Falcongaze SecureTower About Falcongaze Who we are Falcongaze - - PowerPoint PPT Presentation
Falcongaze SecureTower About Falcongaze Who we are Falcongaze - - PowerPoint PPT Presentation
Falcongaze SecureTower About Falcongaze Who we are Falcongaze Company was founded in 2007 We are on the DLP market since 2010 6 offices in Russia and Belarus The company has grown from 3 to 100+ employees Over 700 commercial implementations
Who we are
Falcongaze Company was founded in 2007 We are on the DLP market since 2010 6 offices in Russia and Belarus The company has grown from 3 to 100+ employees Over 700 commercial implementations Over $3,9 millions revenue in 2018 (forecast)
Clients Revenue
* forecast
About Falcongaze
* +
Secure Tower. General description
General functions
Control of data transfer channels Detection of sensitive data content Employee monitoring Archive of intercepted data Reports based on gathered information Data leak prevention Incident response
Simplicity of implementation and usage Modularity Cutting-edge features Extensive tools for personnel and business process analysis Effective high-qualified technical support Scalability Customer-driven development
Why SecureTower?
Secure Tower. Scenarios
Endpoint agents
- WEB
- Messengers
- External devices
- FTP(S)
- User activity
- Indexing workstations
- Full archive of all intercept data
- Indexing files
- Search engine
- Security center & Reports engine
Endpoint control Data discovery Network control
SPAN-port
- WEB
- Messengers
- FTP
Mail processing server
- EWS (MS Exchange)
- POP3
- SMTP
- IMAP
ICAP-server
- WEB
SecureTower controls data-in-use, data-at-rest and data-in-motion
Secure Tower. Interception
- Protocols: POP3, SMTP, IMAP, MAPI
- Mail servers: Microsoft Exchange Server, Lotus
Notes, Postfix, Sendmail
- Web-based: Gmail, Yahoo.Mail, Mail.ru and other
Web activity
- Protocols: HTTP(S), FTP(S)
- Browsers: Chromium-based, Firefox, IE,
TOR, etc. Cloud storage
- Clients: OneDrive, iCloud, Google Drive, Dropbox,
Yandex.Drive
- Web-access: all
Messengers
- Protocols: XMPP, YIM, SIP, OSCAR, MMP
- Clients: Skype, Viber, WhatsApp, MS Lync,
Telegram, Jabber, Miranda, Google Talk, QIP Infium, PSI, CQ/AIM, Yahoo! Messenger Social networks
- Integrations: Facebook, LinkedIn, Vk.com
- Other: blogs, online chats, forums
Workstation control
- Scanners
- Printers
- CD/DVD
- External devices
- Clipboard
Secure Tower. Control
Applications Tracking the applications used by employees throughout the working day Workstation indexing Allows to search files by any attributes. Quick search can be performed manually
- r in automatic mode.
Personnel control The comprehensive picture of employees’ working day: worktime control, desktop screenshots, audio and video monitoring Personnel interactions Graphical interpretation of users’ interactions
Secure Tower. Analysis & Prevention
E-mail traffic blocking using security rules HTTP(S) blocking using security rules Network access blocking for specific applications Processes & Applications blocking Reports & Analytics Investigation Center
SecureTower contains progressive methods of analysis:
Context (thesaurus) Morphological analysis (English, Russian) Statistical analysis OCR (26 languages) Extended regular expression matching Partial and exact document matching Structured and unstructured data fingerprinting
- Capabilities. Methods of analysis
Speech recognition (75 languages)
SecureTower Local network Internet
- Capabilities. Components
Over 7000 commercial implementations Business sectors
Market Positioning. Clients
The largest implementation is Belarusbank (18 000 employees) — 4 000 licenses. The majority of clients are from Finance business: banks, Insurances companies & accounting companies, trading, transportation and logistics, energy sector, governmental and public institutions.
Market Positioning. Licensing policy
Perpetual The cost of the system depends on selected modules and the number of controlled endpoints. Licenses are not tied to specific users or PCs. Subscription Each module and protocol can be purchased separately or in combination
Market Positioning. Modular delivery
Each module and protocol can be purchased separately or in combination Modules
Image recognition Corporate and web e-mail Web resources Messengers External devices FTP(S) User activity monitoring Speech recognition
Company offices Planned offices Our partners
Market Positioning. Partners
Road map
How we are going to grow
The company focuses primarily on organic development The product is improved on the basis of active work with customers feedback
What are we going to do
- Endpoint encryption
- Sites & Apps Classification
- Risk analysis
- macOS and Linux agents
- Third-party data classification
- CASB integration
Short term Mid term Long term
- SaaS
- SIEM and U(E)BA integration