SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
A GREAT TOOL FOR OPTIMIZING WORKFLOWS, IMPROVING EMPLOYEE PRODUCTIVITY, REDUCING FINANCIAL LOSSES AND DAMAGE
TO REPUTATION, AND CUTTING THE COSTS OF PROTECTING YOUR INFRASTRUCTURE AND INFORMATION.
InfoWatch EndPoint Security targets the typical tasks facing small and medium businesses. This solution is specifically
designed to:
Discover resources for improving business efficiency
Take over control of employee productivity
Guide employees in handling data that are crucial to business efficiency, operating company equipment, reducing power
costs and eliminating personal use of company resources
Increase savings on personnel recruitment and training, and reduce the need for additional equipment
Enable regulation compliance regarding information security and the protection of devices used for data storage
INFOWATCH ENDPOINT SECURITY
40%of employees spend their
work time on personal activ-
ities, such as, viewing enter-
tainment content and videos,
playing computer games etc.
InfoWatch EndPoint Securi-
ty reduces this percentage
substantially.
70%of employees keep highly
confidential company data
(including financial docu-
ments, client and supplier
databases, and personal
information) on flash drives
for easy access during meet-
ings, business trips, con-
ferences, for work remotely
etc. Of those flash drives,
60% are regularly lost or for-
gotten, exposing client data-
bases to competitors, which
causes irreparable loss for
businesses. InfoWatch End-
Point Security helps prevent
such consequences.
96%of small to medium compa-
nies have to deal with client
database losses every year.
InfoWatch EndPoint Security
is designed to eradicate this
problem.
68%of companies with less than
200 employees are exposed
to attacks which target files
stored in the cloud.
InfoWatch EndPoint Security
provides secure remote
storage, encryption and
control of access to data in
the cloud.
«Idleness»
The average loss suffered by
small to medium companies
because of employees’
«idleness» amounts to 10%
of their monthly income.
InfoWatch EndPoint Security
eliminates the cost of
personnel inefficiency.
4 out of 5
companies lack proper
defense against malicious
software that is brought
into the office by employees
on flash drives and other
media.
InfoWatch EndPoint Securi-
ty provides comprehensive
control of device connection
to company PCs and the data
on those devices, safeguard-
ing PCs from dangerous ap-
plications.
If the data on a laptop are
encrypted, the cost of losing
the device equals the price
of the laptop; if not, the loss
will amount to hundreds of
thousands of US dollars.
InfoWatch EndPoint Securi-
ty allows losses to be min-
imized, protecting valuable
data.
Computers running during
off-work hours is standard
practice in many offices. In
30% of such cases these
PCs are accessed by third
parties who copy the data to
portable media.
InfoWatch EndPoint Securi-
ty eliminates such incidents
by switching off employees’
computers at the end of the
working day on a regular
schedule, which also reduc-
es power costs.
Disarray, chaotic workflow
systems
What are the main causes of low business efficiency?
25%
35%
40%
55%
Employees’ «idleness»
Employees distracted by
playing games and viewing
entertainment content
Employees leaving
companies with client
databases; client poaching
What types of information are lost on flash drives?
Development plans,
incl. marketing
strategy 3%
Financial data 35%
Contracts & other legal
documents 5%
Other 2%
Client/supplier
databases 55%
5%
3%
35%
2%
55%
FUNCTIONAL FEATURES
Control of employees’ access to valuable data
InfoWatch EndPoint Security allows increased efficiency of
workflow management and ensures tiered access to external
devices for employees.
InfoWatch EndPoint Security can manage more than 24 types of
devices and external media!
Employees actively use portable media, flash drives, tablets,
smartphones and other communication devices at work, which
implies considerable risks of valuable information being copied
and used for personal purposes. This may cause irreparable
harm for a company’s business and reputation. A virus from an
employee’s flash drive might compromise a company’s entire IT
infrastructure, blocking the operation of core business units for
several hours or days.
Automatic monitoring of unauthorized employee activity
InfoWatch EndPoint Security supports event logs and allows the
discovery of unauthorized handling of valuable information by
employees. Automatic report generation enables the discovery
of bottlenecks in the operations of office employees and extra
resources to be located to enhance their productivity.
