infowatch solutions the company was founded in 2003 as a
play

InfoWatch Solutions The company was founded in 2003 as a spin-off of - PowerPoint PPT Presentation

InfoWatch Solutions The company was founded in 2003 as a spin-off of Kaspersky Lab CEO Natalya Kaspersky Product focus: software solutions dedicated to monitoring, analysis and protection of corporate data 1 Data Loss Prevention vendor in


  1. InfoWatch Solutions

  2. The company was founded in 2003 as a spin-off of Kaspersky Lab CEO Natalya Kaspersky Product focus: software solutions dedicated to monitoring, analysis and protection of corporate data №1 Data Loss Prevention vendor in Russia Partner network across Russia, the CIS and the Middle East Deep technology expertise and hands-on experience in implementing highly sophisticated projects in financial sector, government agencies, power and energy, telecommunications and various other industries

  3. InfoWatch Holding

  4. InfoWatch Group of Companies Solutions Appercut Business application source code analysis EndPoint Security Endpoint protection, removable media and external devices management, encryption Kribrum Cloud-based automatic social media monitoring and reputation management Traffic Monitor Enterprise-grade industry-specific confidential data protection solutions

  5. Valuable Data Leakage Prevention InfoWatch Traffic Monitor DLP system is literally the only information security software devoted to solving business-related issues helps businesses to stay assured of the safety of valuable and confidential  data provides awareness of all internal and external information flows within  and beyond the organization helps to reveal conspiracy against the company, disclose potential  violators and industrial spies performs digital workplace monitoring to track staff activity and measure  employee loyalty

  6. Stages to Implement an Effective Information Protection Program Pre-DLP DLP Post-DLP Audit commercial classified information Categorize digital assets Define the scope of commercial classified information  Define the list of employees authorized to access commercial classified information Develop internal regulatory documents Develop solution specifications for transmitting, protecting, analyzing and archiving of commercial classified information Develop enforcement recommendations to meet the requirements for protecting commercial classified information

  7. Pre-DLP traffic analysis and blocking policies adjustments meeting internal regulatory requirements lowering DLP false positives and negatives DLP InfoWatch Traffic Monitor Enterprise – comprehensive control of corporate data flows We’ll tell you We’ll tell you: : WHO WHO? ? WHAT WHAT? ? HOW HOW? ? WHERE WHERE? ? WHEN WHEN? Protecting information and reputation Protecting information and reputation

  8. Stages to Implement an Effective Information Protection Program Pre-DLP DLP Post-DLP Traffic interception Multilevel analysis Legitimate storage • Automatic intercepted data • Legitimate storage of all • HTTP(s) classification incident data • SMTP • Exact identification • Unlimited storage space • FTP of Sender/Recipient • Full text search • Lotus Notes • Optical Character • Incident reporting • ICQ Recognition (OCR) for • GTALK(XMPP) scanned documents and • Mail.ru agent images analysis • Skype • Block data transmission • MS Lync • Print • Copying to external media

  9. Stages to Implement an Effective Information Protection Program Pre-DLP DLP Post-DLP We’ll tell you: who? why? for whom? how? Reveal conspiracy against the company, disclose potential violators and industrial spies Collect digital evidence Identify network anomalies to correlate with data leakage incidents Unlimited storage space for incident-related data Legal support of internal incident investigations

  10. InfoWatch Traffic Monitor Benefits Automatic classification of all intercepted data Sharp detection of confidential data Popular data transmission channels control Employee-violator detection Detected incident details are attached to a sender’s and recipient’s profiles  In-house top-notch technologies Graphical reporting Centralized archive Data transmission route monitoring.  Improper corporate resource usage detection  Evidential base for incident investigation 

  11. InfoWatch Traffic Monitor Benefits Modularity and flexible integration with existing IT-infrastructure Various implementation options and integrated solutions with 3 rd party  software vendors make it possible to smoothly embed data leak prevention solutions into the existing IT-infrastructure. Modular software solution allows to expand functionality step-by-step with no  need to system reinstallation High performance and failure resilience Capable to work with geographically distributed enterprise-grade  IT-infrastructure Clustering and Load balancing 

  12. Reputation Management InfoWatch KRIBRUM A cloud-based system for social media monitoring for corporate reputation management over the Internet Collects web content where a company / brand is discussed Automatically analyses & identifies topics and sentiment of comments Generates reports in real time in web interface

  13. InfoWatch KRIBRUM

  14. KRIBRUM Advantages High-quality data collection and analysis with industry context consideration All in-house IP: proprietary data extraction and linguistic analysis technologies Monitoring project is preset and tuned up by Kribrum experts Data relevance: up to 95% of spam & noise filtered out Close-to-realtime monitoring of millions of social media accounts of all types Automatic sentiment scoring (Positive/Neutral/Negative), 80% fidelity Automatic text categorization by topics and geography Flexible data selection, visual reporting and data export Built-in customer interactions tools Authors’ profiles and interaction history Role-based access model Multi-language: English, Russian, Arabic API for integration with CRM, Call Center, etc.

  15. Use KRIBRUM for Reputation Management via Customer relations and loyalty management Customer care – online support and problem solving both  in corporate communities and personal blogs Engagement – direct and personal communications online  Marketing communications and PR Brand image monitoring  Finding active communities, opinion leaders and brand advocates  Feedback analysis for adjusting promo campaigns ‘on the fly’  Regional market specifics identification  Delivering right products and service Market trends identification, competitors and consumers research  Product development and service improvement by public feedback  Information security monitoring Black PR, negative feedback, etc. identification and prompt reaction  Detection of potentially harmful information: unauthorized corporate data  distribution, irresponsible staff behavior, etc.

  16. Case Study: InfoWatch KRIBRUM for Sberbank Goal: improve customer satisfaction via listening to the Voice of Customer and developing direct communications with clients in social media Project start: March 2012 Average data volume: 1500 - 2000 posts daily, 50 000 - 60 000 posts monthly (on Sberbank and major competitors) Current usage – Customer Care service (PR department): Ad hoc research and analysis of online customer feedback:  Satisfaction with the customer service in offices  Regional differentiations in customer claims and requirements  Product improvements expected by clients, etc.  Direct responding to client’s questions and claims online  Analytical reports to top management  Vision and plans: Intensify the usage of monitoring data for loyalty management  Involve regional branches into online activities (not just in HQ)  Integration with corporate IT systems 

  17. Information Security of your business InfoWatch EndPoint Security Endpoint protection and management Protects from critical data loss and blocks unauthorized employees’ actions thanks to encryption technology and flexible policy management of access restriction • Single console • Single policy to manage all functions • Single agent for endpoint

  18. Information Security of your business InfoWatch EndPoint Security C.A.F.E. management principle Control Audit Filter Encryption

  19. Business application source code analysis InfoWatch Appercut Automates business application source code analysis for vulnerabilities and undocumented features to prevent their unauthorized access to confidential data Utilizes a regularly updated database of digital fingerprints of known backdoors Appercut does not infringe application architecture or company business processes

  20. InfoWatch Selected Clients

  21. Thank you! Vsevolod Ivanov Executive Director Vsevolod.Ivanov@infowatch.com Contact Info +7 495 22 900 22 sales@infowatch.com www.infowatch.com

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend