Sunteți pe pagina 1din 3

T M

T M inDefend Business Cyber Security Intelligence Platfor m Supported - Windows- XP SP2 and SP3,

inDefend Business

Cyber Security Intelligence

T M inDefend Business Cyber Security Intelligence Platfor m Supported - Windows- XP SP2 and SP3,

Platfor m Supported

- Windows- XP SP2 and SP3, Vista, 7, 8 and above

- Mac OSX- Mountain Lion, Mavericks, Yosemite

- Linux- Both 32 & 64-bit flavours of following distributions:

- Ubuntu 10.10 and above

- Fedora - Fedora 14 and above

- CentOS - 6.x only

- RHEL - 6.x only

- OpenSUSE - 11.3 and above

- 6.x only - RHEL - 6.x only - OpenSUSE - 11.3 and above Agent requirements

Agent requirements

- 512 MB & above RAM

- 5GB Hard disk & above

- Intel Pentium IV and above

RAM - 5GB Hard disk & above - Intel Pentium IV and above A 360 Insider

A 360 Insider Data Theft Management Solution

Insider data theft has been the major issue which information security experts are tackling nowadays. Multiple security controls both physical and application are implemented and still data gets leaked out, the major loop hole being overlooking the insiders. Employees or partners working are having the most critical data and if by social engineering any of the asset is compromised, it can lead to a major drawback in the security mechanism of the organization. With such issues being encountered across the globe in enterprises, Data Resolve has come up with an insider data theft suite which targets and monitors employee’s activities along with setting up controls in order to prevent data leakage.

How inDefend can help?

InDefend provides a complete round about approach for tackling the insider data leakage scenarios and post incident forensics. And this is done by monitoring all the channels via which data leakage can happen like, chats, emails, removable media, file uploads, applications.

Data Leakage Prevention

- Email control:

SMTP emails controlapplications. Data Leakage Prevention - Email control: Microsoft exchange server emails control Gmail emails

Microsoft exchange server emails controlData Leakage Prevention - Email control: SMTP emails control Gmail emails monitoring and control Content based

Gmail emails monitoring and controlSMTP emails control Microsoft exchange server emails control Content based alerting mechanism for sensitive content in

Content based alerting mechanism for sensitive content in mail body or attachmentserver emails control Gmail emails monitoring and control Alerting mechanism for encrypted file being mailed -

Alerting mechanism for encrypted file being mailedmechanism for sensitive content in mail body or attachment - Removable Media Data transaction control: File

- Removable Media Data transaction control:

File transfer blocking onto removable mediabeing mailed - Removable Media Data transaction control: Read only enablement for the files present in

Read only enablement for the files present in removable mediacontrol: File transfer blocking onto removable media - Application control: Category wise Application blocking

- Application control:

Category wise Application blockingthe files present in removable media - Application control: Application whitelisting - Website control: Web Content

Application whitelisting- Application control: Category wise Application blocking - Website control: Web Content Filtering Category based

- Website control:

Web Content Filteringblocking Application whitelisting - Website control: Category based Website blocking Website blacklisting Website

Category based Website blockingwhitelisting - Website control: Web Content Filtering Website blacklisting Website Whitelisting Website exception

Website blacklistingWeb Content Filtering Category based Website blocking Website Whitelisting Website exception adding - File Upload

Website WhitelistingCategory based Website blocking Website blacklisting Website exception adding - File Upload Control: Extension

Website exception addingWebsite blocking Website blacklisting Website Whitelisting - File Upload Control: Extension based file blocking

- File Upload Control:

Extension based file blockingWhitelisting Website exception adding - File Upload Control: Destination whitelisting for File uploads Content based

Destination whitelisting for File uploadsadding - File Upload Control: Extension based file blocking Content based alerting mechanism for sensitive content

Content based alerting mechanism for sensitive content in any file being uploadedfile blocking Destination whitelisting for File uploads Alerting mechanism for encrypted file being uploaded Device

Alerting mechanism for encrypted file being uploadedmechanism for sensitive content in any file being uploaded Device Control - Device Whitelisting: Selective allowing

Device Control

- Device Whitelisting:

Selective allowing of USBs at organizational endpointsfile being uploaded Device Control - Device Whitelisting: - Device Registering: Registering of USBs for Device

- Device Registering:

Registering of USBs for Device whitelistingof USBs at organizational endpoints - Device Registering: - Device blocking: MTP device blocking Removable media

- Device blocking:

MTP device blockingRegistering: Registering of USBs for Device whitelisting - Device blocking: Removable media blocking CD/DVD blocking

Removable media blocking- Device Registering: Registering of USBs for Device whitelisting - Device blocking: MTP device blocking CD/DVD

CD/DVD blockingRegistering: Registering of USBs for Device whitelisting - Device blocking: MTP device blocking Removable media blocking

Employee Forensics

- Screen shot Monitoring:

