InfoWatch Traffic Monitor Enterprise

infowatch
InfoWatch Traffic Monitor Enterprise is a comprehensive solution for data protection, loss prevention and monitoring the transmission of sensitive information outside a company, as well as for the protection of the company from internal threats.

InfoWatch Traffic Monitor Enterprise Key Features

icon_tme_28_02_12_1  Preventing the leakage of personally identifiable information and customer data bases
icon_tme_28_02_12_2  Protection against leaks of sensitive data
icon_tme_28_02_12_3  Intellectual property protection
icon_tme_28_02_12_4  Identifying intruders, disloyal employees, persons engaged in espionage, conspiracies, sabotage
icon_tme_28_02_12_5  Investigation of information security incidents

InfoWatch Traffic Monitor Enterprise protects your company from internal threats:

Insider Activity

icon_tme_28_02_14_6 icon_tme_28_02_14_7 icon_tme_28_02_14_8
The insurance company consultant sends its clients’ lawyers information on outstanding claims. He also informs a competitor about VIP- contracts indicating the size of the insurance premium and the time remaining on current contracts. InfoWatch Traffic Monitor:
Detects any clients’ personally identifiable information or any information for insurance claims and contracts sent to an external email address. The security officer or an authorized person will promptly receive information about the incident.
Technologies used:

interception of outgoing mail, template analyzer, filled forms detection, stamp detection.

tme_bigimg_01

Conspiracies

icon_tme_28_02_14_6 icon_tme_28_02_14_7 icon_tme_28_02_14_8
A Bank loan consultant negotiates with clients for approval of a loan with “special conditions”. He also messages with the consultant of a competitor bank regarding provision of information about mortgage contracts for a bribe, in order to poach the clients later (by providing more favorable terms and conditions InfoWatch Traffic Monitor:
Detects this conspiracy by detecting and analyzing the consultant’s personal correspondence via e-mail, instant messaging, Skype, etc. The security officer or an authorized person will promptly receive information about the incident.
Technologies used:

interception of outgoing mail, linguistic analysis.

tme_bigimg_02

Poaching Clients

icon_tme_28_02_14_6 icon_tme_28_02_14_7 icon_tme_28_02_14_8
A corporate account manager is about to resign, and so he copies contacts from the client database and suggests to his clients that they switch to a competitor (his new employer). InfoWatch Traffic Monitor:
Detects the copying of the database and any suspicious correspondence with clients, and also the employee’s intention to resign. The security officer or the authorized person will promptly receive information about the incident.
Technologies used:

Detection of information copied to external media, DB uploading detection, monitoring visits to on-line job sites.

tme3

Identifying Corrupt Schemes

icon_tme_28_02_14_6 icon_tme_28_02_14_7 icon_tme_28_02_14_8
A tender is announced for the purchase of expensive equipment in a large company. The acquisition manager engages in correspondence with one of the suppliers, negotiating a meeting with him during out of office hours. The majority of all corrupt schemes are simply discussed openly via personal e-mail (@ gmail.com, @ outlook.com, etc.), Skype or instant messaging. InfoWatch Traffic Monitor:
Detects suspicious correspondence via e-mail, instant messaging, Skype, etc.
Technologies used:

Text messaging detection, linguistic analysis.

tme_bigimg_04

Industrial Espionage

icon_tme_28_02_14_6 icon_tme_28_02_14_7 icon_tme_28_02_14_8
A production engineer at the manufacturing company sends design documents, specifications, plans and calculations for a new project to a personal e-mail address. InfoWatch Traffic Monitor:
Detects any secret documents as part of the network traffic flow, even if the employee sends them as pictures, images, or photos.
Technologies used:

Traffic monitoring, OCR, linguistic analysis.

tme_bigimg_05

Theft of Personally Identifiable Information

icon_tme_28_02_14_6 icon_tme_28_02_14_7 icon_tme_28_02_14_8
An employee of a mobile phone shop delivers scans of personal IDs to his accomplice at a bank to carry out fraudulent loan processing. InfoWatch Traffic Monitor:
Detects the sending of personally identifiable information, scanned IDs or completed forms or questionnaires. All this information will be saved in the Forensic Storage database for further investigation of the incident and to provide evidence in court.
Technologies used:

