSL Interceptor
E-Detective LEMF Solution Suite
Centralized Management System
Enterprise Data Guard System
National Security Surveillance Training
Lawful Interception Training
Satellite Digital Signal Analysis System    

Image File
Cyber Security Data Retention Management System

 Data Retention Management System (DRMS) is designed for viewing
Intercepted Data centrally from multiple frontend E-Detective, ED2S, NIT2/WD
and iMonitor/EDDM Systems.
Provides a User Friendly GUI, and easy to import and view the Contents
especially for large amount of Intercepted Data.
Capable to view multiple data Files at the same time.
Works with E-Detective and ED2S systems by Automatic transport function via
FTP, and allows reconstructed Data File in each frontend system to be stored in DRMS Server centrally.
Search and Advance Search functions provided for data scoping and primary link analysis.
Easy Management of reconstructed Data Files centrally with multiple EDetective and ED2S systems.
Integration with 3rd party data or text mining, link analysis system or Hadoop File System  

Image File
Cyber Security E-Detective Decoding Centre

 Designed for Off-line Packet Reconstruction
Protocol decoding engine with integration capability to other system
Multi-Users and Case Base Management
Administrator can create different project/case for different
user/investigator to conduct Internet raw data parser and
forensics analysis task on the system
Various Content of Internet Applications Decoding
Email (POP3, SMTP, IMAP), Webmail (Yahoo Mail, Gmail, Hotmail
etc.) IM (Yahoo, MSN, ICQ, QQ, UT, IRC, Google Talk, Skype Voice
Call Log), File Transfer (FTP, P2P), HTTP (Link, Content,
Reconstruct, Upload/Download, Video Stream), Telnet, Online
Games, VoIP, Webcam (Yahoo, MSN)…etc.
EDDM is LI Version Product of EDDC
Cutting-edge Offline Decoding Device  

Image File
Cyber Security VoIP-Detective

 User may opt to purchase the complete Appliance (Hardware + Software) or only purchase Software from us. User may use their own dedicated server for  installing the software.  

Capable to intercept and capture (through
Mirror Mode or Tap Deployment), decode and
reconstruct VoIP RTP sessions.
• Supports voice calls of SIP.
• Supported CODECS: G.711-a law, G.711-u
law, G.729, G.723 and ILBC.
• Capable to play back the reconstructed VoIP
sessions.
Image File
Security Training National Security Surveillance Training

Topic include:
National Security vs National Development
Rumor and its Nature
Social Sentinel vs Target Surveillance
Methodology of Full Scale of Network Surveillance at National Level
Deployment of Network Surveillance
Case Study on Different CountriesIntroduction to National Security Surveillance Training 

Social riot is a common phenomenon in every country in the world. By advanced communication technology, fast spread of social uprising may cause a serious national security issue impacting on social and economic development. In this course, we will introduce common nature of social uprising, how to conduct social sentinel surveillance, data analysis with practical case study.     
 

    

Image File
Cyber Security Wireless-Detective
WLAN Analytics/Forensics/Legal Interception System
Support Wireless LAN 802.11a/b/g/n Scanning & Packet Capturing
Automatically WEP Key Cracking (WPA Optional Module)
Decode and Reconstruct WLAN packets
Capture/Decode/Display are All-in-One
Image File
Cyber Security Satellite Digital Signal Analysis System

Satellite Digital Signal Analysis System
For generic digital signal analysis of satellite communication
Present reconstructed content data of both unilateral download and upload links
Provide signal analysis on both L2 and L3 levels
Provide correlation analysis with both download and upload links
Suitable for network forensic analysis on satellite digital communication

Image File
IT Enabled Services (ITES)
Knowledge Process Outsourcing - KPO, GIS, Content provider (Mobile, WEB, Voice etc.), IT Security, Cyber Security, Security Training
Compliance Information
Name of the compliance/practices Certified by Certified since Valid until
Choose an item ISO 2013 2020
Human resources Information
Total number of HR 2
IT Resources 10
ITES resources 1
Contact Person
Name Bijoy K. Chowdhury
Designation CEO
Mobile 8801817031444
E-mail bijoy@fredbd.com
Success Story
Anti Apt Solution, Sandbox, Network IPS, Encryption Solution
ATM POS Server Machines Security & Data Destruction solution (Software Sanitization) Before Disposal.
Company Profile