InfoWatch Solutions The company was founded in 2003 as a spin-off of - - PowerPoint PPT Presentation

infowatch solutions the company was founded in 2003 as a
SMART_READER_LITE
LIVE PREVIEW

InfoWatch Solutions The company was founded in 2003 as a spin-off of - - PowerPoint PPT Presentation

InfoWatch Solutions The company was founded in 2003 as a spin-off of Kaspersky Lab CEO Natalya Kaspersky Product focus: software solutions dedicated to monitoring, analysis and protection of corporate data 1 Data Loss Prevention vendor in


slide-1
SLIDE 1

InfoWatch Solutions

slide-2
SLIDE 2

The company was founded in 2003 as a spin-off of Kaspersky Lab CEO Natalya Kaspersky Product focus: software solutions dedicated to monitoring, analysis and protection of corporate data №1 Data Loss Prevention vendor in Russia Partner network across Russia, the CIS and the Middle East Deep technology expertise and hands-on experience in implementing highly sophisticated projects in financial sector, government agencies, power and energy, telecommunications and various other industries

slide-3
SLIDE 3

InfoWatch Holding

slide-4
SLIDE 4

Traffic Monitor Kribrum EndPoint Security Appercut

InfoWatch Group of Companies Solutions

Business application source code analysis Endpoint protection, removable media and external devices management, encryption Cloud-based automatic social media monitoring and reputation management Enterprise-grade industry-specific confidential data protection solutions

slide-5
SLIDE 5

DLP system is literally the only information security software devoted to solving business-related issues

helps businesses to stay assured of the safety of valuable and confidential data

provides awareness of all internal and external information flows within and beyond the organization

helps to reveal conspiracy against the company, disclose potential violators and industrial spies

performs digital workplace monitoring to track staff activity and measure employee loyalty

Valuable Data Leakage Prevention

InfoWatch Traffic Monitor

slide-6
SLIDE 6

Audit commercial classified information Categorize digital assets

Define the scope of commercial classified information Define the list of employees authorized to access commercial classified information

Develop internal regulatory documents Develop solution specifications for transmitting, protecting, analyzing and archiving of commercial classified information Develop enforcement recommendations to meet the requirements for protecting commercial classified information

Pre-DLP DLP Post-DLP

Stages to Implement an Effective Information Protection Program

slide-7
SLIDE 7

traffic analysis and blocking policies adjustments meeting internal regulatory requirements lowering DLP false positives and negatives

Pre-DLP DLP

InfoWatch Traffic Monitor Enterprise – comprehensive control of corporate data flows We’ll tell you We’ll tell you: : WHO WHO? ? WHAT WHAT? ? HOW HOW? ? WHERE WHERE? ? WHEN WHEN? Protecting information and reputation Protecting information and reputation

slide-8
SLIDE 8

Traffic interception Multilevel analysis Legitimate storage

  • Automatic intercepted data

classification

  • Exact identification
  • f Sender/Recipient
  • Optical Character

Recognition (OCR) for scanned documents and images analysis

  • Block data transmission
  • Legitimate storage of all

incident data

  • Unlimited storage space
  • Full text search
  • Incident reporting

Pre-DLP DLP Post-DLP

  • HTTP(s)
  • SMTP
  • FTP
  • Lotus Notes
  • ICQ
  • GTALK(XMPP)
  • Mail.ru agent
  • Skype
  • MS Lync
  • Print
  • Copying to external

media Stages to Implement an Effective Information Protection Program

slide-9
SLIDE 9

We’ll tell you: who? why? for whom? how? Reveal conspiracy against the company, disclose potential violators and industrial spies Collect digital evidence Identify network anomalies to correlate with data leakage incidents Unlimited storage space for incident-related data Legal support of internal incident investigations

Pre-DLP DLP Post-DLP

Stages to Implement an Effective Information Protection Program

slide-10
SLIDE 10

Automatic classification of all intercepted data Sharp detection of confidential data Popular data transmission channels control Employee-violator detection

Detected incident details are attached to a sender’s and recipient’s profiles

In-house top-notch technologies Graphical reporting Centralized archive

Data transmission route monitoring.

