InfoWatch Solutions The company was founded in 2003 as a spin-off of - - PowerPoint PPT Presentation
InfoWatch Solutions The company was founded in 2003 as a spin-off of - - PowerPoint PPT Presentation
InfoWatch Solutions The company was founded in 2003 as a spin-off of Kaspersky Lab CEO Natalya Kaspersky Product focus: software solutions dedicated to monitoring, analysis and protection of corporate data 1 Data Loss Prevention vendor in
The company was founded in 2003 as a spin-off of Kaspersky Lab CEO Natalya Kaspersky Product focus: software solutions dedicated to monitoring, analysis and protection of corporate data №1 Data Loss Prevention vendor in Russia Partner network across Russia, the CIS and the Middle East Deep technology expertise and hands-on experience in implementing highly sophisticated projects in financial sector, government agencies, power and energy, telecommunications and various other industries
InfoWatch Holding
Traffic Monitor Kribrum EndPoint Security Appercut
InfoWatch Group of Companies Solutions
Business application source code analysis Endpoint protection, removable media and external devices management, encryption Cloud-based automatic social media monitoring and reputation management Enterprise-grade industry-specific confidential data protection solutions
DLP system is literally the only information security software devoted to solving business-related issues
helps businesses to stay assured of the safety of valuable and confidential data
provides awareness of all internal and external information flows within and beyond the organization
helps to reveal conspiracy against the company, disclose potential violators and industrial spies
performs digital workplace monitoring to track staff activity and measure employee loyalty
Valuable Data Leakage Prevention
InfoWatch Traffic Monitor
Audit commercial classified information Categorize digital assets
Define the scope of commercial classified information Define the list of employees authorized to access commercial classified information
Develop internal regulatory documents Develop solution specifications for transmitting, protecting, analyzing and archiving of commercial classified information Develop enforcement recommendations to meet the requirements for protecting commercial classified information
Pre-DLP DLP Post-DLP
Stages to Implement an Effective Information Protection Program
traffic analysis and blocking policies adjustments meeting internal regulatory requirements lowering DLP false positives and negatives
Pre-DLP DLP
InfoWatch Traffic Monitor Enterprise – comprehensive control of corporate data flows We’ll tell you We’ll tell you: : WHO WHO? ? WHAT WHAT? ? HOW HOW? ? WHERE WHERE? ? WHEN WHEN? Protecting information and reputation Protecting information and reputation
Traffic interception Multilevel analysis Legitimate storage
- Automatic intercepted data
classification
- Exact identification
- f Sender/Recipient
- Optical Character
Recognition (OCR) for scanned documents and images analysis
- Block data transmission
- Legitimate storage of all
incident data
- Unlimited storage space
- Full text search
- Incident reporting
Pre-DLP DLP Post-DLP
- HTTP(s)
- SMTP
- FTP
- Lotus Notes
- ICQ
- GTALK(XMPP)
- Mail.ru agent
- Skype
- MS Lync
- Copying to external
media Stages to Implement an Effective Information Protection Program
We’ll tell you: who? why? for whom? how? Reveal conspiracy against the company, disclose potential violators and industrial spies Collect digital evidence Identify network anomalies to correlate with data leakage incidents Unlimited storage space for incident-related data Legal support of internal incident investigations
Pre-DLP DLP Post-DLP
Stages to Implement an Effective Information Protection Program
Automatic classification of all intercepted data Sharp detection of confidential data Popular data transmission channels control Employee-violator detection
Detected incident details are attached to a sender’s and recipient’s profiles
In-house top-notch technologies Graphical reporting Centralized archive
Data transmission route monitoring.
Improper corporate resource usage detection
Evidential base for incident investigation
InfoWatch Traffic Monitor Benefits
Modularity and flexible integration with existing IT-infrastructure
Various implementation options and integrated solutions with 3rd party software vendors make it possible to smoothly embed data leak prevention solutions into the existing IT-infrastructure.
Modular software solution allows to expand functionality step-by-step with no need to system reinstallation
High performance and failure resilience
Capable to work with geographically distributed enterprise-grade IT-infrastructure
Clustering and Load balancing
InfoWatch Traffic Monitor Benefits
A cloud-based system for social media monitoring for corporate reputation management over the Internet Collects web content where a company / brand is discussed Automatically analyses & identifies topics and sentiment
- f comments
Generates reports in real time in web interface Reputation Management
InfoWatch KRIBRUM
InfoWatch KRIBRUM
High-quality data collection and analysis with industry context consideration All in-house IP: proprietary data extraction and linguistic analysis technologies Monitoring project is preset and tuned up by Kribrum experts Data relevance: up to 95% of spam & noise filtered out Close-to-realtime monitoring of millions of social media accounts of all types Automatic sentiment scoring (Positive/Neutral/Negative), 80% fidelity Automatic text categorization by topics and geography Flexible data selection, visual reporting and data export Built-in customer interactions tools Authors’ profiles and interaction history Role-based access model Multi-language: English, Russian, Arabic API for integration with CRM, Call Center, etc.
KRIBRUM Advantages
Customer relations and loyalty management
Customer care – online support and problem solving both in corporate communities and personal blogs
Engagement – direct and personal communications online
Marketing communications and PR
Brand image monitoring
Finding active communities, opinion leaders and brand advocates
Feedback analysis for adjusting promo campaigns ‘on the fly’
Regional market specifics identification
Delivering right products and service
Market trends identification, competitors and consumers research
Product development and service improvement by public feedback
Information security monitoring
Black PR, negative feedback, etc. identification and prompt reaction
Detection of potentially harmful information: unauthorized corporate data distribution, irresponsible staff behavior, etc.
Use KRIBRUM for Reputation Management via
Goal: improve customer satisfaction via listening to the Voice of Customer and developing direct communications with clients in social media Project start: March 2012 Average data volume: 1500 - 2000 posts daily, 50 000 - 60 000 posts monthly (on Sberbank and major competitors) Current usage – Customer Care service (PR department):
Ad hoc research and analysis of online customer feedback:
Satisfaction with the customer service in offices
Regional differentiations in customer claims and requirements
Product improvements expected by clients, etc.
Direct responding to client’s questions and claims online
Analytical reports to top management Vision and plans:
Intensify the usage of monitoring data for loyalty management
Involve regional branches into online activities (not just in HQ)
Integration with corporate IT systems
Case Study: InfoWatch KRIBRUM for Sberbank
InfoWatch EndPoint Security
Information Security of your business
- Single console
- Single policy to manage all
functions
- Single agent for endpoint
Endpoint protection and management Protects from critical data loss and blocks unauthorized employees’ actions thanks to encryption technology and flexible policy management of access restriction
C.A.F.E. management principle
Encryption Filter Audit Control
InfoWatch EndPoint Security
Information Security of your business
Automates business application source code analysis for vulnerabilities and undocumented features to prevent their unauthorized access to confidential data Utilizes a regularly updated database of digital fingerprints
- f known backdoors
InfoWatch Appercut
Business application source code analysis
Appercut does not infringe application architecture or company business processes
InfoWatch Selected Clients
+7 495 22 900 22 sales@infowatch.com
Contact Info
www.infowatch.com
Vsevolod Ivanov
Executive Director Vsevolod.Ivanov@infowatch.com