An employee’s working day can be quite diversified, including:
playing computer games, watching movies, or printing
documents for personal use. 70% of companies do not track
employees’ activity during work time, or the files and data
they bring in or take away with them. This information is not
registered in any way.
INFOWATCH ENDPOINT SECURITY
The solution enables full control of access to devices, ports, network interfaces and catalogs, and to cloud storage systems.
It offers a variety of features to control access rights:
– By means of black and white lists of devices	
– By device models (with exclusive access to devices according to the list of authorized device models)
– By serial numbers of devices (with exclusive access to devices with certain serial numbers, irrespective of user privileges)
– Through a list of authorized media and a list of authorized wireless networks (with exclusive access to authorized wi-fi networks)
Event logs in InfoWatch
EndPoint Security display
useractivitiesperemployee:
i. e., who performed certain
operations and when
(reading, copying, creating
or deleting data) using
removable media, phones,
Wi-Fi networks, network
folders, and cloud storage.
The shadow copying feature
allows access to files
specified in the logs directly
from the product console.
Data control during copying and storing, on premises and in the cloud
Easy:
Data encryption does not interfere with employees’
work and does not disrupt production.
Safe:
The loss or theft of media does not lead to data abuse
by outsiders.
InfoWatch EndPoint Security monitors all files uploaded to Dropbox,
OneDrive, GoogleDrive, Yandex.Disk, or BoxSync by employees and
authorizes external storage of files based on document type and data
format.
InfoWatch EndPoint Security allows to share files over the cloud storage,
eliminating concerns about data security.
Small to medium companies actively use the cloud
to store and exchange information, but only a small
percentage of these companies make sure their cloud
data are protected. Over 80% of IT specialists are not
even aware of the amount of data stored in the cloud,
let alone the nature of those data or their value for the
business.
INFOWATCH ENDPOINT SECURITY
Clients can choose a separate data encryption method for each cloud provider. Encryption keys are stored at the client’s site, not in the
cloud, which ensures that they are never exposed to outsiders. Encryption is performed transparently at file level, so that employees are
not involved in the process. This eliminates the possibility for employees to ignore or bypass this mechanism or to distribute unprotected
confidential documents outside the company.
Transparent:
Data are automatically encrypted when recorded to
media and decrypted when copied to hard drives.
Flexible:
Solvingvariousbusinessproblemsthroughencryption:
you can grant access to encrypted files to all company
employees, to a group of users (e.g., employees of a
given department) or to a single employee.
Encryption with InfoWatch EndPoint Security is:
Protection against data theft from lost laptops or flash drives
InfoWatch EndPoint Security offers an easy and effortless way of protecting information through
encryption. By enabling encryption in InfoWatch EndPoint Security, you can significantly enhance
the security of stored data:
– No outsiders can read the data
– The theft or loss of devices do not cause information leaks
– All data are automatically encrypted at creation without interference for employees, or requiring
additional work by IT personnel (transparent encryption)
Portable media and laptops are
the weakest link of any corporate
infrastructure, as they are
very often lost or forgotten by
employees.
Application Control
InfoWatch EndPoint Security allows businesses
to manage the launch of applications and control
employees’ access to applications by means of white
lists (of authorized applications) and black lists (of
blocked applications). This feature guarantees that
no prohibited applications or files are installed or
launched on any company PC.
Games, movies, music, and entertainment content… Are you sure that your
employees aren’t watching a new film at work right now? That they are not
playing games? What tools does your company use to monitor these problems?
Uncontrolled use of various applications by employees reduces their
productivity, causing them to lag behind with tasks, which eventually leads to
business losses because of inefficiency.
INFOWATCH ENDPOINT SECURITY
The solution enables data encryption on laptops, PCs, external devices, network drives, and in cloud storage directories.
The encryption is carried out in the background and is fully transparent to employees. The solution employs the AES–256 OS encryption
