+ All Categories
Home > Documents > INFOWATCH GROUP Information security and services · InfoWatch Traffic Monitor is designed for...

INFOWATCH GROUP Information security and services · InfoWatch Traffic Monitor is designed for...

Date post: 05-Jul-2020
Category:
Upload: others
View: 7 times
Download: 0 times
Share this document with a friend
23
INFOWATCH GROUP Information security and services Things happen. We make sure you are in control
Transcript
Page 1: INFOWATCH GROUP Information security and services · InfoWatch Traffic Monitor is designed for security officers to control the information flows and prevent unauthorized use of information.

INFOWATCH GROUPInformation security and servicesThings happen. We make sure you are in control

Page 2: INFOWATCH GROUP Information security and services · InfoWatch Traffic Monitor is designed for security officers to control the information flows and prevent unauthorized use of information.

Patented innovations in advanced analytics and corporate data protection that help businesses tackle cybersecurity risks

2000+ successful projects in 20 industries

Technological advancement in the Enterprise Data Loss Prevention

repeatedly recognized by Gartner

Operating in 20 countries, including Russia, CIS, Middle East

and Southeast Asia regions

Providing best‑of‑breed information security solutions for 15+ years

INFOWATCH : FACTS AND FIGURES

2

Page 3: INFOWATCH GROUP Information security and services · InfoWatch Traffic Monitor is designed for security officers to control the information flows and prevent unauthorized use of information.

Advanced analytics and protection of corporate data

InfoWatch Traffic Monitor

InfoWatch Vision

InfoWatch Person Monitor

InfoWatch EndPoint Security

Industrial cybersecurity and protection of IIoT

InfoWatch ARMA

Active protection for web applications against all types of external attacks

InfoWatch Attack Killer

Detection of vulnerabilities in the source code of applications

InfoWatch Appercut

Consulting, Implementation and Education Centers

Experts from InfoWatch Consulting, implementation engineers

and InfoWatch Academy trainers are always available to assist

with comprehensive security audit, cyberstrategy and program

planning, remediation and employee training

INFOWATCH SOLUTIONS AND SERVICES

3

Page 4: INFOWATCH GROUP Information security and services · InfoWatch Traffic Monitor is designed for security officers to control the information flows and prevent unauthorized use of information.

PROTECTION OF CORPORATE DATA AND INFORMATION FLOW CONTROL

InfoWatch Traffic Monitor is designed for security officers to control the information

flows and prevent unauthorized use of information.

2263 — NUMBER OF LEAKS IN 2018

20% MORE “MEGA LEAKS” THAN IN 2017*

Tasks addressed

Reduce the company’s financial, reputational, and legal risks

caused by leaks and mitigation of their results

Prevent the data loss without slowing down business processes:

the solution may restrict sending sensitive information via e‑mail,

online services, social media, copying to USB drives, etc.

Understand the context of internal communications through

classification and categorization of corporate data

Control employees’ operations in business apps, preventing retrieval

of confidential data in digital or printed form

Collect evidence for incidents investigation

4

Page 5: INFOWATCH GROUP Information security and services · InfoWatch Traffic Monitor is designed for security officers to control the information flows and prevent unauthorized use of information.

Benefits

High performance when supporting organizations with 300,000

employees or more

Ready-to-use industry solutions based on the specifics of business

processes in financial organizations, telecommunications

and insurance companies, public agencies, energy companies, etc.

Forensic Storage — unlike competitors, Traffic Monitor keeps all

the workflow and data movements within a company, not just

incidents. It means that even if an incident was missed, an

administrator can still look back and provide investigation.

Modular structure: users pay only for the features

they need

*According to InfoWatch Analytics Center, 2019Mega leaks refer to the breach of over 10 mln records

5

Page 6: INFOWATCH GROUP Information security and services · InfoWatch Traffic Monitor is designed for security officers to control the information flows and prevent unauthorized use of information.

DATA-FLOW ANALYSIS

InfoWatch Vision is a visual analytics tool that boosts the efficiency and expands the uses of InfoWatch Traffic Monitor DLP system.

