Welcome!

News Feed Item

Silent Shield Unveils CATIE®, New Software in Fight against Crime

Silent Shield, LLC, officially released its highly anticipated, evidence gathering and tracking software, CATIE today. CATIE, or Capture And Track Investigative Evidence, offers active law enforcement personnel and government agencies a new, more sophisticated level of tracking, preserving, and securing online, offline, and real-time investigations and evidence.

CATIE provides cost-effective tools to track, trace, and preserve evidence, which results in a more accurate and efficient data capture than most processes in use today. The software boasts an interactive command center (ICC) that operates in zones. The ICC collates and manages user profile preferences so multiple law enforcement officials can easily and methodically interact on the same cases.

The software is available to registered law enforcement and government agencies and offers features that include multiple, simultaneous video recording windows, advanced/automated screen capturing methodologies, specialized key logging capabilities, instantaneous Internet protocol (IP) tracking, encrypted agent-to-agent communications, lightning fast report generation, and the ability to simultaneously manage multiple investigations. CATIE is easily customized with optional software modules, such as Covert Short Message Service (SMS), which incorporates text messaging interchanges and logging, to meet each agent’s or agency’s unique needs. CATIE’s reach and powerful backend systems further support and streamline the investigative processes.

“We’re excited to offer CATIE with its advanced technical capabilities, innovations and streamlined processes,” says Jim Persinger, Silent Shield’s Managing Partner. Persinger adds, “CATIE significantly reduces the amount of time spent investigating cases and processing evidence with its state-of-the-art functions. CATIE is a force to be reckoned with because it proactively empowers its user, increases efficiencies, and offers cutting-edge technical advances that have not been available until now.”

CATIE is a powerful tool in the fight against criminal activity, including the onslaught of human trafficking and child endangerment, drug and arms dealing, and hacking and cyber stalking; the software is Silent Shield’s newest addition to its CyberNet Suite(SM). CATIE’s data can interface with other forensic tools, saving valuable investigative time in both the field and the lab.

Silent Shield is also sponsoring the first team-oriented Digital Crime Scene Challenge at the 26th Annual Crimes Against Children Conference, in Dallas, Texas, from August 11-14, 2014. Bill Walsh, Conference Coordinator for the Crimes Against Children Conference, says, “We have wanted to offer a Digital Crime Scene Challenge for the last few years. Teams of three will compete against each other in a mock crime scene with the goal of collecting as much evidence as possible within a specific time frame and formulating an investigative response plan. This is the first time the conference can offer a team challenge of this nature and magnitude due, in part, to Silent Shield’s generosity.”

Silent Shield’s mission is to proactively empower law enforcement and government agencies by providing hardware devices, software products, and specialized training to increase the responsiveness and effectiveness of officers, agents, and military personnel. A portion of Silent Shield’s proceeds supports related non-profit organizations.

To learn more about CATIE and the editions available, go to www.CatieOnline.com to register. Each edition of CATIE, including the Trial Edition, is only available to vetted, active law enforcement or military personnel, or government agencies.

Media inquiries may be directed to Evelyn Bishop-Persinger at [email protected] or (678) 838-4243.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT de...
Digitization is driving a fundamental change in society that is transforming the way businesses work with their customers, their supply chains and their people. Digital transformation leverages DevOps best practices, such as Agile Parallel Development, Continuous Delivery and Agile Operations to capitalize on opportunities and create competitive differentiation in the application economy. However, information security has been notably absent from the DevOps movement. Speed doesn’t have to negat...
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, will discuss recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model f...
Your business relies on your applications and your employees to stay in business. Whether you develop apps or manage business critical apps that help fuel your business, what happens when users experience sluggish performance? You and all technical teams across the organization – application, network, operations, among others, as well as, those outside the organization, like ISPs and third-party providers – are called in to solve the problem.
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Most of us already know that adopting new cloud applications can boost a business’s productivity by enabling organizations to be more agile and ready to change course in our fast-moving and connected digital world. But the rapid adoption of cloud apps and services also brings with it profound security threats, including visibility and control challenges that aren’t present in traditional on-premises environments. At the same time, the cloud – because of its interconnected, flexible and adaptable...
SYS-CON Events announced today that Roundee / LinearHub will exhibit at the WebRTC Summit at @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LinearHub provides Roundee Service, a smart platform for enterprise video conferencing with enhanced features such as automatic recording and transcription service. Slack users can integrate Roundee to their team via Slack’s App Directory, and '/roundee' command lets your video conference ...
Digital transformation is too big and important for our future success to not understand the rules that apply to it. The first three rules for winning in this age of hyper-digital transformation are: Advantages in speed, analytics and operational tempos must be captured by implementing an optimized information logistics system (OILS) Real-time operational tempos (IT, people and business processes) must be achieved Businesses that can "analyze data and act and with speed" will dominate those t...
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
There is growing need for data-driven applications and the need for digital platforms to build these apps. In his session at 19th Cloud Expo, Muddu Sudhakar, VP and GM of Security & IoT at Splunk, will cover different PaaS solutions and Big Data platforms that are available to build applications. In addition, AI and machine learning are creating new requirements that developers need in the building of next-gen apps. The next-generation digital platforms have some of the past platform needs a...
SYS-CON Events announced today that Secure Channels will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The bedrock of Secure Channels Technology is a uniquely modified and enhanced process based on superencipherment. Superencipherment is the process of encrypting an already encrypted message one or more times, either using the same or a different algorithm.
While DevOps promises a better and tighter integration among an organization’s development and operation teams and transforms an application life cycle into a continual deployment, Chef and Azure together provides a speedy, cost-effective and highly scalable vehicle for realizing the business values of this transformation. In his session at @DevOpsSummit at 19th Cloud Expo, Yung Chou, a Technology Evangelist at Microsoft, will present a unique opportunity to witness how Chef and Azure work tog...
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...
SYS-CON Events announced today that Numerex Corp, a leading provider of managed enterprise solutions enabling the Internet of Things (IoT), will exhibit at the 19th International Cloud Expo | @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Numerex Corp. (NASDAQ:NMRX) is a leading provider of managed enterprise solutions enabling the Internet of Things (IoT). The Company's solutions produce new revenue streams or create operating...