Falcongaze SecureTower About Falcongaze Who we are Falcongaze - - PowerPoint PPT Presentation

falcongaze securetower about falcongaze
SMART_READER_LITE
LIVE PREVIEW

Falcongaze SecureTower About Falcongaze Who we are Falcongaze - - PowerPoint PPT Presentation

Falcongaze SecureTower About Falcongaze Who we are Falcongaze Company was founded in 2007 We are on the DLP market since 2010 6 offices in Russia and Belarus The company has grown from 3 to 100+ employees Over 700 commercial implementations


slide-1
SLIDE 1

Falcongaze SecureTower

slide-2
SLIDE 2

Who we are

Falcongaze Company was founded in 2007 We are on the DLP market since 2010 6 offices in Russia and Belarus The company has grown from 3 to 100+ employees Over 700 commercial implementations Over $3,9 millions revenue in 2018 (forecast)

Clients Revenue

* forecast

About Falcongaze

* +

slide-3
SLIDE 3

Secure Tower. General description

General functions

Control of data transfer channels Detection of sensitive data content Employee monitoring Archive of intercepted data Reports based on gathered information Data leak prevention Incident response

slide-4
SLIDE 4

Simplicity of implementation and usage Modularity Cutting-edge features Extensive tools for personnel and business process analysis Effective high-qualified technical support Scalability Customer-driven development

Why SecureTower?

slide-5
SLIDE 5

Secure Tower. Scenarios

Endpoint agents

  • Mail
  • WEB
  • Messengers
  • External devices
  • FTP(S)
  • User activity
  • Indexing workstations
  • Full archive of all intercept data
  • Indexing files
  • Search engine
  • Security center & Reports engine

Endpoint control Data discovery Network control

SPAN-port

  • Mail
  • WEB
  • Messengers
  • FTP

Mail processing server

  • EWS (MS Exchange)
  • POP3
  • SMTP
  • IMAP

ICAP-server

  • WEB

SecureTower controls data-in-use, data-at-rest and data-in-motion

slide-6
SLIDE 6

Secure Tower. Interception

E-mail

  • Protocols: POP3, SMTP, IMAP, MAPI
  • Mail servers: Microsoft Exchange Server, Lotus

Notes, Postfix, Sendmail

  • Web-based: Gmail, Yahoo.Mail, Mail.ru and other

Web activity

  • Protocols: HTTP(S), FTP(S)
  • Browsers: Chromium-based, Firefox, IE,

TOR, etc. Cloud storage

  • Clients: OneDrive, iCloud, Google Drive, Dropbox,

Yandex.Drive

  • Web-access: all

Messengers

  • Protocols: XMPP, YIM, SIP, OSCAR, MMP
  • Clients: Skype, Viber, WhatsApp, MS Lync,

Telegram, Jabber, Miranda, Google Talk, QIP Infium, PSI, CQ/AIM, Yahoo! Messenger Social networks

  • Integrations: Facebook, LinkedIn, Vk.com
  • Other: blogs, online chats, forums

Workstation control

  • Scanners
  • Printers
  • CD/DVD
  • External devices
  • Clipboard
slide-7
SLIDE 7

Secure Tower. Control

Applications Tracking the applications used by employees throughout the working day Workstation indexing Allows to search files by any attributes. Quick search can be performed manually

  • r in automatic mode.

Personnel control The comprehensive picture of employees’ working day: worktime control, desktop screenshots, audio and video monitoring Personnel interactions Graphical interpretation of users’ interactions

slide-8
SLIDE 8

Secure Tower. Analysis & Prevention

E-mail traffic blocking using security rules HTTP(S) blocking using security rules Network access blocking for specific applications Processes & Applications blocking Reports & Analytics Investigation Center

slide-9
SLIDE 9

SecureTower contains progressive methods of analysis:

Context (thesaurus) Morphological analysis (English, Russian) Statistical analysis OCR (26 languages) Extended regular expression matching Partial and exact document matching Structured and unstructured data fingerprinting

  • Capabilities. Methods of analysis

Speech recognition (75 languages)

slide-10
SLIDE 10

SecureTower Local network Internet

  • Capabilities. Components
slide-11
SLIDE 11

Over 7000 commercial implementations Business sectors

Market Positioning. Clients

The largest implementation is Belarusbank (18 000 employees) — 4 000 licenses. The majority of clients are from Finance business: banks, Insurances companies & accounting companies, trading, transportation and logistics, energy sector, governmental and public institutions.

slide-12
SLIDE 12

Market Positioning. Licensing policy

Perpetual The cost of the system depends on selected modules and the number of controlled endpoints. Licenses are not tied to specific users or PCs. Subscription Each module and protocol can be purchased separately or in combination

slide-13
SLIDE 13

Market Positioning. Modular delivery

Each module and protocol can be purchased separately or in combination Modules

Image recognition Corporate and web e-mail Web resources Messengers External devices FTP(S) User activity monitoring Speech recognition

slide-14
SLIDE 14

Company offices Planned offices Our partners

Market Positioning. Partners

slide-15
SLIDE 15

Road map

How we are going to grow

The company focuses primarily on organic development The product is improved on the basis of active work with customers feedback

What are we going to do

  • Endpoint encryption
  • Sites & Apps Classification
  • Risk analysis
  • macOS and Linux agents
  • Third-party data classification
  • CASB integration

Short term Mid term Long term

  • SaaS
  • SIEM and U(E)BA integration