Traffic monitoring, passport detection, filled forms detection.

tme_bigimg_06

Disloyal Employee

icon_tme_28_02_14_6 icon_tme_28_02_14_7 icon_tme_28_02_14_8
A valued employee has become negligent in his work, constantly printing documents, and copying information to removable media. InfoWatch Traffic Monitor:
Detects the employee visiting job search websites, sending out his resume daily, using the company’s infrastructure for private purposes, printing confidential documents, and copying sensitive information and a customer data base onto a USB drive.
Technologies used:
Copying to external media detection, DB uploading detection, monitoring visits to on-line job sites, email monitoring, monitoring of printing activity.
tme_bigimg_07

Working for Competitors

icon_tme_28_02_14_6 icon_tme_28_02_14_7 icon_tme_28_02_14_8
The manager of a trading company constantly prints out the company’s price lists, and sends out special prices for projects and tenders to third-party addresses. Competitors always indicate a slightly lower price than that stated by your company, and so constantly win tenders. InfoWatch Traffic Monitor:
Detects printing of confidential data.
Technologies used:
Monitoring document printing, traffic monitoring, linguistic analysis, filled forms detection, stamp detection.
tme_bigimg_08

Benefits of InfoWatch Traffic Monitor

icon_tme_28_02_14_7 icon_tme_28_02_14_12 icon_tme_28_02_14_8 icon_tme_28_02_14_9
Accurate detection of sensitive data on the fly, automatic classification of information User-friendly web-interface: the system can be managed from any workstation running any OS (Windows, Linux, Apple Mac OS) and using any browser Collection of legally relevant evidence base for investigation of incidents Engagement of all the company’s business units in managing the security of corporate data – the legal department, marketing, HR- service, top managers, etc. with the ability to provide role-based access for different user groups
icon_tme_28_02_14_13 icon_tme_28_02_14_18 icon_tme_28_02_14_10 icon_tme_28_02_14_14
Discrimination of areas of responsibility and access levels Own unique technology and world class quality. InfoWatch is the first Russian developer of DLP Solutions to earn a place in the GARTNER MAGIC QUADRANT High level of reliability and resilience A comprehensive solution which covered all organizational, technical and legal issues related to a company’s internal security
icon_tme_28_02_14_17 icon_tme_28_02_14_11 icon_tme_28_02_14_15 icon_tme_28_02_14_16
Compliance with national privacy laws Industry-specific solutions Identification of malicious users (employees): data cards on all employees and their connections Suitable for large organizations with large amounts of analyzed traffic and a geographically distributed structure
icon_tme_28_02_14_7 icon_tme_28_02_14_12
Accurate detection of sensitive data on the fly, automatic classification of information User-friendly web-interface: the system can be managed from any workstation running any OS (Windows, Linux, Apple Mac OS) and using any browser
icon_tme_28_02_14_8 icon_tme_28_02_14_9
Collection of legally relevant evidence base for investigation of incidents Engagement of all the company’s business units in managing the security of corporate data – the legal department, marketing, HR- service, top managers, etc. with the ability to provide role-based access for different user groups
icon_tme_28_02_14_13 icon_tme_28_02_14_18
Discrimination of areas of responsibility and access levels Own unique technology and world class quality. InfoWatch is the first Russian developer of DLP Solutions to earn a place in the GARTNER MAGIC QUADRANT
icon_tme_28_02_14_10 icon_tme_28_02_14_14
High level of reliability and resilience A comprehensive solution which covered all organizational, technical and legal issues related to a company’s internal security
icon_tme_28_02_14_17 icon_tme_28_02_14_11
Compliance with national privacy laws Industry-specific solutions
icon_tme_28_02_14_15 icon_tme_28_02_14_16
Identification of malicious users (employees): data cards on all employees and their connections Suitable for large organizations with large amounts of analyzed traffic and a geographically distributed structure