algorithm with 1,024 to 4,096-bit key lengths.
InfoWatch EndPoint Security provides two ways of enabling encryption: optional, by employees, and mandatory, by system administrators.
The mobile encryption feature of InfoWatch EndPoint Security allows secure off-site data processing.
The solution includes a learning mode; in this mode the product automatically tracks applications launched from employees’ PCs and
generates a list of trusted applications. This feature can be used to create a list of trusted applications categorized by applications developer
and extension or file signature, and to setup rules for launching applications for individual employees, workstations, etc.
CLASSIC FEATURES OF INFOWATCH ENDPOINT SECURITY ARE DESCRIBED BY A SIMPLE ACRONYM C.A.F.E.
– REVEALING THE CONCEPT OF THE PRODUCT AS AN EASY AND ROBUST PROTECTIVE TOOL TO ASSIST THE
DEVELOPMENT OF A GROWING COMPANY:
INFOWATCH ENDPOINT SECURITY
Control over connections to external
devices
Audit of user activity
Filtering by data type
Encryption of data written to portable
media, network folders and cloud
storage
InfoWatch EndPoint
Security Server
InfoWatch EndPoint
Security Agent
InfoWatch EndPoint
Security Agent
InfoWatch EndPoint
Security Agent
InfoWatch EndPoint
Security Agent
Management console
Management console
for iPhone
O ine
client
Domain Controller
Novell eDirectory
InfoWatch EndPoint
Security
SQL Server TAN
InfoWatch EndPoint Security:
Perfect for small and medium business
Fits the needs of any company, irrespective of industry or
profile
Alert to companies’ business processes
Available even for small budgets
Intuitive and user-friendly
Easy installation and setup
No extra network load
Inconspicuous to employees
Compatible with any software, including anti-virus
programs
A single management console
+7 (495) 22-900-22 IW-Global@infowatch.com www.infowatch.com
BENEFITS FOR BUSINESS
INFOWATCH ENDPOINT SECURITY
– InfoWatch EndPoint Security substantially reduces the risks associated with data leakage: client databases copied to flash
drives and passed to competitors may well put a company out of business. The product eliminates the risk of loss or theft of
valuable information because its encryption feature can be used for any portable media and laptops, or for data transferred
to cloud storage.
– The solution reduces bandwidth consumption: InfoWatch EndPoint Security settings allow most traffic-consuming
operations that are not job-related to be eliminated.
– The solution reduces personnel costs: it incorporates very simple installation, setup and management procedures that can
be performed without hiring a qualified administrator or IS officer.
– The solution reduces power costs: its power control feature allows PCs to be switched on and off on a regular schedule, if
employees forget to do so.
– The solution reduces the cost of additional hardware, services and applications: InfoWatch EndPoint Security does not
require the purchase of any extra hardware or software, and because of its encryption system many business features, such
as document workflow management, can be deployed in the cloud, which facilitates clear cost reduction.
Reduction of business costs and financial losses
All necessary features in one product
InfoWatch EndPoint Security does not contain any unnecessary functionality. All tasks concerning protection of information
are integrated in the single user-friendly interface, which covers only decisive aspects of information security.
Business process awareness
InfoWatch EndPoint Security is easily adjustable to company workflows because of its modular, multicomponent structure:
by pinpointing weak points in your business processes, you can provide targeted protection for such areas without restricting
access to assets that are needed to complete the company’s work.
Robust and high-quality product
Only 1% of 1,000 companies that have installed InfoWatch EndPoint Security require support services. Faultless operation of
the product eliminates concerns for system administrators, management and end users.
Extreme simplicity and usability
InfoWatch EndPoint Security can be installed and configured in 20 minutes, without any special qualifications or training, and
it can be managed with a few clicks. The simplicity of these procedures is facilitated by the intuitive interface and business
logic of the product.
Affordable even on a small budget
The price of InfoWatch EndPoint Security fits into the operating budget of any company.
Compatibility and productivity
InfoWatch EndPoint Security is fully compatible with any corporate devices, systems and applications.

