Sunteți pe pagina 1din 22

SearchInform DLP

Omni-channel Information Security to prevent data leakage and


harmful activities
SearchInform Today

Over 1.600 customers in 8 countries


Over 10 years on the DLP market, 20 years in the IT industry
SearchInform DLP monitors over 1.000.000 PCs
Experienced deployment and support team
In-house Learning Center
Our Approach
The software controls:

DLP Employee behavior Education and support


Network Connections and Experienced deployment and
Endpoint communications, views and support team
Data at rest ideas, computer activity
Our Approach

Information security must not interfere with how you run your
business

All communication channels are at your service and under


control
How It Works
The software controls:

Communication channels Employee activity Data at rest


Email, messengers, Computer activity, transfer of Data stored in network
Cloud storages, etc. data to USB sticks, document folders, on PCs, etc.
printing
DLP Architecture
All system modules are based on two platforms. Best results are achieved when they are used in combination:

NetworkSecurity EndpointSecurity
Controls traffic at the network level Controls traffic at the workstation level

Mirrors traffic at the level of the corporate network Captures employee activity by means of agent-programs
(switch) installed on workstations

Mail, Instant Messengers, HTTP, FTP, Cloud, Active Mail, IM, Skype, Device, FTP, Print, HTTP, Files, Monitor,
Directory Microphone, Cloud
Channel Controllers
Each one controls its own data channel. The system reveals the paths data travels through and makes
all communications transparent
Controllers

MailController IMController SkypeController


Captures all incoming and Captures chats on social media Captures all communication
outgoing email sent via web (LinkedIn, Facebook, etc.) and via Skype:
browsers (Gmail, Yahoo, instant messengers (MSN, Jabber,
Chats SMS
Hotmail) or mail clients ICQ and others), as well as incoming
Calls Files
(Outlook, etc.) and outgoing messages from other
popular sites
Controllers

HTTPController FTPController CloudController


Captures files and messages sent over Captures data sent or Monitors Cloud inbound or
HTTP(s) and lets you control: received over FTP via outbound traffic:
ordinary connection or
Internet forums Blogs encrypted SSL connection Google Drive OneDrive
Feedback forms Web-chats Just Cloud Evernote
Web-based IM clients Social media Mega Dropbox
Controllers

MonitorController MicrophoneController
Takes screenshots and records videos of workstation Records employee conversations in the office and on
screens. Operates in several modes: business trips via any detected microphone, built in or
plugged in:

Takes screenshots on schedule or on event, like Non-stop recording


program/process start Recording can be triggered by a program/process
Monitors desktops in real time launch
Records screen videos Recording can be triggered by human speech
Live sound broadcasting
Controllers

PrintController DeviceController
Monitors the content of documents sent to Captures the data transferred by users to
printers regardless of the printer model, as external devices: scanners, modems,
capturing takes place at the OS level smartphones, tablets, memory sticks, etc.
The module detects all occurrences of
such devices being plugged in
Controllers

Keylogger ProgramController

Captures key strokes (logins, Collects the data on applications run by


passwords, etc.) as well as data employees during the day and time spent
copied to clipboard. Lets you track running the applications. The module
the credentials used to access detects whether the user actually operated
potentially dangerous recourses the application or the application just ran
unattended
Controllers

ADController Workstation Indexing FileController

Detects suspicious activities Monitors the operations on file


Allows you to detect
performed by system servers and in shared network
occurrence, copying,
administrators. Controls Active folders. Logs all operations with
movement, and removal of
Directory log events: logons and files: opening, copying, modifying,
sensitive data on user
logoffs, account creation/removal, deleting, etc.
workstations in real time.
security log clearing, etc.
Search
In order to detect suspicious activity in captured data, SI DLP uses 7 types of search:

Search by keywords Similar-content search


Phrase search Search using regular expressions
Search with dictionaries Search using digital fingerprints
Attribute search

The system lets you combine single queries to create complex search algorithms that
form the information security policies.

These analytical capabilities of SearchInform DLP allow one information


security officer to control up to 1000-1500 employees.
Analysis
The system lets you combine single queries to create complex search algorithms that form the information
security policies. To insure a smooth start SI DLP includes over 150 predefined security policies:

Universal security policies for detecting kickbacks and bribery,


drug an alcohol abuse & distribution, terrorist recruitment, negative
attitudes, etc.
Industry-specific security policies: agriculture and forestry,
mining, manufacturing, gas-, energy-, and water supply, construction,
trade, transport and logistics, information and communications,
finance activity, insurance, state management and defense industry
What Happens After Incident Detection

As soon as the system detects a suspicious activity or a policy violation, it sends


a notification to the designated security officer who then initiates an
investigation. Analytical capabilities of the system allow you to restore all
necessary details and prevent data leaks

SI DLP also generates over 30 reports, which help optimize work processes:

For a supervisor to increase employee productivity


For an HR to improve work discipline
For the IT department to automate hardware and software control
Internal Threats
More and more companies and individuals become targets for malicious actors. The main sources
of internal threats are:
Malicious insiders:

Privileged user abuse, employees using their high access levels


to steal sensitive data

Harmful activities: kickbacks, forgery of documents, drug abuse


and distribution, terrorism recruitment, bullying, bashing the
company on the Internet, etc. All these may cost a company
money and/or reputation
Internal Threats

Negligent insiders. Such employees may store their password on a


piece of paper stuck to the computer screen, plug in a USB flash
drive found on a parking lot, send sensitive data to a wrong email,
etc.

Exploited insiders can be lured into providing classified


information or even making payments to attackers accounts as a
result of blackmailing, social engineering, and other pressure
Solution
A software solution to tackle these problems must have the following features:

Monitors in stealth mode


Controls virtually all information channels
Includes repository of captured data in order to perform investigations
Performs monitoring both inside and outside the office
Detects sensitive content in documents of virtually all types
Allows you to monitor user screens and employee conversations
retrospectively or in real time
Why SearchInform DLP

Installation takes just The deployment will not SI DLP protects your data
2-3 hours interfere with your work offsite
processes
And this can be done by your DLP installation does not require any It operates not only at the level of
IT staff. You dont have to changes in your local network the local network but also at the
disclose your internal structure. Thus the product level of each separate computer. The
documents and processes deployment will not cause any software secures your data even
downtime or change established when employees work from home or
processes. while on business trips
Why SearchInform DLP

Flexible licensing Free trial version for 30 days Constant support of the
deployment department
You get to test the product and SearchInform teaches how to operate
SearchInform DLP is a multi- understand its value for your business the software, helps to work out security
component system. The customer before you buy it. Full functionality policies, provides consulting on the
can purchase the full software suite and training are provided during the interception analysis and keeps you
or selected modules trial updated on the new software features
and capabilities
Start your Free Trial today!

Narender Singh
+971 55 5480026
narender@gobind-tech.com
Gobind-tech.com

S-ar putea să vă placă și