Improper corporate resource usage detection

Evidential base for incident investigation

InfoWatch Traffic Monitor Benefits

slide-11
SLIDE 11

Modularity and flexible integration with existing IT-infrastructure

Various implementation options and integrated solutions with 3rd party software vendors make it possible to smoothly embed data leak prevention solutions into the existing IT-infrastructure.

Modular software solution allows to expand functionality step-by-step with no need to system reinstallation

High performance and failure resilience

Capable to work with geographically distributed enterprise-grade IT-infrastructure

Clustering and Load balancing

InfoWatch Traffic Monitor Benefits

slide-12
SLIDE 12

A cloud-based system for social media monitoring for corporate reputation management over the Internet Collects web content where a company / brand is discussed Automatically analyses & identifies topics and sentiment

  • f comments

Generates reports in real time in web interface Reputation Management

InfoWatch KRIBRUM

slide-13
SLIDE 13

InfoWatch KRIBRUM

slide-14
SLIDE 14

High-quality data collection and analysis with industry context consideration All in-house IP: proprietary data extraction and linguistic analysis technologies Monitoring project is preset and tuned up by Kribrum experts Data relevance: up to 95% of spam & noise filtered out Close-to-realtime monitoring of millions of social media accounts of all types Automatic sentiment scoring (Positive/Neutral/Negative), 80% fidelity Automatic text categorization by topics and geography Flexible data selection, visual reporting and data export Built-in customer interactions tools Authors’ profiles and interaction history Role-based access model Multi-language: English, Russian, Arabic API for integration with CRM, Call Center, etc.

KRIBRUM Advantages

slide-15
SLIDE 15

Customer relations and loyalty management

Customer care – online support and problem solving both in corporate communities and personal blogs

Engagement – direct and personal communications online

Marketing communications and PR

Brand image monitoring

Finding active communities, opinion leaders and brand advocates

Feedback analysis for adjusting promo campaigns ‘on the fly’

Regional market specifics identification

Delivering right products and service

Market trends identification, competitors and consumers research

Product development and service improvement by public feedback

Information security monitoring

Black PR, negative feedback, etc. identification and prompt reaction

Detection of potentially harmful information: unauthorized corporate data distribution, irresponsible staff behavior, etc.

Use KRIBRUM for Reputation Management via

slide-16
SLIDE 16

Goal: improve customer satisfaction via listening to the Voice of Customer and developing direct communications with clients in social media Project start: March 2012 Average data volume: 1500 - 2000 posts daily, 50 000 - 60 000 posts monthly (on Sberbank and major competitors) Current usage – Customer Care service (PR department):

Ad hoc research and analysis of online customer feedback:

Satisfaction with the customer service in offices

Regional differentiations in customer claims and requirements

Product improvements expected by clients, etc.

Direct responding to client’s questions and claims online

Analytical reports to top management Vision and plans:

Intensify the usage of monitoring data for loyalty management

Involve regional branches into online activities (not just in HQ)

Integration with corporate IT systems

Case Study: InfoWatch KRIBRUM for Sberbank

slide-17
SLIDE 17

InfoWatch EndPoint Security

Information Security of your business

  • Single console
  • Single policy to manage all

functions

  • Single agent for endpoint

Endpoint protection and management Protects from critical data loss and blocks unauthorized employees’ actions thanks to encryption technology and flexible policy management of access restriction

slide-18
SLIDE 18

C.A.F.E. management principle

Encryption Filter Audit Control

InfoWatch EndPoint Security

Information Security of your business

slide-19
SLIDE 19

Automates business application source code analysis for vulnerabilities and undocumented features to prevent their unauthorized access to confidential data Utilizes a regularly updated database of digital fingerprints

  • f known backdoors

InfoWatch Appercut

Business application source code analysis

Appercut does not infringe application architecture or company business processes

slide-20
SLIDE 20

InfoWatch Selected Clients

slide-21
SLIDE 21

+7 495 22 900 22 sales@infowatch.com

Contact Info

www.infowatch.com

Vsevolod Ivanov

Executive Director Vsevolod.Ivanov@infowatch.com

Thank you!