Weitere ähnliche Inhalte

Was ist angesagt?

Emerging Technologies
Emerging TechnologiesEmerging Technologies
Emerging TechnologiesAnjan Mahanta
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionGianmarco Ferri
 
The Economic Impact of File Virtualization
The Economic Impact of File VirtualizationThe Economic Impact of File Virtualization
The Economic Impact of File VirtualizationFindWhitePapers
 
3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputationNikec Solutions
 
Security White Paper
Security White PaperSecurity White Paper
Security White PaperMobiWee
 
Bring your own device guidance
Bring your own device guidanceBring your own device guidance
Bring your own device guidanceGary Chambers
 
An Introduction to zOS Real-time Infrastructure and Security Practices
An Introduction to zOS Real-time Infrastructure and Security PracticesAn Introduction to zOS Real-time Infrastructure and Security Practices
An Introduction to zOS Real-time Infrastructure and Security PracticesJerry Harding
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security AwarenessDinesh O Bareja
 
SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析
SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析
SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析Cheer Chain Enterprise Co., Ltd.
 
Data Sanitization: When, Why & How
Data Sanitization: When, Why & How Data Sanitization: When, Why & How
Data Sanitization: When, Why & How Blancco
 
Data Sanitization: What, Why, When and How?
Data Sanitization: What, Why, When and How?Data Sanitization: What, Why, When and How?
Data Sanitization: What, Why, When and How?Baltimax
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET Journal
 
Data Sanitization and Disposal: Best Practices
Data Sanitization and Disposal: Best PracticesData Sanitization and Disposal: Best Practices
Data Sanitization and Disposal: Best PracticesAvritek
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsLindaWatson19
 
Protecting pii and phi exec summary
Protecting pii and phi   exec summaryProtecting pii and phi   exec summary
Protecting pii and phi exec summaryJoe Orlando
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergdawnrk
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataOnline Business
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET Journal
 

Was ist angesagt? (19)

Emerging Technologies
Emerging TechnologiesEmerging Technologies
Emerging Technologies
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtection
 
The Economic Impact of File Virtualization
The Economic Impact of File VirtualizationThe Economic Impact of File Virtualization
The Economic Impact of File Virtualization
 
3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation
 
Security White Paper
Security White PaperSecurity White Paper
Security White Paper
 
Bring your own device guidance
Bring your own device guidanceBring your own device guidance
Bring your own device guidance
 
An Introduction to zOS Real-time Infrastructure and Security Practices
An Introduction to zOS Real-time Infrastructure and Security PracticesAn Introduction to zOS Real-time Infrastructure and Security Practices
An Introduction to zOS Real-time Infrastructure and Security Practices
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness
 
Dlp notes
Dlp notesDlp notes
Dlp notes
 
SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析
SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析
SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析
 
Data Sanitization: When, Why & How
Data Sanitization: When, Why & How Data Sanitization: When, Why & How
Data Sanitization: When, Why & How
 
Data Sanitization: What, Why, When and How?
Data Sanitization: What, Why, When and How?Data Sanitization: What, Why, When and How?
Data Sanitization: What, Why, When and How?
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
 
Data Sanitization and Disposal: Best Practices
Data Sanitization and Disposal: Best PracticesData Sanitization and Disposal: Best Practices
Data Sanitization and Disposal: Best Practices
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production Environments
 
Protecting pii and phi exec summary
Protecting pii and phi   exec summaryProtecting pii and phi   exec summary
Protecting pii and phi exec summary
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
 

Andere mochten auch

Havas Digital - Social Media Attribution
Havas Digital - Social Media AttributionHavas Digital - Social Media Attribution
Havas Digital - Social Media AttributionHavas Media Miami
 
CAF- Iniciativa Regional de Patentes Tecnológicas para el Desarrollo
CAF-  Iniciativa Regional de Patentes Tecnológicas para el DesarrolloCAF-  Iniciativa Regional de Patentes Tecnológicas para el Desarrollo
CAF- Iniciativa Regional de Patentes Tecnológicas para el DesarrolloCafé Innovación
 
3 c 3d_leave_v5_0_ext
3 c 3d_leave_v5_0_ext3 c 3d_leave_v5_0_ext
3 c 3d_leave_v5_0_extxmuxcwtb
 
Las TIC como alternativa innovadora a las tradicionales tareas para casa
Las TIC como alternativa innovadora a las tradicionales tareas para casaLas TIC como alternativa innovadora a las tradicionales tareas para casa
Las TIC como alternativa innovadora a las tradicionales tareas para casaCarmen Gallego-Domínguez
 
Digitalisierungsbarometer/ Studie von Antrieb Mittelstand
Digitalisierungsbarometer/ Studie von Antrieb MittelstandDigitalisierungsbarometer/ Studie von Antrieb Mittelstand
Digitalisierungsbarometer/ Studie von Antrieb MittelstandAntriebMittelstand
 
Funcionamiento de las redes neuronales simples
Funcionamiento de las redes neuronales simplesFuncionamiento de las redes neuronales simples
Funcionamiento de las redes neuronales simplesDavid Freire
 
Unidad educativa imantag
Unidad educativa imantagUnidad educativa imantag
Unidad educativa imantagLûis Chavz
 
Historia de la Música en Cali.
Historia de la Música en Cali.Historia de la Música en Cali.
Historia de la Música en Cali.Diego López
 
Comercio electronico características de programas indeseables
Comercio electronico características de programas indeseablesComercio electronico características de programas indeseables
Comercio electronico características de programas indeseablesOscar Santos
 
Ch11 functional arts
Ch11 functional artsCh11 functional arts
Ch11 functional artsCyrus Helf
 
Kiosked at GSMA Mobile World Congress 24 February 2014
Kiosked at  GSMA Mobile World Congress 24 February 2014 Kiosked at  GSMA Mobile World Congress 24 February 2014
Kiosked at GSMA Mobile World Congress 24 February 2014 Kiosked
 
All Aboard the Boxcar! Going Beyond the Basics of REST
All Aboard the Boxcar! Going Beyond the Basics of RESTAll Aboard the Boxcar! Going Beyond the Basics of REST
All Aboard the Boxcar! Going Beyond the Basics of RESTPat Patterson
 
Recursos de Información en Internet para investigación en el ámbito de la Co...
Recursos de Información en Internet  para investigación en el ámbito de la Co...Recursos de Información en Internet  para investigación en el ámbito de la Co...
Recursos de Información en Internet para investigación en el ámbito de la Co...Renata Rodrigues
 

Andere mochten auch (20)

POKEMON JUEGO DE ROL.
POKEMON JUEGO DE ROL.POKEMON JUEGO DE ROL.
POKEMON JUEGO DE ROL.
 
Havas Digital - Social Media Attribution
Havas Digital - Social Media AttributionHavas Digital - Social Media Attribution
Havas Digital - Social Media Attribution
 
CAF- Iniciativa Regional de Patentes Tecnológicas para el Desarrollo
CAF-  Iniciativa Regional de Patentes Tecnológicas para el DesarrolloCAF-  Iniciativa Regional de Patentes Tecnológicas para el Desarrollo
CAF- Iniciativa Regional de Patentes Tecnológicas para el Desarrollo
 
Estructuras organizativas
Estructuras organizativasEstructuras organizativas
Estructuras organizativas
 
Folleto exposicion cervantes encantado2
Folleto exposicion cervantes encantado2Folleto exposicion cervantes encantado2
Folleto exposicion cervantes encantado2
 
Animals of our place
Animals of our placeAnimals of our place
Animals of our place
 
3 c 3d_leave_v5_0_ext
3 c 3d_leave_v5_0_ext3 c 3d_leave_v5_0_ext
3 c 3d_leave_v5_0_ext
 
Itinerari formatiu radiodiagnostic 2015 2016
Itinerari formatiu radiodiagnostic 2015 2016Itinerari formatiu radiodiagnostic 2015 2016
Itinerari formatiu radiodiagnostic 2015 2016
 
Las TIC como alternativa innovadora a las tradicionales tareas para casa
Las TIC como alternativa innovadora a las tradicionales tareas para casaLas TIC como alternativa innovadora a las tradicionales tareas para casa
Las TIC como alternativa innovadora a las tradicionales tareas para casa
 
Digitalisierungsbarometer/ Studie von Antrieb Mittelstand
Digitalisierungsbarometer/ Studie von Antrieb MittelstandDigitalisierungsbarometer/ Studie von Antrieb Mittelstand
Digitalisierungsbarometer/ Studie von Antrieb Mittelstand
 
Funcionamiento de las redes neuronales simples
Funcionamiento de las redes neuronales simplesFuncionamiento de las redes neuronales simples
Funcionamiento de las redes neuronales simples
 
Unidad educativa imantag
Unidad educativa imantagUnidad educativa imantag
Unidad educativa imantag
 
Historia de la Música en Cali.
Historia de la Música en Cali.Historia de la Música en Cali.
Historia de la Música en Cali.
 
Comercio electronico características de programas indeseables
Comercio electronico características de programas indeseablesComercio electronico características de programas indeseables
Comercio electronico características de programas indeseables
 
Ch11 functional arts
Ch11 functional artsCh11 functional arts
Ch11 functional arts
 
Mapreduce in Python
Mapreduce in PythonMapreduce in Python
Mapreduce in Python
 
Gustavo Adolfo Bécquer
Gustavo Adolfo BécquerGustavo Adolfo Bécquer
Gustavo Adolfo Bécquer
 
Kiosked at GSMA Mobile World Congress 24 February 2014
Kiosked at  GSMA Mobile World Congress 24 February 2014 Kiosked at  GSMA Mobile World Congress 24 February 2014
Kiosked at GSMA Mobile World Congress 24 February 2014
 
All Aboard the Boxcar! Going Beyond the Basics of REST
All Aboard the Boxcar! Going Beyond the Basics of RESTAll Aboard the Boxcar! Going Beyond the Basics of REST
All Aboard the Boxcar! Going Beyond the Basics of REST
 
Recursos de Información en Internet para investigación en el ámbito de la Co...
Recursos de Información en Internet  para investigación en el ámbito de la Co...Recursos de Información en Internet  para investigación en el ámbito de la Co...
Recursos de Información en Internet para investigación en el ámbito de la Co...
 

