SlideShare ist ein Scribd-Unternehmen logo
1 von 23
searchinform.comsearchinform.com
SearchInform DLP
Omni-channel Information Security to prevent data leakage and
harmful activities
searchinform.com
SearchInformToday
 Over 1.600 customers in 8 countries
 Over 10 years on the DLP market, 20 years in the IT industry
 SearchInform DLP monitors over 1.000.000 PCs
 Experienced deployment and support team
 In-house LearningCenter
searchinform.com
Privileged user abuse, employees using their high access levels
to steal sensitive data
Harmful activities: kickbacks, forgery of documents, drug abuse
and distribution, terrorist recruitment, bullying, bashing the
company on the Internet, etc. All these may cost a company
money and/or reputation
InternalThreats
More and more companies and individuals become targets for malicious actors.The main sources
of internal threats are:
• Malicious insiders:
searchinform.com
InternalThreats
Negligent insiders. Such employees may store their password on a
piece of paper stuck to the computer screen, plug in a USB flash
drive found on a parking lot, send sensitive data to a wrong email,
etc.
Exploited insiders can be lured into providing classified
information or even making payments to attackers’ accounts as a
result of blackmailing, social engineering, and other pressure
searchinform.com
Solution
A software solution to tackle these problems must have the following features:
• Monitors in stealth mode
• Controls virtually all information channels
• Includes repository of captured data in order to perform investigations
• Performs monitoring both inside and outside the office
• Detects sensitive content in documents of virtually all types
• Allows you to monitor user screens and employee conversations
retrospectively or in real time
searchinform.com
Each of the components controls its own data channel.The system reveals the paths data travels
through and makes all communications transparent
SearchInform DLP fits the bill
searchinform.com
Overview
SearchInform DLP protects your business against internal threats from all angles:
1. Controls all flows of information
2. Captures the content of messages and attachments
3. Notifies about security policy breaches
4. Helps to investigate incidents and prevent data leaks
Main objective of the solution is to discover data leaks and harmful activities at the
planning stage and prevent them from happening
searchinform.com
How It Works
Communication channels
Email, messengers,
Cloud storages, etc.
Employee activity
Computer activity, transfer of
data to USB sticks, document
printing
Data at rest
Data stored in network
folders, on PCs, etc.
The software controls:
searchinform.com
DLP Components
Captures all incoming and
outgoing email sent via web
browsers (Gmail,Yahoo,
Hotmail) or mail clients
(Outlook, etc.)
Mail Controller
Captures chats on social media
(LinkedIn, Facebook, etc.) and
instant messengers (MSN, Jabber,
ICQ and others), as well as incoming
and outgoing messages from other
popular sites
IM Controller
Captures all communication
via Skype:
Skype Controller
• SMS
• Files
• Chats
• Calls
searchinform.com
DLP Components
Captures data sent or
received over FTP via
ordinary connection or
encrypted SSL connection
FTP Controller
Monitors Cloud inbound or
outbound traffic:
• Google Drive
• Just Cloud
• Mega
Cloud Controller
• OneDrive
• Evernote
• Dropbox
Captures files and messages sent over
HTTP(s) and lets you control:
• Internet forums
• Feedback forms
• Web-based IM clients
HTTP Controller
• Blogs
• Web-chats
• Social media
searchinform.com
DLP Components
Records employee conversations in the office and on
business trips via any detected microphone, built in or
plugged in:
• Non-stop recording
• Recording can be triggered by a program/process
launch
• Recording can be triggered by human speech
• Live sound broadcasting
Microphone Controller
Takes screenshots and records video of workstation
screens. Operates in several modes:
• Takes screenshots on schedule or on event, like
program/process start
• Monitors desktops in real time
• Records screen videos
Monitor Controller
searchinform.com
DLP Components
Monitors the content of documents sent to
printers regardless of the printer model, as
capturing takes place at the OS level
Print Controller
Captures the data transferred by users to
external devices: scanners, modems,
smartphones, tablets, memory sticks, etc.
The module detects all occurrences of
such devices being plugged in
Device Controller
searchinform.com
DLP Components
Collects the data on applications run by
employees during the day and time spent
running the applications.The module
detects whether the user actually operated
the application or the application just ran
unattended
Program Controller
Captures key strokes (logins,
passwords, etc.) as well as data
copied to clipboard. Lets you track
the credentials used to access
potentially dangerous recourses
Key-logger
searchinform.com
DLP Components
Detects suspicious activities
performed by system
administrators. Controls Active
Directory log events: logons and
logoffs, account creation/removal,
security log clearing, etc.
AD Controller
Allows you to detect
occurrence, copying,
movement, and removal of
sensitive data on user
workstations in real time.