>$600K — AVERAGE COST PER INSIDER INCIDENT

$3.8M — AVERAGE ANNUALIZED COST OF EMPLOYEE OR CONTRACTOR NEGLIGENCE*

Tasks addressed

Generate instant reports by any point of view

and quickly switch between graph types while

maintaining the focus of your search to verify

hypotheses and gauge your information

security in real time

Keep and enrich digital profiles

and communication graphs

Uncover anomalies in data flows, staff

interactions and communications

*According to Ponemon Institute, 2018

6

Page 7: INFOWATCH GROUP Information security and services · InfoWatch Traffic Monitor is designed for security officers to control the information flows and prevent unauthorized use of information.

Be in control of the “gray zone”:

Check whether your information security policies are consistent

with your business processes

Search for connections between seemingly unrelated facts

and recreate the chain of events

Pinpoint clandestine scenarios and suspicious patterns

Benefits

7

Page 8: INFOWATCH GROUP Information security and services · InfoWatch Traffic Monitor is designed for security officers to control the information flows and prevent unauthorized use of information.

EMPLOYEE MONITORING

InfoWatch Person Monitor is a system for continuous monitoring of regular and privileged

users to identify inefficient and dangerous activity.

63% OF DATA LEAKS ARE CAUSED BY EMPLOYEES AND CONTRACTORS

ALMOST 90% OF DATA LEAKS ARE INTENTIONAL*

Tasks addressed

Track each wrongdoer’s action in the course of an incident

Call malicious workers to account by providing compelling evidence

for incident investigations

Monitor and control actions of privileged users

*According to InfoWatch Analytics Center, 2019

8

Page 9: INFOWATCH GROUP Information security and services · InfoWatch Traffic Monitor is designed for security officers to control the information flows and prevent unauthorized use of information.

Benefits

Simple graphical reports with comprehensive

information about the actions

of specific employees

Legitimately obtained evidence helps not to leave

a violator unpunished

Mitigates reputational and financial risks by recognizing collusions

and disloyal employees

9

Page 10: INFOWATCH GROUP Information security and services · InfoWatch Traffic Monitor is designed for security officers to control the information flows and prevent unauthorized use of information.

INFORMATION TECHNOLOGY

INFRASTRUCTURE INTEGRIT Y

InfoWatch EndPoint Security is a continuous monitoring and protection system allowing the corporate data

remain encrypted and keep company’s information technology infrastructure healthy.

6 MILLION SECURIT Y PINS OF VERIZON CUSTOMERS WERE INADVERTENTLY

MADE PUBLIC ON A CLOUD SERVER

198 MILLION RECORDS ON AMERICAN VOTERS WERE FOUND STORED ON AN OPEN CLOUD

SERVER OWNED BY A DATA ANALY TICS FIRM*

*According to UpGuard

10

Page 11: INFOWATCH GROUP Information security and services · InfoWatch Traffic Monitor is designed for security officers to control the information flows and prevent unauthorized use of information.

Tasks addressed

Protect the IT infrastructure by managing access to critical information

and preventing data transfer outside the security perimeter

Prevent loss of confidential information by encrypting all data

Track the license usage to save money on, if the licensed software

is hardly ever used or not used at all

Benefits

Encryption of files on devices and in the cloud: prevents loss

of confidential data and decreases financial risks

Monitoring the integrity of the IT infrastructure: limits the unauthorized use of software and the use

of company assets for personal gain

Reduced expenses: you see the big picture of how

the company’s IT assets are used, and save

on purchasing software and hardware,

and on inefficient staff

11

Page 12: INFOWATCH GROUP Information security and services · InfoWatch Traffic Monitor is designed for security officers to control the information flows and prevent unauthorized use of information.

PROTECTION OF WEB

APPLICATIONS

InfoWatch Attack Killer is a unique solution for continuous proactive protection of web resources

against hacker attacks.

