Anda di halaman 1dari 3

TM A 360 Insider Data Theft Management

inDefend Business Solution


Cyber Security Intelligence
Insider data theft has been the major issue which information security experts are
tackling nowadays. Multiple security controls both physical and application are
implemented and still data gets leaked out, the major loop hole being overlooking
the insiders. Employees or partners working are having the most critical data and
if by social engineering any of the asset is compromised, it can lead to a major
drawback in the security mechanism of the organization. With such issues being
encountered across the globe in enterprises, Data Resolve has come up with an
insider data theft suite which targets and monitors employees activities along
with setting up controls in order to prevent data leakage.

How inDefend can help?


InDefend provides a complete round about approach for tackling the insider
data leakage scenarios and post incident forensics. And this is done by
monitoring all the channels via which data leakage can happen like, chats, emails,
removable media, file uploads, applications.
Data Leakage Prevention
- Email control:
Platfor m Supported SMTP emails control
- Windows- XP SP2 and SP3, Microsoft exchange server emails control
Vista, 7, 8 and above Gmail emails monitoring and control
- Mac OSX- Mountain Lion,
Content based alerting mechanism for sensitive content in mail body or attachment
Mavericks, Yosemite
- Linux- Both 32 & 64-bit
Alerting mechanism for encrypted file being mailed
flavours of following - Removable Media Data transaction control:
distributions: File transfer blocking onto removable media
- Ubuntu 10.10 and above Read only enablement for the files present in removable media
- Fedora - Fedora 14 and - Application control:
above
- CentOS - 6.x only Category wise Application blocking
- RHEL - 6.x only Application whitelisting
- OpenSUSE - 11.3 and above - Website control:
Web Content Filtering
Category based Website blocking
Website blacklisting
Website Whitelisting
Website exception adding
- File Upload Control:
Extension based file blocking
Destination whitelisting for File uploads
Content based alerting mechanism for sensitive content in any file being uploaded
Alerting mechanism for encrypted file being uploaded
Agent requirements
Device Control
- 512 MB & above RAM
- Device Whitelisting:
- 5GB Hard disk & above
- Intel Pentium IV and above Selective allowing of USBs at organizational endpoints
- Device Registering:
Registering of USBs for Device whitelisting
- Device blocking:
MTP device blocking
Removable media blocking
CD/DVD blocking
Employee Forensics
- Screen shot Monitoring:
Regular screen shots of employee screen activities
TM

- Shadow logging:
Shadow copying of all the browser based File uploads inDefend Business
Cyber Security Intelligence
Shadow copying of all the SMTP, Microsoft Exchange Server and Gmail emails
Encryption
- Enforced Encryption:
Enforced encryption to enable the data transferred to removable media in an
encrypted vault
- Internal Access Restriction:
Restricting the access of the internal data present in removable media from being
accessed from any guest computer
Employee Monitoring
- Chat Monitoring:
Skype and GTalk chat monitoring
Sensitive chat segregation
- Email Monitoring:
Gmail and corporate emails monitoring
Webmail and corporate emails attachment monitoring
Mails with BCC and BCC with attachments segregation
- File Upload Monitoring:
Key Benets
Browser based file upload monitoring
- Tamper proof solution
- Search activity Monitoring: - Single centralized dashboard
Employee search engine activity monitoring - Employee endpoint
Sensitive search engine activity segregation behavior analysis
- Browsing activity Monitoring: - Provides a holistic approach
Internet browser behavior analysis across all the endpoint channels
Time based reports on the basis of Websites and articles/videos being viewed - Enforced encryption provides
- Application Activity Monitoring: an additional security
Time based reports on the basis of Applications being used mechanism for removable
Application behavior analysis media data transactions
- Device Activity Monitoring:
Removable media data transaction monitoring
Removable media usage activity monitoring
File transfer monitoring onto removable media

InDefend Business Deployment Model:

In cloud model, the server is hosted on cloud so no additional hardware procurement


is needed and all the machines directly communicate with the server via any internet
connectivity. And its dashboard can be accessed 24*7 across the globe.
TM

inDefend Business
Cyber Security Intelligence

rF roF

In premise model, the server is hosted within the organizational network and
dashboard is accessible from within the company WAN. In premise model the users
within the network are connected via internal IP and the remote users are assigned
public IP which is mapped with internal IP for all time policy and log
For Free Evaluation, synchronization.
please connect with us @:
sales@dataresolve.com,
+91 9266603983

Registered Office - Kolkata


3rd & 4th Floor, Arcadia Centre,
Premise No. 31,
Dr. Ambedkar Sarani
Kolkata - 700 046, INDIA InDefend suite has a centralized dashboard which has analytics of all the endpoints
Corporate Office: that are being monitored. Features like SMS gateway, Daily email alerts can be
2/F, Elegance Tower, Jasola configure from here along with multiple security policies.
District Centre, Mathura Road,
New Delhi - 110025, INDIA
Server Requirements
The configuration of the inDefend Business server depends on the number of
systems you need to protect. For example, an organization with up to 300 systems to
be protected can be supported by a dedicated server computer with:
- 4 GB RAM
- 500 GB free hard disk space
- Intel Core 2 Duo and above CPU with minimum frequency 2.5 Ghz

Anda mungkin juga menyukai