Ultimate control over data leaks



Similar documents
1. PRODUCT OVERVIEW PRODUCT COMPONENTS... 3

A Buyer's Guide to Data Loss Protection Solutions

A new business application, that supports e- mail, IM communication, calendaring and collaboration

SearchInform Information Security Perimeter. Contents 1. SENSITIVE DATA PROTECTION: SEARCHINFORM INFORMATION SECURITY PERIMETER...

Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan

How To Test For Performance And Scalability On A Server With A Multi-Core Computer (For A Large Server)

MAPILab Reports for Hardware and Software Inventory Installation Guide. Document version 1.0

SupportDesk Extensions Installation Guide Extension Service - Versions

Data Sheet: Work Examiner Professional and Standard

Hardware and Software Requirements for Installing California.pro

Employee PC and Server Activity Monitoring Solution

NETWRIX EVENT LOG MANAGER

RSA Solution Brief RSA. Data Loss. Uncover your risk, establish control. RSA. Key Manager. RSA Solution Brief

Hardware and Software Requirements for Installing California.pro

SysAidTM Product Description

Deployment Guide. Websense TRITON AP-DATA Gateway and Discover. v8.0.x

Netwrix Auditor for SQL Server

Sage Grant Management System Requirements

TRITON - Data Security Help

Dragon Medical Enterprise Network Edition Technical Note: Requirements for DMENE Networks with virtual servers

Terminal Server Software and Hardware Requirements. Terminal Server. Software and Hardware Requirements. Datacolor Match Pigment Datacolor Tools

Netwrix Auditor for Active Directory

MailStore Server 7 Technical Specifications

Network device management solution

inforouter V8.0 Server & Client Requirements

System Requirements for Microsoft Dynamics NAV 2009

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

Netwrix Auditor for Windows Server

MAPILab Reports Installation Guide. Document version 3.02

MoversSuite by EWS. System Requirements

Set Up Setup with Microsoft Outlook 2007 using POP3

VPOP3 Your post office Getting Started Guide

NETWRIX FILE SERVER CHANGE REPORTER

NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage

Panasonic Communications Product Announcement

Websense Data Security Solutions

Network device management solution.

Microsoft Office Outlook 2013: Part 1

Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet

MailStore Server 7 - Technical Specifications

LaCie 5big Backup Server

How To Use Websense

WhatsUp Event Alarm v10x Quick Setup Guide

Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide

IMAP and SMTP Setup in Clients

Step-by-Step Configuration

Midsize retailers can now relax the nightmare of trying to keep up with the

Netwrix Auditor for Exchange

GFI Product Manual. Deployment Guide

1. Amendment of Section I. Invitation to Bid item no. 6 and 7 are hereby amended as follows: From:

Cubic Live Services. Cubic Live s Strengths. Messaging Solutions & Services. Collaboration Solution & Services

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Kaspersky Endpoint Security 10 for Windows Administrator's Guide

NetWrix Exchange Mail Archiver Version 1.5 Administrator Guide

Quick Installation Guide

602LAN SUITE 5.0 Groupware

Configuring Outlook for IMAP. Creating a New IMAP Account. Modify an Existing Account

Hosted Managed by Specialists

ActiveXperts Network Monitor. White Paper

AlwaysMail. Sector 5. Cloud

Eric Moriak - CISSP, CISM, CGEIT, CISA, CIA Program Manager - IT Audit Children s Medical Center Dallas. Dallas, Texas

Symantec Backup Exec.cloud

Web Supervisor/Agent. System Requirements & Troubleshooting Guide. 989 Old Eagle School Road Wayne, PA (610)

Phire Architect Hardware and Software Requirements

CA Technologies Data Protection

Samsung SmarThru Workflow 2 Digitize your print environment with secure, cost effective document workflow

BITDEFENDER ENDPOINT SECURITY TOOLS

Netwrix Auditor for SQL Server

WhatsUp Event Archiver v10 and v10.1 Quick Setup Guide

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

GFI Product Manual. Administrator Guide

IP-guard: Computer Security Software

DEDICATED MANAGED SERVER PROGRAM

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

White Paper. Scalability Results. Select the hardware configuration that s right for your organization to optimize performance

Music to your ears. Get hosted communication and collaboration solutions that work in perfect harmony with your business. Vodacom Power to you

TNT SOFTWARE White Paper Series

WINSCRIBE HARDWARE SPECIFICATIONS

System Requirements. BWise 4.1 SP3.5. Document Version: 4135-REQ-D01-EN

Using Computer Surveillance to Watch Corporate Security and Employee Performance

Kerio Outlook Connector (Offline Edition)

Getting Started Guide

Trend Micro OfficeScan 10.6 Data Protection Lists

Preventing Data Leaks At The Firewall A Simple, Cost-Effective Way To Stop Social Security and Credit Card Numbers From Leaving Your Network

Today s Government Environment

Clusterpoint Network Traffic Security System. User manual

Installing TeamLab on a Local Server

DLP Quick Start

Data Sheet. NCP Secure Enterprise Management. Next Generation Network Access Technology

Softline VIP Payroll System Requirements v2.9a January 2010

ATI00484IEN. Avaya IP Office Advanced Application and Troubleshooting Workshop

Enterprise Archive Managed Archiving & ediscovery Services User Manual

ITA Mail Archive Setup Guide

Installation Guide For Exchange Reporter Plus

securityserver Unparalleled management and detection of security, environmental, and disaster control resources.