Workstation Indexing
Monitors the operations on file
servers and in shared network
folders. Logs all operations with
files: opening, copying, modifying,
deleting, etc.
File Controller
searchinform.com
DLP Architecture
All system modules are based on two platforms. Best results are achieved when they are used in combination:
Network Controller
Control at the network level
Endpoint Controller
Control at the workstation level
Mirrors traffic at the level of the corporate network
(switch)
Captures employee activity by means of agent-programs
installed on workstations
Mail, IM, HTTPS, FTP, Cloud, Active Directory Controllers Mail, IM, Skype, Device, FTP, Print, HTTP, File, Monitor,
Microphone, Cloud Controllers
searchinform.com
DLP Analytical Capabilities
There are 2 main criteria based on which DLP systems can be evaluated: number of channels controlled by the
system and the system’s analytical capabilities. In order to detect suspicious activity in captured data, SI DLP
uses 7 types of search:
• Search by keywords
• Phrase search
• Search with dictionaries
• Attribute search
• Similar-content search
• Search using regular expressions
• Search using digital fingerprints
These analytical capabilities of SearchInform DLP allow one information
security officer to control up to 1000-1500 employees.
searchinform.com
DLP Analytical Capabilities
The system lets you combine the single queries to create complex search algorithms that form the
information security policies. SI DLP includes over 250 predefined security policies:
• Universal security policies for detecting kickbacks and bribery,
negative attitudes among the staff, etc.
• Industry-specific security policies: agriculture and forestry,
mining, manufacturing, gas-, energy-, and water supply, construction,
trade, transport and logistics, information and communications,
finance activity, insurance, state management and defense industry
searchinform.com
What Happens After Incident Detection?
As soon as the system detects a suspicious activity or a policy violation, it sends
a notification to the designated security officer who then initiates an
investigation. Analytical capabilities of the system allow you to restore all
necessary details and prevent data leaks
SI DLP also generates over 30 reports, which help optimize work processes:
• For a supervisor to increase employee productivity
• For an HR to improve work discipline
• For the IT department to automate hardware and software control
searchinform.com
Technical Advantages
Full integration with Windows
domain structure
DLP unambiguously identifies user accounts
and computers regardless of Skype accounts
or mailboxes being used
Computer screen capture
Shows who viewed what information during
the work time. Records videos or takes
screenshots of screen activity and lets you
monitor user screens in real time
1 2
3
Archive of captured data
The system saves all captured data to an archive.
You can always recheck the stored data against
new information security policies
Employee conversations under control
The software records employee voices inside and
outside the office. By enabling the Live Sound
mode, you can listen to employee conversations in
real time
4
searchinform.com
Technical Advantages
Transparency of connections inside
and outside the company
The system analyzes internal and external
social connections of employees.The map of
interactions helps to lead investigations
PC and network resources under
control
Information security officers are able detect
sensitive data in locations where such data is
not supposed to be stored
5 6
7
Protection from system administrators
Event monitoring of Active Directory logs allows
you to detect suspicious activities performed by
system administrators
Reports on software and hardware
The system facilitates stock-taking and software
monitoring. It allows you to optimize IT-
department performance and avoid unnecessary
expenses
8
searchinform.com
Why SearchInform DLP?
Installation takes just
2-3 hours
And this can be done by your
IT staff.You don’t have to
disclose your internal
documents and processes
The deployment will not
interfere with your work
processes
DLP installation does not require any
changes in your local network
structure.Thus the product
deployment will not cause any
downtime or change established
processes.
SI DLP protects your data
offsite
It operates not only at the level of
the local network but also at the
level of each separate computer.The
software secures your data even
when employees work from home or
while on business trips
searchinform.com
Why SearchInform DLP?
Flexible licensing
SearchInform DLP is a multi-
component system.The customer
can purchase the full software suite
or selected modules
Free trial version for 30 days
You get to test the product and
understand its value for your business
before you buy it. Full functionality
and training are provided during the
trial
Constant support of the
deployment department
SearchInform teaches how to operate
the software, helps to work out security
policies, provides consulting on the
interception analysis and keeps you
updated on the new software features
and capabilities
Start your Free Trial today!
SergeiYavchenko
+44 207 043 7152
sy@searchinform.com
searchinform.com

