The Finder Series allows large-scale real-time deep packet filtering based  on object, pattern, and signature detection. It accesses and delivers traffic  from one or more full-duplex networks to multiple network intelligence  tools to provide compliant  "clean" searches for authorized lawful interception (LI), fraud  prevention, and other ultra sensitive parameters. 
                                Secure: Local and remote  manageability with user-specific access restrictions, AAA user authentication,  and traffic ports without an IP address combine to safeguard your security and  performance monitoring tools and access to the ObjectFinder units. No storage  of transiting data provides "clean" searches to keep private  information private and in legal compliance while still authorizing targeted,  needle-in-a-haystack filtering for lawful intercept, fraud prevention, and  ultra-sensitive perimeters.  
                                Flexible: Dynamic port type (input, output, or stack) and  setting configurability, with pluggable ports, provide adaptable solutions to  meet your specific deployment needs. 
                                High  Performance: Full line rate  throughput, all layer 1 and 2 functionality, and low latency throughput to  monitor output guarantee full visibility at line speed. Content Matching allows  tagging of specific streams or IP / port bindings for further monitoring. Email  object detection simultaneously searches for up to 65,535 email addresses, and  tracks and forwards up to 65,535 matched streams or IP / port bindings. IP  object detection simultaneously searches for up to 524,288 IP addresses or  address ranges, and tracks and forwards many millions of matched packets. DPI  rule-based object, pattern, and signature detection simultaneously searches for  up to 2,400 rule sets, and tracks and forwards up to 1M matched streams or IP /  port bindings. 
                                Reliable: Redundant power supplies, user defined trigger  policies, and policy-based load balancing provide active options for defining  monitoring tool failure scenarios, in addition to traffic re-distribution to  active and standby tools. 
                                Scalable: Up to 63 ObjectFinder and other DTCS devices can be  stacked to form a network intelligence optimization layer on one unified  platform.  |