Regular screen shots of employee screen activities

Regular screen shots of employee screen activities

Shadow copying of all the browser based File uploads 

 

Shadow copying of all the SMTP, Microsoft Exchange Server and Gmail emailscopying of all the browser based File uploads   Enforced encryption to enable the data transferred

Enforced encryption to enable the data transferred to removable media in an encrypted vault

Enforced encryption to enable the data transferred to removable media in an encrypted vault

Restricting the access of the internal data present in removable media from being accessed from

Restricting the access of the internal data present in removable media from being accessed from any guest computer

Skype and GTalk chat monitoring 

 

Sensitive chat segregationany guest computer Skype and GTalk chat monitoring   Gmail and corporate emails monitoring Webmail and

Gmail and corporate emails monitoringGTalk chat monitoring   Sensitive chat segregation Webmail and corporate emails attachment monitoring Mails

Webmail and corporate emails attachment monitoringchat segregation Gmail and corporate emails monitoring Mails with BCC and BCC with attachment’s segregation

Mails with BCC and BCC with attachment’s segregationWebmail and corporate emails attachment monitoring Browser based file upload monitoring Employee search engine

Browser based file upload monitoring

Browser based file upload monitoring

Employee search engine activity monitoring 

 

Sensitive search engine activity segregationEmployee search engine activity monitoring   Internet browser behavior analysis Time based reports on the

Internet browser behavior analysis  Sensitive search engine activity segregation Time based reports on the basis of Websites and

Time based reports on the basis of Websites and articles/videos being viewedactivity segregation Internet browser behavior analysis Time based reports on the basis of Applications being used

Time based reports on the basis of Applications being used 

 

Application behavior analysisreports on the basis of Applications being used   Removable media data transaction monitoring Removable media

Removable media data transaction monitoringbeing used   Application behavior analysis Removable media usage activity monitoring File transfer

Removable media usage activity monitoringanalysis Removable media data transaction monitoring File transfer monitoring onto removable media InDefend

File transfer monitoring onto removable mediamonitoring Removable media usage activity monitoring InDefend Business Deployment Model:   In cloud

InDefend Business Deployment Model:

 
media InDefend Business Deployment Model:   In cloud model, the server is hosted on cloud so

In cloud model, the server is hosted on cloud so no additional hardware procurement is needed and all the machines directly communicate with the server via any internet connectivity. And its dashboard can be accessed 24*7 across the globe.

- Shadow logging:

Encryption

- Enforced Encryption:

- Internal Access Restriction:

Employee Monitoring

- Chat Monitoring:

- Email Monitoring:

- File Upload Monitoring:

- Search activity Monitoring:

- Browsing activity Monitoring:

- Application Activity Monitoring:

- Device Activity Monitoring:

T M

Activity Monitoring: - Device Activity Monitoring: T M inDefend Business Cyber Security Intelligence K ey Benefit

inDefend Business

Cyber Security Intelligence

T M inDefend Business Cyber Security Intelligence K ey Benefit s - Tamper proof solution -

Key Benefits

- Tamper proof solution

- Single centralized dashboard

- Employee endpoint behavior analysis

- Provides a holistic approach across all the endpoint channels

- Enforced encryption provides an additional security mechanism for removable media data transactions

T M

T M inDefend Business Cyber Security Intelligence FrorF For Free Evaluation, please connect with us @:

inDefend Business

Cyber Security Intelligence

FrorF
FrorF

For Free Evaluation, please connect with us @:

sales@dataresolve.com, +91 9266603983

connect with us @: sales@dataresolve.com, +91 9266603983 Registered Office - Kolkata 3rd & 4th Floor, Arcadia

Registered Office - Kolkata 3rd & 4th Floor, Arcadia Centre, Premise No. 31, Dr. Ambedkar Sarani Kolkata - 700 046, INDIA

Corporate Office:

2/F, Elegance Tower, Jasola District Centre, Mathura Road, New Delhi - 110025, INDIA

District Centre, Mathura Road, New Delhi - 110025, INDIA In premise model, the server is hosted
District Centre, Mathura Road, New Delhi - 110025, INDIA In premise model, the server is hosted

In premise model, the server is hosted within the organizational network and dashboard is accessible from within the company WAN. In premise model the users within the network are connected via internal IP and the remote users are assigned public IP which is mapped with internal IP for all time policy and log synchronization.

internal IP for all time policy and log synchronization. InDefend suite has a centralized dashboard which

InDefend suite has a centralized dashboard which has analytics of all the endpoints that are being monitored. Features like SMS gateway, Daily email alerts can be configure from here along with multiple security policies.

Server Requirements

The configuration of the inDefend Business server depends on the number of

systems you need to protect. For example, an organization with up to 300 systems to be protected can be supported by a dedicated server computer with:

- 4 GB RAM

- 500 GB free hard disk space

- Intel ® Core 2 Duo and above CPU with minimum frequency 2.5 Ghz