Ähnlich wie Infowatch endpoint security

Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesIcomm Technologies
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Ajay Jassi
 
Protect data effectively with endpoint encryption & data leak prevention
Protect data effectively with endpoint encryption & data leak preventionProtect data effectively with endpoint encryption & data leak prevention
Protect data effectively with endpoint encryption & data leak preventionAdi Saputra
 
Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010Joseph Mark Heinzen
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
Soonr IT Buyer's Guide
Soonr IT Buyer's GuideSoonr IT Buyer's Guide
Soonr IT Buyer's GuideReece Gaumont
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET Journal
 
Bring your own-computer_to work
Bring your own-computer_to workBring your own-computer_to work
Bring your own-computer_to workNetIQ
 
Humming Heads Presentation
Humming Heads PresentationHumming Heads Presentation
Humming Heads PresentationDansha
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #8 Extend data loss prevention (dl...
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #8 Extend data loss prevention (dl...8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #8 Extend data loss prevention (dl...
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #8 Extend data loss prevention (dl...Canon Business CEE
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A SurveyIRJET Journal
 

Ähnlich wie Infowatch endpoint security (20)

BH SA A4 Brochure
BH SA A4 BrochureBH SA A4 Brochure
BH SA A4 Brochure
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 
Search Inform DLP
Search Inform DLPSearch Inform DLP
Search Inform DLP
 
IP-guard Catalog
IP-guard CatalogIP-guard Catalog
IP-guard Catalog
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 
Protect data effectively with endpoint encryption & data leak prevention
Protect data effectively with endpoint encryption & data leak preventionProtect data effectively with endpoint encryption & data leak prevention
Protect data effectively with endpoint encryption & data leak prevention
 
Safeguard Your Business
Safeguard Your BusinessSafeguard Your Business
Safeguard Your Business
 
Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Soonr IT Buyer's Guide
Soonr IT Buyer's GuideSoonr IT Buyer's Guide
Soonr IT Buyer's Guide
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
 
Bring your own-computer_to work
Bring your own-computer_to workBring your own-computer_to work
Bring your own-computer_to work
 
Data Encryption Is Hard To Do Fiberlink
Data Encryption Is Hard To Do   FiberlinkData Encryption Is Hard To Do   Fiberlink
Data Encryption Is Hard To Do Fiberlink
 
Humming Heads Presentation
Humming Heads PresentationHumming Heads Presentation
Humming Heads Presentation
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #8 Extend data loss prevention (dl...
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #8 Extend data loss prevention (dl...8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #8 Extend data loss prevention (dl...
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #8 Extend data loss prevention (dl...
 
Sizzling good remote monitoring.pdf
Sizzling good  remote monitoring.pdfSizzling good  remote monitoring.pdf
Sizzling good remote monitoring.pdf
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 

Kürzlich hochgeladen

A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 

Kürzlich hochgeladen (20)

A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 

Infowatch endpoint security

  • 1. A GREAT TOOL FOR OPTIMIZING WORKFLOWS, IMPROVING EMPLOYEE PRODUCTIVITY, REDUCING FINANCIAL LOSSES AND DAMAGE TO REPUTATION, AND CUTTING THE COSTS OF PROTECTING YOUR INFRASTRUCTURE AND INFORMATION. InfoWatch EndPoint Security targets the typical tasks facing small and medium businesses. This solution is specifically designed to: Discover resources for improving business efficiency Take over control of employee productivity Guide employees in handling data that are crucial to business efficiency, operating company equipment, reducing power costs and eliminating personal use of company resources Increase savings on personnel recruitment and training, and reduce the need for additional equipment Enable regulation compliance regarding information security and the protection of devices used for data storage INFOWATCH ENDPOINT SECURITY 40%of employees spend their work time on personal activ- ities, such as, viewing enter- tainment content and videos, playing computer games etc. InfoWatch EndPoint Securi- ty reduces this percentage substantially. 70%of employees keep highly confidential company data (including financial docu- ments, client and supplier databases, and personal information) on flash drives for easy access during meet- ings, business trips, con- ferences, for work remotely etc. Of those flash drives, 60% are regularly lost or for- gotten, exposing client data- bases to competitors, which causes irreparable loss for businesses. InfoWatch End- Point Security helps prevent such consequences. 96%of small to medium compa- nies have to deal with client database losses every year. InfoWatch EndPoint Security is designed to eradicate this problem. 68%of companies with less than 200 employees are exposed to attacks which target files stored in the cloud. InfoWatch EndPoint Security provides secure remote storage, encryption and control of access to data in the cloud. «Idleness» The average loss suffered by small to medium companies because of employees’ «idleness» amounts to 10% of their monthly income. InfoWatch EndPoint Security eliminates the cost of personnel inefficiency. 4 out of 5 companies lack proper defense against malicious software that is brought into the office by employees on flash drives and other media. InfoWatch EndPoint Securi- ty provides comprehensive control of device connection to company PCs and the data on those devices, safeguard- ing PCs from dangerous ap- plications. If the data on a laptop are encrypted, the cost of losing the device equals the price of the laptop; if not, the loss will amount to hundreds of thousands of US dollars. InfoWatch EndPoint Securi- ty allows losses to be min- imized, protecting valuable data. Computers running during off-work hours is standard practice in many offices. In 30% of such cases these PCs are accessed by third parties who copy the data to portable media. InfoWatch EndPoint Securi- ty eliminates such incidents by switching off employees’ computers at the end of the working day on a regular schedule, which also reduc- es power costs. Disarray, chaotic workflow systems What are the main causes of low business efficiency? 25% 35% 40% 55% Employees’ «idleness» Employees distracted by playing games and viewing entertainment content Employees leaving companies with client databases; client poaching What types of information are lost on flash drives? Development plans, incl. marketing strategy 3% Financial data 35% Contracts & other legal documents 5% Other 2% Client/supplier databases 55% 5% 3% 35% 2% 55%
  • 2. FUNCTIONAL FEATURES Control of employees’ access to valuable data InfoWatch EndPoint Security allows increased efficiency of workflow management and ensures tiered access to external devices for employees. InfoWatch EndPoint Security can manage more than 24 types of devices and external media! Employees actively use portable media, flash drives, tablets, smartphones and other communication devices at work, which implies considerable risks of valuable information being copied and used for personal purposes. This may cause irreparable harm for a company’s business and reputation. A virus from an employee’s flash drive might compromise a company’s entire IT infrastructure, blocking the operation of core business units for several hours or days. Automatic monitoring of unauthorized employee activity InfoWatch EndPoint Security supports event logs and allows the discovery of unauthorized handling of valuable information by employees. Automatic report generation enables the discovery of bottlenecks in the operations of office employees and extra resources to be located to enhance their productivity. An employee’s working day can be quite diversified, including: playing computer games, watching movies, or printing documents for personal use. 70% of companies do not track employees’ activity during work time, or the files and data they bring in or take away with them. This information is not registered in any way. INFOWATCH ENDPOINT SECURITY The solution enables full control of access to devices, ports, network interfaces and catalogs, and to cloud storage systems. It offers a variety of features to control access rights: – By means of black and white lists of devices – By device models (with exclusive access to devices according to the list of authorized device models) – By serial numbers of devices (with exclusive access to devices with certain serial numbers, irrespective of user privileges) – Through a list of authorized media and a list of authorized wireless networks (with exclusive access to authorized wi-fi networks) Event logs in InfoWatch EndPoint Security display useractivitiesperemployee: i. e., who performed certain operations and when (reading, copying, creating or deleting data) using removable media, phones, Wi-Fi networks, network folders, and cloud storage. The shadow copying feature allows access to files specified in the logs directly from the product console.
  • 3. Data control during copying and storing, on premises and in the cloud Easy: Data encryption does not interfere with employees’ work and does not disrupt production. Safe: The loss or theft of media does not lead to data abuse by outsiders. InfoWatch EndPoint Security monitors all files uploaded to Dropbox, OneDrive, GoogleDrive, Yandex.Disk, or BoxSync by employees and authorizes external storage of files based on document type and data format. InfoWatch EndPoint Security allows to share files over the cloud storage, eliminating concerns about data security. Small to medium companies actively use the cloud to store and exchange information, but only a small percentage of these companies make sure their cloud data are protected. Over 80% of IT specialists are not even aware of the amount of data stored in the cloud, let alone the nature of those data or their value for the business. INFOWATCH ENDPOINT SECURITY Clients can choose a separate data encryption method for each cloud provider. Encryption keys are stored at the client’s site, not in the cloud, which ensures that they are never exposed to outsiders. Encryption is performed transparently at file level, so that employees are not involved in the process. This eliminates the possibility for employees to ignore or bypass this mechanism or to distribute unprotected confidential documents outside the company. Transparent: Data are automatically encrypted when recorded to media and decrypted when copied to hard drives. Flexible: Solvingvariousbusinessproblemsthroughencryption: you can grant access to encrypted files to all company employees, to a group of users (e.g., employees of a given department) or to a single employee. Encryption with InfoWatch EndPoint Security is:
  • 4. Protection against data theft from lost laptops or flash drives InfoWatch EndPoint Security offers an easy and effortless way of protecting information through encryption. By enabling encryption in InfoWatch EndPoint Security, you can significantly enhance the security of stored data: – No outsiders can read the data – The theft or loss of devices do not cause information leaks – All data are automatically encrypted at creation without interference for employees, or requiring additional work by IT personnel (transparent encryption) Portable media and laptops are the weakest link of any corporate infrastructure, as they are very often lost or forgotten by employees. Application Control InfoWatch EndPoint Security allows businesses to manage the launch of applications and control employees’ access to applications by means of white lists (of authorized applications) and black lists (of blocked applications). This feature guarantees that no prohibited applications or files are installed or launched on any company PC. Games, movies, music, and entertainment content… Are you sure that your employees aren’t watching a new film at work right now? That they are not playing games? What tools does your company use to monitor these problems? Uncontrolled use of various applications by employees reduces their productivity, causing them to lag behind with tasks, which eventually leads to business losses because of inefficiency. INFOWATCH ENDPOINT SECURITY The solution enables data encryption on laptops, PCs, external devices, network drives, and in cloud storage directories. The encryption is carried out in the background and is fully transparent to employees. The solution employs the AES–256 OS encryption algorithm with 1,024 to 4,096-bit key lengths. InfoWatch EndPoint Security provides two ways of enabling encryption: optional, by employees, and mandatory, by system administrators. The mobile encryption feature of InfoWatch EndPoint Security allows secure off-site data processing. The solution includes a learning mode; in this mode the product automatically tracks applications launched from employees’ PCs and generates a list of trusted applications. This feature can be used to create a list of trusted applications categorized by applications developer and extension or file signature, and to setup rules for launching applications for individual employees, workstations, etc.
  • 5. CLASSIC FEATURES OF INFOWATCH ENDPOINT SECURITY ARE DESCRIBED BY A SIMPLE ACRONYM C.A.F.E. – REVEALING THE CONCEPT OF THE PRODUCT AS AN EASY AND ROBUST PROTECTIVE TOOL TO ASSIST THE DEVELOPMENT OF A GROWING COMPANY: INFOWATCH ENDPOINT SECURITY Control over connections to external devices Audit of user activity Filtering by data type Encryption of data written to portable media, network folders and cloud storage InfoWatch EndPoint Security Server InfoWatch EndPoint Security Agent InfoWatch EndPoint Security Agent InfoWatch EndPoint Security Agent InfoWatch EndPoint Security Agent Management console Management console for iPhone O ine client Domain Controller Novell eDirectory InfoWatch EndPoint Security SQL Server TAN InfoWatch EndPoint Security: Perfect for small and medium business Fits the needs of any company, irrespective of industry or profile Alert to companies’ business processes Available even for small budgets Intuitive and user-friendly Easy installation and setup No extra network load Inconspicuous to employees Compatible with any software, including anti-virus programs A single management console
  • 6. +7 (495) 22-900-22 IW-Global@infowatch.com www.infowatch.com BENEFITS FOR BUSINESS INFOWATCH ENDPOINT SECURITY – InfoWatch EndPoint Security substantially reduces the risks associated with data leakage: client databases copied to flash drives and passed to competitors may well put a company out of business. The product eliminates the risk of loss or theft of valuable information because its encryption feature can be used for any portable media and laptops, or for data transferred to cloud storage. – The solution reduces bandwidth consumption: InfoWatch EndPoint Security settings allow most traffic-consuming operations that are not job-related to be eliminated. – The solution reduces personnel costs: it incorporates very simple installation, setup and management procedures that can be performed without hiring a qualified administrator or IS officer. – The solution reduces power costs: its power control feature allows PCs to be switched on and off on a regular schedule, if employees forget to do so. – The solution reduces the cost of additional hardware, services and applications: InfoWatch EndPoint Security does not require the purchase of any extra hardware or software, and because of its encryption system many business features, such as document workflow management, can be deployed in the cloud, which facilitates clear cost reduction. Reduction of business costs and financial losses All necessary features in one product InfoWatch EndPoint Security does not contain any unnecessary functionality. All tasks concerning protection of information are integrated in the single user-friendly interface, which covers only decisive aspects of information security. Business process awareness InfoWatch EndPoint Security is easily adjustable to company workflows because of its modular, multicomponent structure: by pinpointing weak points in your business processes, you can provide targeted protection for such areas without restricting access to assets that are needed to complete the company’s work. Robust and high-quality product Only 1% of 1,000 companies that have installed InfoWatch EndPoint Security require support services. Faultless operation of the product eliminates concerns for system administrators, management and end users. Extreme simplicity and usability InfoWatch EndPoint Security can be installed and configured in 20 minutes, without any special qualifications or training, and it can be managed with a few clicks. The simplicity of these procedures is facilitated by the intuitive interface and business logic of the product. Affordable even on a small budget The price of InfoWatch EndPoint Security fits into the operating budget of any company. Compatibility and productivity InfoWatch EndPoint Security is fully compatible with any corporate devices, systems and applications.