falcongaze securetower about falcongaze
play

Falcongaze SecureTower About Falcongaze Who we are Falcongaze - PowerPoint PPT Presentation

Falcongaze SecureTower About Falcongaze Who we are Falcongaze Company was founded in 2007 We are on the DLP market since 2010 6 offices in Russia and Belarus The company has grown from 3 to 100+ employees Over 700 commercial implementations


  1. Falcongaze SecureTower

  2. About Falcongaze Who we are Falcongaze Company was founded in 2007 We are on the DLP market since 2010 6 offices in Russia and Belarus The company has grown from 3 to 100+ employees Over 700 commercial implementations Over $3,9 millions revenue in 2018 (forecast) * + Clients Revenue * forecast

  3. Secure Tower. General description General functions Control of data transfer channels Detection of sensitive data content Data leak prevention Incident response Employee monitoring Archive of intercepted data Reports based on gathered information

  4. Why SecureTower? Simplicity of implementation and usage Modularity Scalability Cutting-edge features Extensive tools for personnel and business process analysis Effective high-qualified technical support Customer-driven development

  5. Secure Tower. Scenarios SecureTower controls data-in-use, data-at-rest and data-in-motion Network control Mail processing server SPAN-port ICAP-server • EWS (MS Exchange) • Mail • WEB • POP3 • WEB • SMTP • Messengers • IMAP • FTP Data discovery Endpoint control Endpoint agents • Full archive of all intercept data • Mail • Indexing files • WEB • Search engine • Messengers • Security center & Reports engine • External devices • FTP(S) • User activity • Indexing workstations

  6. Secure Tower. Interception Web activity E-mail • Protocols: HTTP(S), FTP(S) • Protocols: POP3, SMTP, IMAP, MAPI • Browsers: Chromium-based, Firefox, IE, • Mail servers: Microsoft Exchange Server, Lotus TOR, etc. Notes, Postfix, Sendmail • Web-based: Gmail, Yahoo.Mail, Mail.ru and other Messengers Cloud storage • Protocols: XMPP, YIM, SIP, OSCAR, MMP • Clients: OneDrive, iCloud, Google Drive, Dropbox, • Clients: Skype, Viber, WhatsApp, MS Lync, Yandex.Drive • Web-access: all Telegram, Jabber, Miranda, Google Talk, QIP Infium, PSI, CQ/AIM, Yahoo! Messenger Workstation control Social networks • Scanners • Integrations: Facebook, LinkedIn, Vk.com • Printers • Other: blogs, online chats, forums • CD/DVD • External devices • Clipboard

  7. Secure Tower. Control Workstation indexing Applications Allows to search files by any attributes. Tracking the applications used by Quick search can be performed manually employees throughout the working day or in automatic mode. Personnel interactions Personnel control Graphical interpretation of users’ The comprehensive picture of employees’ interactions working day: worktime control, desktop screenshots, audio and video monitoring

  8. Secure Tower. Analysis & Prevention E-mail traffic blocking using security HTTP(S) blocking using security rules rules Network access blocking for specific Processes & Applications blocking applications Reports & Analytics Investigation Center

  9. Capabilities. Methods of analysis SecureTower contains progressive methods of analysis: Context (thesaurus) Morphological analysis (English, Russian) Statistical analysis OCR (26 languages) Speech recognition (75 languages) Extended regular expression matching Partial and exact document matching Structured and unstructured data fingerprinting

  10. Capabilities. Components SecureTower Local network Internet

  11. Market Positioning. Clients Over 7000 commercial implementations The largest implementation is Belarusbank ( 18 000 employees) — 4 000 licenses. The majority of clients are from Finance business: banks, Insurances companies & accounting companies, trading, transportation and logistics, energy sector, governmental and public institutions. Business sectors

  12. Market Positioning. Licensing policy Perpetual Subscription The cost of the system depends on selected modules and the number of controlled endpoints. Licenses are not tied to specific users or PCs. Each module and protocol can be purchased separately or in combination

  13. Market Positioning. Modular delivery Each module and protocol can be purchased separately or in combination Modules Web resources FTP(S) Corporate and web e-mail Messengers Image recognition External devices User activity monitoring Speech recognition

  14. Market Positioning. Partners Company offices Planned offices Our partners

  15. Road map How we are going to grow The company focuses primarily on organic development The product is improved on the basis of active work with customers feedback What are we going to do • Endpoint encryption • macOS and Linux agents • SaaS • Sites & Apps Classification • Third-party data classification • SIEM and U(E)BA integration • Risk analysis • CASB integration Short term Mid term Long term

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend