Notifications
Notifications
CDW Logo

CRU Forensic ComboDock FCDv5.5 - storage controller - ATA / SATA - eSATA 3G

Mfg # 31360-3109-0000 CDW # 3910654

Quick tech specs

  • Storage controller
  • eSATA 3Gb/s
  • USB 2.0
  • ATA / SATA
  • FireWire 800
  • USB 3.0
View All

Know your gear

Digital and forensics investigators, technicians, and lawyers who want to view, evaluate, or image a drive safely rely upon the CRU WiebeTech Forensic ComboDock. It's an easy-to-use, professional-grade, dual mode dock that provides a plethora of host and drive connections. To use, connect a suspect hard drive to the Forensic ComboDock, plug in power, and attach to your computer. The drive connector enables automatic alignment and easy insertion.

When turned on, the Forensic ComboDock asks you to choose either write-blocking or read/write mode. If you need to modify contents of a suspect drive, switch the Forensic ComboDock into temporary read/write mode. Even though switching from write blocker mode to read/write mode is easy, the Forensic ComboDock v5 makes it impossible to unintentionally turn off write-blocking. This prevents problems that can occur if you forget to change the mode back to write-blocking.

The Forensic ComboDock's LED indicator and easy screen menu also clearly identify the operating mode.

This item was discontinued on August 26, 2022

Enhance your purchase

CRU Forensic ComboDock FCDv5.5 - storage controller - ATA / SATA - eSATA 3G is rated 4.50 out of 5 by 4.
Rated 5 out of 5 by from Easy to use and manage and straightforward to set up What is our primary use case? The solution is great for remote connection to our facilities. When the COVID-19 pandemic occurred, it was a great challenge for us to move all the staff home to work from there. We have around 8000 workers and migrating all of them to work from home was a lot of work and as an administrator of the corporate security area, I have always liked to be aware of new trends in security issues and above all that I can integrate them into my work in order to ensure better security. How has it helped my organization? This Odo or Harmony solution has helped us a lot in improving the security for the remote connection to our facilities in corporate. At some point, we started to use the Check Point client and use a certificate to extend the connection to corporate and even if there is one kind of security, it is generally not very secure. With this new solution, connecting to a cloud and opening the allowed applications is much more secure. On top of that, you can configure for a double authentication factor which doubles the security of connection to your corporate workforce. What is most valuable? One of the things that I liked the most was the fact that I no longer needed a VPN client. I only connected to a browser to connect to the cloud and once you authenticate yourself, you have everything there. You can surf the internet, have an SSH connection, RDP, et cetera. This makes it easier to use, and, above all, to manage without worrying that there will be an attack on your corporate infrastructure since everything is recorded in logs. You are able to view everything that was done in the active session so that, in the future, in case of fraud, you have sufficient evidence of the activity carried out in the session. What needs improvement? Until now, I have not found anything that I do not like about this service, however, security trends and vulnerabilities will always exist and there should always be new ways to protect the perimeters of our corporate infrastructure. I always look for new trends and technologies that somehow can be integrated into our work that is much easier for the user. It allows the administrator to grant them remote access with all the necessary security parameters. Above all, it is simple to configure for a platform administrator For how long have I used the solution? I've used the solution for a few months. What do I think about the stability of the solution? We havent seen or receved reports from our end users complaining about this clientless solution int order to connect to our premises there for we can say that is a confedend service that shows stability to the client What do I think about the scalability of the solution? The scalability is great. How are customer service and support? Technical support is great. How would you rate customer service and support? Positive Which solution did I use previously and why did I switch? We did previously use a different solution. How was the initial setup? The initial setup is straightforward. What about the implementation team? We implemented the solution with the assistance of a vendor. What was our ROI? We have witnessed a 40% ROI. What's my experience with pricing, setup cost, and licensing? For remotes access, this is one easy-to-administer service. Which other solutions did I evaluate? We did evaluate other options. Which deployment model are you using for this solution? Public Cloud If public cloud, private cloud, or hybrid cloud, which cloud provider do you use? Other Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2021-10-24T00:00:00-04:00
Rated 5 out of 5 by from Allows users to manage, visualize, and control from a single place What is our primary use case? We were looking for a solution that offers easy connectivity in a unified portal allowing for a wide range of desktop applications to be available when connecting any application, generating security management that can be easily deployed safely in a few minutes. We also wanted improved visibility, including full audit trails, allowing us to efficiently establish any communication from the organization to teams and corporations. This product provides an efficient way to establish communication between different teams and the organization, allowing us to connect any user to the organization quickly and efficiently. How has it helped my organization? The solution has established communication between the users and the organization, giving us the ability to manage, centralize, visualize, control, and update each of the devices from a single place. From there, we can see user behavior, analyze data (including information that is being shared), and achieve efficient connectivity where we can share the organization's information to the devices in a secure, stable, and encrypted way. What is most valuable? We can establish secure control of the remote connection of the devices to the organization. We can control security standards management information, enable the filtering of content and allow for the verification of data that can be shared through the network connection. We have access to great functionality while establishing a remote connection. What needs improvement? They need to establish in a better way the configuration of the services. Each configuration has a level of complexity, and there is a need for the person who is going to configure it to have advanced knowledge. We'd like this simplified to provide a prompt and efficient installation since, in many cases, the solution or the guides provided by the manufacturer are a bit complex. For how long have I used the solution? I've used the solution for one year. Which deployment model are you using for this solution? Hybrid Cloud If public cloud, private cloud, or hybrid cloud, which cloud provider do you use? Other Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2023-01-09T00:00:00-05:00