GUARD1 PLUS SE Administrator's Manual

OutDisk 4.0 FTP FTP for Users using Microsoft Windows and/or Microsoft Outlook. 5/1/ Encryptomatic LLC

Important. Please read this User s Manual carefully to familiarize yourself with safe and effective usage.

LifeSize Control Installation Guide

How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org (

Transcription:

Ultimate control over data leaks Does your company use various data transmission channels? Are there any sensitive documents your employees have access to? You think all your employees are loyal? SecureTower Protect your business from internal threats with SecureTower a complex Data Leak Protection system

Protect the core of your business SecureTower is a complex solution designed for data loss protection and monitoring employees network activities. SecureTower is a compound system that is easily integrated into a corporate network and provides: Total control over possible data leaks through multiple channels; Users network activities tracking; Assessing the efficiency of corporate resource usage by the employees; Creation of a unified archive of corporate communications. chats SSL traffic Skype web-traffic е-mail messages external devices SecureTower is a software solution that provides data leakage control over the following channels: е-mail messages created in POP3, SMTP, and IMAP protocols mail clients (i.e., MS Outlook, Thunderbird, The Bat!), MS Exchange Server mail; entire web-traffic, including e-mail messages of external mail clients (such as gmail.com), forum messages and posts, viewed pages of social networks and other web-services using HTTP protocol; chats and conversations in instant messengers using OSCAR (ICQ/AIM), MSN (Windows Live Messenger), XMPP/Jabber (Miranda, Google Talk, PSI) and other IM protocols, including Skype messages and voice calls; FTP, HTTP and HTTPS protocols files transmission, IM-programs file exchange (Skype, ICQ, Windows Live Messenger, etc.) and mail attachments; SSL traffic transmitted over encrypted protocols (HTTPS, encrypted ICQ and e-mail, etc.); data transferred to external devices (USB and storage devices, removable HDD, memory sticks, CD/DVD and floppy disks); data printout on local and network printers.

Stay updated about all communications Monitor network activity SecureTower creates comprehensive statistical reports on employee s network activities with the help of charts and diagrams, thus enabling you to see the way your corporate resources are used and estimate your employees efficiency. SecureTower provides you with detailed description of sensitive data breach incident stating when, who and which network computer participated in it. Visualization of employees activities allows drawing side-by-side comparison of any employees activity indexes, set for a definite time period. Using our product, company s management or security department seeking to know how certain employees use network resources and work time, can keep track of each employee s network activities. The obtained results help assess employees workload during the day, as well as efficient use of corporate resources. For instance, you can easily estimate the amount of working time spent on inappropriate activities not connected with direct job responsibilities (such as private talks and chatting in instant messengers, visiting work-unrelated web-sites, etc.). SecureTower as an HR tool SecureTower can be used not only by security departments, but also by human resources specialists. Graphic analyzer of all employees communications helps to reveal most active network users, control their interaction with competitors and conduct personnel screening. Thus, SecureTower can be an essential tool for HR department, as it facilitates staffing strategies of an organization and helps establish sound personnel management system. Unified communications archive Large companies prefer to keep all communications, both internal and external, in writing. In case some information discussed by employees and their management or a customer appears to be lost, misunderstood or simply forgotten, written communications help to easily and quickly find the necessary information or restore some past events. All intercepted traffic is analyzed and stored in a database, thus helping to keep corporate business communications archive and investigate data leakage incidents in retrospective. Complete users message history is available after selecting a certain message.