Weitere ähnliche Inhalte

Was ist angesagt?

BlueHat v17 || Securing Windows Defender Application Guard
BlueHat v17 || Securing Windows Defender Application Guard BlueHat v17 || Securing Windows Defender Application Guard
BlueHat v17 || Securing Windows Defender Application Guard BlueHat Security Conference
 
DATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEWDATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEWSylvain Martinez
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak preventionAriel Evans
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in IndonesiaEryk Budi Pratama
 
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykData Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykEryk Budi Pratama
 
NIST 800-92 Log Management Guide in the Real World
NIST 800-92 Log Management Guide in the Real WorldNIST 800-92 Log Management Guide in the Real World
NIST 800-92 Log Management Guide in the Real WorldAnton Chuvakin
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesDimitri Sirota
 
Urgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data PribadiUrgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data PribadiEryk Budi Pratama
 
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementNada G.Youssef
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Sarfaraz Chougule
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationEryk Budi Pratama
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEryk Budi Pratama
 
Qradar - Reports.pdf
Qradar - Reports.pdfQradar - Reports.pdf
Qradar - Reports.pdfPencilData
 
What you need to know about NGSOC. Presented at #CSXAsia #ScavengerHunt about...
What you need to know about NGSOC. Presented at #CSXAsia #ScavengerHunt about...What you need to know about NGSOC. Presented at #CSXAsia #ScavengerHunt about...
What you need to know about NGSOC. Presented at #CSXAsia #ScavengerHunt about...Alan Yau Ti Dun
 
PHP Mailer Remote Code Execution
PHP Mailer Remote Code ExecutionPHP Mailer Remote Code Execution
PHP Mailer Remote Code ExecutionNeelu Tripathy
 
General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001Owako Rodah
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 

Was ist angesagt? (20)

BlueHat v17 || Securing Windows Defender Application Guard
BlueHat v17 || Securing Windows Defender Application Guard BlueHat v17 || Securing Windows Defender Application Guard
BlueHat v17 || Securing Windows Defender Application Guard
 
DATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEWDATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEW
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in Indonesia
 
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykData Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
 
Insider threat
Insider threatInsider threat
Insider threat
 
NIST 800-92 Log Management Guide in the Real World
NIST 800-92 Log Management Guide in the Real WorldNIST 800-92 Log Management Guide in the Real World
NIST 800-92 Log Management Guide in the Real World
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar Slides
 
Urgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data PribadiUrgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data Pribadi
 
SOX- IT Perspective
SOX- IT PerspectiveSOX- IT Perspective
SOX- IT Perspective
 
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident Management
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program Implementation
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
 
Qradar - Reports.pdf
Qradar - Reports.pdfQradar - Reports.pdf
Qradar - Reports.pdf
 
What you need to know about NGSOC. Presented at #CSXAsia #ScavengerHunt about...
What you need to know about NGSOC. Presented at #CSXAsia #ScavengerHunt about...What you need to know about NGSOC. Presented at #CSXAsia #ScavengerHunt about...
What you need to know about NGSOC. Presented at #CSXAsia #ScavengerHunt about...
 
PHP Mailer Remote Code Execution
PHP Mailer Remote Code ExecutionPHP Mailer Remote Code Execution
PHP Mailer Remote Code Execution
 
General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 

Ähnlich wie Search Inform DLP

IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A SurveyIRJET Journal
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10jpmccormack
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostPrecisely
 
Digital Guardian and CDM
Digital Guardian and CDMDigital Guardian and CDM
Digital Guardian and CDMGreg Cranley
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicDhiren Gala
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptxTranVu383073
 
Executive Summary_2016
Executive Summary_2016Executive Summary_2016
Executive Summary_2016Annie Cute
 
Microsoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsMicrosoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsAdeo Security
 
Infowatch endpoint security
Infowatch endpoint securityInfowatch endpoint security
Infowatch endpoint securityhassan latifi
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceJeff Lemmermann
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Robert Crane
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 

Ähnlich wie Search Inform DLP (20)

IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
Siem requirement.pdfsd
Siem requirement.pdfsdSiem requirement.pdfsd
Siem requirement.pdfsd
 
Securitarian
SecuritarianSecuritarian
Securitarian
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter Most
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
Digital Guardian and CDM
Digital Guardian and CDMDigital Guardian and CDM
Digital Guardian and CDM
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 
Executive Summary_2016
Executive Summary_2016Executive Summary_2016
Executive Summary_2016
 
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
 
Microsoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsMicrosoft Avanced Threat Analytics
Microsoft Avanced Threat Analytics
 
Infowatch endpoint security
Infowatch endpoint securityInfowatch endpoint security
Infowatch endpoint security
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
Computer security
Computer securityComputer security
Computer security
 
Mis 1
Mis 1Mis 1
Mis 1
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 

Kürzlich hochgeladen

CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....ShaimaaMohamedGalal
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 

Kürzlich hochgeladen (20)

CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 

Search Inform DLP

  • 1. searchinform.comsearchinform.com SearchInform DLP Omni-channel Information Security to prevent data leakage and harmful activities
  • 2. searchinform.com SearchInformToday  Over 1.600 customers in 8 countries  Over 10 years on the DLP market, 20 years in the IT industry  SearchInform DLP monitors over 1.000.000 PCs  Experienced deployment and support team  In-house LearningCenter
  • 3. searchinform.com Privileged user abuse, employees using their high access levels to steal sensitive data Harmful activities: kickbacks, forgery of documents, drug abuse and distribution, terrorist recruitment, bullying, bashing the company on the Internet, etc. All these may cost a company money and/or reputation InternalThreats More and more companies and individuals become targets for malicious actors.The main sources of internal threats are: • Malicious insiders:
  • 4. searchinform.com InternalThreats Negligent insiders. Such employees may store their password on a piece of paper stuck to the computer screen, plug in a USB flash drive found on a parking lot, send sensitive data to a wrong email, etc. Exploited insiders can be lured into providing classified information or even making payments to attackers’ accounts as a result of blackmailing, social engineering, and other pressure
  • 5. searchinform.com Solution A software solution to tackle these problems must have the following features: • Monitors in stealth mode • Controls virtually all information channels • Includes repository of captured data in order to perform investigations • Performs monitoring both inside and outside the office • Detects sensitive content in documents of virtually all types • Allows you to monitor user screens and employee conversations retrospectively or in real time
  • 6. searchinform.com Each of the components controls its own data channel.The system reveals the paths data travels through and makes all communications transparent SearchInform DLP fits the bill
  • 7. searchinform.com Overview SearchInform DLP protects your business against internal threats from all angles: 1. Controls all flows of information 2. Captures the content of messages and attachments 3. Notifies about security policy breaches 4. Helps to investigate incidents and prevent data leaks Main objective of the solution is to discover data leaks and harmful activities at the planning stage and prevent them from happening
  • 8. searchinform.com How It Works Communication channels Email, messengers, Cloud storages, etc. Employee activity Computer activity, transfer of data to USB sticks, document printing Data at rest Data stored in network folders, on PCs, etc. The software controls:
  • 9. searchinform.com DLP Components Captures all incoming and outgoing email sent via web browsers (Gmail,Yahoo, Hotmail) or mail clients (Outlook, etc.) Mail Controller Captures chats on social media (LinkedIn, Facebook, etc.) and instant messengers (MSN, Jabber, ICQ and others), as well as incoming and outgoing messages from other popular sites IM Controller Captures all communication via Skype: Skype Controller • SMS • Files • Chats • Calls
  • 10. searchinform.com DLP Components Captures data sent or received over FTP via ordinary connection or encrypted SSL connection FTP Controller Monitors Cloud inbound or outbound traffic: • Google Drive • Just Cloud • Mega Cloud Controller • OneDrive • Evernote • Dropbox Captures files and messages sent over HTTP(s) and lets you control: • Internet forums • Feedback forms • Web-based IM clients HTTP Controller • Blogs • Web-chats • Social media
  • 11. searchinform.com DLP Components Records employee conversations in the office and on business trips via any detected microphone, built in or plugged in: • Non-stop recording • Recording can be triggered by a program/process launch • Recording can be triggered by human speech • Live sound broadcasting Microphone Controller Takes screenshots and records video of workstation screens. Operates in several modes: • Takes screenshots on schedule or on event, like program/process start • Monitors desktops in real time • Records screen videos Monitor Controller
  • 12. searchinform.com DLP Components Monitors the content of documents sent to printers regardless of the printer model, as capturing takes place at the OS level Print Controller Captures the data transferred by users to external devices: scanners, modems, smartphones, tablets, memory sticks, etc. The module detects all occurrences of such devices being plugged in Device Controller
  • 13. searchinform.com DLP Components Collects the data on applications run by employees during the day and time spent running the applications.The module detects whether the user actually operated the application or the application just ran unattended Program Controller Captures key strokes (logins, passwords, etc.) as well as data copied to clipboard. Lets you track the credentials used to access potentially dangerous recourses Key-logger