Rated 5 out of 5 by from Minimizes vulnerabilities, good reporting, and user-friendly What is our primary use case? When planning the migration of the servers to the Azure cloud, this tool for remote access had been taken into account. We had our servers in omnibuses when the pandemic arrived. At that time, it was completely difficult for us to be able to let all our users work from home with remote access or company services since we were not prepared to do work in this way. At the time, pre-pandemic, the only ones who worked remotely were IT and only on occasion. Therefore, to prevent future issues with access, we decided to use Odo and make secure access available to all our collaborators. How has it helped my organization? Odo has helped us a lot in long-distance communication since the solution establishes easy communication between users and the company, providing us the ability to manage, centralize, and view each of the devices and from where they connect. Everything is supervised by the tool. It even presents a report on the number of user connections, such as connection IP, country, and type of OS. All this data provides us with enough information to be able to manage security and allow from which countries or places users can connect in order to minimize vulnerabilities. What is most valuable? One of the great advantages of this tool is that you no longer need a VPN client. Everything can be done from a browser. This makes connections simpler since, from any computer in the world, it is possible to make a safe, efficient, and fast connection. The Odo tool has the best-certified security standards management. It can also enable content traffic and allow data verification; all communication between devices is encrypted. What needs improvement? This tool must improve the latency that the portal produces when entering. Although the reports are good, they could improve them and make them more interactive. The integration with cloud tools could be more agile in connections, such as SIEM, and thus be able to interact with more information in order to have a broader scope. Apparently, the control panel is good. That said, they could make a couple of improvements in the centralization of all its functionalities so that we are not moving to different windows. The tool itself does quite well in the area of remote security. For how long have I used the solution? The product was implemented approximately one year ago. What do I think about the stability of the solution? The solution offers excellent stability and has not failed since it was implemented. What do I think about the scalability of the solution? The product has excellent scalability and functionality; we have not presented any failures. How are customer service and support? They must improve the quality of support since sometimes the cases are not resolved via the corresponding SLA. How would you rate customer service and support? Positive Which solution did I use previously and why did I switch? When we saw the need for a tool and we opted for this one since we did not have any other solution in place. How was the initial setup? The configuration of the tool was very easy since it is very user-friendly. What about the implementation team? The implementation was done internally, accompanied in the first phase by an engineer provided by the provider. What was our ROI? It is always good to acquire a good tool for the security of the organization since the impact without it could be a greater impact on the company economically. What's my experience with pricing, setup cost, and licensing? Regarding the cost, it is considerable. That said, it is a good investment, and the installation is very easy to carry out. Which other solutions did I evaluate? Many options were looked at, such as Palo Alto, Cisco, and IBM, among others, however, we liked this tool more. What other advice do I have? The tool is super practical, reliable, and very good at its job. Which deployment model are you using for this solution? Hybrid Cloud Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2023-01-11T00:00:00-05:00
Rated 5 out of 5 by from Easy to configure and maintain but needs better performance What is our primary use case? We needed a solution that would allow us to obtain an advantage against competitors against cyber attacks and significant savings in the implementation based on the cost of the annual budget. We have looked for solutions that make it easier for us to install a configuration and is ideal for environments in which we have much smaller branches. Economically, we wanted a network solution for large companies yet one which took into account the limited budgets of a medium-sized company so we'd have advanced protection and unified management in one single tool. How has it helped my organization? The solution is giving us the ability to configure and maintain (at a low cost) while offering good protection. It is giving us substantial evidence of unified management that allows us to combine various functions of security into a single solution that simplifies the administration of network security. The performance features offer greater flexibility and automation has helped us maintain a healthy network. What is most valuable? The advanced protection, centralized administration, and the ability to have experts hand in hand providing us with good best practice solutions and centralized management have been useful. We work hand in hand with the technical support that the provider gives us. This is one of the additional value-added options for us. The capacity of hardware, software, and use cases is impressive. What needs improvement? Scalability is very limited. It cannot be adapted to all companies, and the need for more and more equipment makes it hard to scale. It is important to understand that we need greater flexibility when we try to adapt to the specific needs of our company. Often, we see complexity and loss and performance. We could both benefit from improved performance and speed in the effectiveness of the network. They should seek optimization of the resources consumed by the application. For how long have I used the solution? I've used the solution for one year. Which deployment model are you using for this solution? Hybrid Cloud If public cloud, private cloud, or hybrid cloud, which cloud provider do you use? Other Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2023-03-01T00:00:00-05:00