Achieve ultimate security Rich functionality for data control SecureTower monitors data leaks by analyzing all traffic on the basis of predefined context, attribute and statistical rules, taking morphology into account. The system provides detailed information about the data sender and recipient, and full text of an intercepted document or message. Additional protection is guaranteed by using data control based on regular expressions and digital fingerprints of documents and databases. Flexible security policies SecureTower controls data leakage by analyzing traffic according to predetermined security rules. In case of a security breach SecureTower sends auto-alert to the e-mail address of the information security officer. Consequently, security department gets automated notifications about all cases of unauthorized transmission of sensitive information even if it was sent with the help of encrypted channels or SSL protocols. Immediate user identification Do your employees use terminal servers to connect to the network? We have a perfect solution for you! SecureTower can work with endpoint stations connected via terminal servers. You can identify such users, intercept and automatically analyze all their traffic. Basically, it does not matter to SecureTower whether it is a regular network or a terminal server connection. All users will be controlled in the same way. SecureTower enables accurate identifying the actual data sender thus minimizing work-hours spent on security breach incident's investigation. AD integration When you first install a DLP product you need to train it to recognize all users of your network. With SecureTower it is as simple as it can be: all users from your Active Directory can be automatically imported into the user list. One click and all new users you add to your AD will simultaneously appear in the SecureTower interface. This feature will be especially valuable for large companies with huge numbers of employees, thus facilitating security officers work. Technical and hardware requirements*: CPU: Pentium 2 GHz and above Network adapter: 100 Mbit/1 Gbit RAM: 2 Gb minimum (+ 0.5 Gb for every 100 of controlled endpoints) HDD: 110 Mb of space available for program files and a minimum of 30% of intercepted traffic amount for search index files, 300 Mb for client applications Microsoft.Net Framework: 4.0 OS for server components: Microsoft Windows Server 2003 / Server 2008 (x86 or x64) OS for client components: Microsoft Windows XP/ Vista / 7 / Server 2003 / /Server 2008 (x86 or x64) Supported DBMS: Oracle, Microsoft SQL Server, SQLite and Postgre SQL. * System requirements are individual for each component and largely depend on the characteristics and traffic loads in the network.

Why SecureTower Comprehensive control over classified and personal data leaks All conversations are controlled: IMs, including Skype, incoming and outgoing e-mails and attachments thereto, MS Exchange Server mail, and data transferred to removable drives, CD/DVD drives and printers. Moreover, the contents of sensitive documents and databases often containing important contacts and personal data are also under control. SecureTower is a multi-component and easily scalable system The system consists of several server components performing different tasks and comprising a unique tool to keep track of all data transferred, regardless of the size and topology of the network. Our product is equally effective in small and in extensively loaded huge networks. Even if your corporate net has a multilevel structure with numerous workstations and servers, SecureTower enables you to keep everything under your total control. The system is highly scalable to meet any requirements and fit any network. Centralized setup of all system components and work in a single user console Considering the complexity of mission performed by the DLP system, it needs flexible setup options and capability to tailor system behavior to the needs of an individual organization. In other cases this would result in use of multiple sophisticated tools to tune the system and make working with the product a real challenge. After installing SecureTower you will realize its usability. All components are located in a single console, and you always have easy access to everything you need. Easy to install and integrate into existing network No special experience is required to install the product. If you have installed any software in Windows environment previously, you can handle it! Subject to your network characteristics, you may choose to install all system components onto a single machine or divide them between several computers. No changes are required to be applied to your existing network: SecureTower can work with whatever it sees in it. User-friendly interface All information you have had so far about DLP solutions can make you think it is too difficult to operate this kind of software there are so many things to tune and control that your company would have to hire another specialist or spend money to train the existing employees to use it effectively. However, take your time and think again what if a DLP system is as easy to tune as a regular application, what if it has a self-explanatory interface? Can you imagine such a kind of DLP product? SecureTower is already there! It has a user-friendly interface, which means it can be used by anyone who is familiar with Windows OS and security requirements of your organization. At the same time, simplicity does not mean weakness to us. The system stays highly customizable and provides advanced control options. Improving security service efficiency SecureTower minimizes time and cost of data leak incidents investigation as it lowers percentage of false positives, thus raising the efficiency of security officers work.

About us FalconGaze is a developer and supplier of complex high-performance premium-class data security products. The company provides compound solutions for continuous control over leaks and undesired disclosure of corporate sensitive information, tailored for monitoring workers network activities. The products we develop are not just regular software, but multi-component systems integrated into corporate networks. Our best practices and expertise in the sphere of information security are implemented in our products development. Our fundamental principles include individual approach and maximum customer's satisfaction leading to customized solutions for each client. FalconGaze software users are provided with a wide range of additional services that guarantee safe and reliable operation of our product. Our customers can be confident they are supplied with solutions that meet all modern information security requirements and ensure maximum data protection against insider threats. We value our every customer and are ready to provide solutions that satisfy individual demands both of small and midsize businesses and of large corporations. The range of our potential customers is wide from smaller companies with moderate-sized networks to large enterprises with complicated network topologies. Our current business priorities include minimization of data leak and industrial espionage threats, as well as control of proper use of work time. With that, we are constantly diversifying the range of high-tech tools, we use to ensure our clients data security. Contacts / Partner contacts: Latvia, Riga FalconGaze EU, Ltd. Tel: +371 2927 2899, +371 6721 7245 www.falcongaze.com South-East Asia: Malaysia, Singapore, Indonesia, Vietnam, Laos, Cambodia SecureMetric Technology Sdn Bhd Tel: +603 8996 8225 www.securemetric.com India TEQDIS Ltd. Tel/Fax: +44 16 1669 6221 www.teqdis.com Russia, Moscow FalconGaze LLC Tel: + 7 495 640 29 22 www.falcongaze.ru Belarus, Minsk DPA BEL Tel/Fax: +375 17 277 26 37, +375 17 277 28 22 www.dpa.by