  • 14. searchinform.com DLP Components Detects suspicious activities performed by system administrators. Controls Active Directory log events: logons and logoffs, account creation/removal, security log clearing, etc. AD Controller Allows you to detect occurrence, copying, movement, and removal of sensitive data on user workstations in real time. Workstation Indexing Monitors the operations on file servers and in shared network folders. Logs all operations with files: opening, copying, modifying, deleting, etc. File Controller
  • 15. searchinform.com DLP Architecture All system modules are based on two platforms. Best results are achieved when they are used in combination: Network Controller Control at the network level Endpoint Controller Control at the workstation level Mirrors traffic at the level of the corporate network (switch) Captures employee activity by means of agent-programs installed on workstations Mail, IM, HTTPS, FTP, Cloud, Active Directory Controllers Mail, IM, Skype, Device, FTP, Print, HTTP, File, Monitor, Microphone, Cloud Controllers
  • 16. searchinform.com DLP Analytical Capabilities There are 2 main criteria based on which DLP systems can be evaluated: number of channels controlled by the system and the system’s analytical capabilities. In order to detect suspicious activity in captured data, SI DLP uses 7 types of search: • Search by keywords • Phrase search • Search with dictionaries • Attribute search • Similar-content search • Search using regular expressions • Search using digital fingerprints These analytical capabilities of SearchInform DLP allow one information security officer to control up to 1000-1500 employees.
  • 17. searchinform.com DLP Analytical Capabilities The system lets you combine the single queries to create complex search algorithms that form the information security policies. SI DLP includes over 250 predefined security policies: • Universal security policies for detecting kickbacks and bribery, negative attitudes among the staff, etc. • Industry-specific security policies: agriculture and forestry, mining, manufacturing, gas-, energy-, and water supply, construction, trade, transport and logistics, information and communications, finance activity, insurance, state management and defense industry
  • 18. searchinform.com What Happens After Incident Detection? As soon as the system detects a suspicious activity or a policy violation, it sends a notification to the designated security officer who then initiates an investigation. Analytical capabilities of the system allow you to restore all necessary details and prevent data leaks SI DLP also generates over 30 reports, which help optimize work processes: • For a supervisor to increase employee productivity • For an HR to improve work discipline • For the IT department to automate hardware and software control
  • 19. searchinform.com Technical Advantages Full integration with Windows domain structure DLP unambiguously identifies user accounts and computers regardless of Skype accounts or mailboxes being used Computer screen capture Shows who viewed what information during the work time. Records videos or takes screenshots of screen activity and lets you monitor user screens in real time 1 2 3 Archive of captured data The system saves all captured data to an archive. You can always recheck the stored data against new information security policies Employee conversations under control The software records employee voices inside and outside the office. By enabling the Live Sound mode, you can listen to employee conversations in real time 4
  • 20. searchinform.com Technical Advantages Transparency of connections inside and outside the company The system analyzes internal and external social connections of employees.The map of interactions helps to lead investigations PC and network resources under control Information security officers are able detect sensitive data in locations where such data is not supposed to be stored 5 6 7 Protection from system administrators Event monitoring of Active Directory logs allows you to detect suspicious activities performed by system administrators Reports on software and hardware The system facilitates stock-taking and software monitoring. It allows you to optimize IT- department performance and avoid unnecessary expenses 8
  • 21. searchinform.com Why SearchInform DLP? Installation takes just 2-3 hours And this can be done by your IT staff.You don’t have to disclose your internal documents and processes The deployment will not interfere with your work processes DLP installation does not require any changes in your local network structure.Thus the product deployment will not cause any downtime or change established processes. SI DLP protects your data offsite It operates not only at the level of the local network but also at the level of each separate computer.The software secures your data even when employees work from home or while on business trips
  • 22. searchinform.com Why SearchInform DLP? Flexible licensing SearchInform DLP is a multi- component system.The customer can purchase the full software suite or selected modules Free trial version for 30 days You get to test the product and understand its value for your business before you buy it. Full functionality and training are provided during the trial Constant support of the deployment department SearchInform teaches how to operate the software, helps to work out security policies, provides consulting on the interception analysis and keeps you updated on the new software features and capabilities
  • 23. Start your Free Trial today! SergeiYavchenko +44 207 043 7152 sy@searchinform.com searchinform.com