90% OF WEB SITES ARE EXPOSED TO CYBERAT TACKS WITH MODERATE

OR HIGH VULNERABILIT Y RISKS

Tasks addressed

Continuous availability of resources: automatically detect

and prevent massive and combined DDoS attacks

Data integrity and confidentiality: prevent hacker attacks targeting

web applications and identify vulnerabilities in the web infrastructure

Secure application updates: automate program source code quality

control to ensure compliance with requirements for safe software

development

12

Page 13: INFOWATCH GROUP Information security and services · InfoWatch Traffic Monitor is designed for security officers to control the information flows and prevent unauthorized use of information.

Custom Code Scanner (CCS)

Identifying source code errors in line with the secure

programming requirements of PCI DSS, OWASP,

and platform vendors

Supporting all the most popular programming languages

(Java, PHP, JavaScript, C#, etc.)

Benefits

Simple solution: end‑to‑end integration of various security tools

into a single interface makes the system convenient to operate

and facilitates user training

Efficient protection: artificial intelligence of the core

and use of machine learning in operations of InfoWatch

Attack Killer’s functional components reduce the probability

of successful attacks almost to zero

Secured life cycle of the application: a special source code

scanner ensures security of the whole business application

development and use cycle

Web Application Firewall (WAF)

Bringing together app vulnerability detection and active

protection against hacking

Self‑learning algorithms automatically adapting to changes

in web resources

No need for manual re‑configuration after each update

Identifying multi‑step attacks based on a variety

of security events

Anti-DDoS

Automatic protection immediately responds to dangerous

anomalies

Protecting even extremely high‑load web projects against

DDoS attacks of any intensity

Isolating parasitic traffic at the filtering node level, so that

the site gets cleared traffic

13

Page 14: INFOWATCH GROUP Information security and services · InfoWatch Traffic Monitor is designed for security officers to control the information flows and prevent unauthorized use of information.

SOURCE CODE ANALYSIS

InfoWatch Appercut is an automated business application source code control system

to ensure compliance with requirements for safe software development.

90% OF COMPANIES FINE-TUNE THEIR BUSINESS APPS EITHER WITH THEIR FTE

PROGRAMMERS OR OUTSOURCED TEAMS

75% OF NEW AT TACKS OCCUR AT BUSINESS APPS L AYER , BUT THE MARKET

OFFERS SOLUTIONS TO ADDRESS INSECURE CODETHREATS

10× CODE ERROR CORRECTION IS 10 TIMES LESS EXPENSIVE AT THE SOFT WARE

DEVELOPMENT STAGE THAN WHEN ACCEPTING A FINISHED PRODUCT*

*According to Gartner Research

14

Page 15: INFOWATCH GROUP Information security and services · InfoWatch Traffic Monitor is designed for security officers to control the information flows and prevent unauthorized use of information.

Tasks addressed

Control the quality of the code and find vulnerabilities as early

as at the programming stage

Automatically create reports about identified vulnerabilities and generate

tasks for programmers

Ensure safe deployment and update of software

Benefits

Business-process continuity: eliminates labor‑intensive

and time‑consuming manual code control or external auditing

Adaptability: integrable into any stage of software

development lifecycle between programming

and acceptance by the customer

Scalability: supports over 20 programming languages

Embedded standards: InfoWatch Appercut database

contains requirements of PCI DSS standards,

CERT, OWASP and CWE best practices, SDLC

recommendations, as well as recom

15

Page 16: INFOWATCH GROUP Information security and services · InfoWatch Traffic Monitor is designed for security officers to control the information flows and prevent unauthorized use of information.

INDUSTRIAL CYBERSECURIT Y AND PROTECTION OF IIOT

InfoWatch ARMA Industrial Firewall is a specialized software and hardware appliance designed to protect the industrial control systems and adapted to use in technological networks.

50% INCREASE IN THE NUMBER OF IDENTIFIED SCADA SYSTEM VULNERABILITIES IN H1 2018*

48% OF INDUSTRIAL ENTERPRISES WERE AT TACKED IN 2018**

Tasks addressed

Isolated environment and secure infrastructure

creation

Advanced Persistent Threat (APT) detection

and protection

Intrusions and technological process

anomalies identification

16

Page 17: INFOWATCH GROUP Information security and services · InfoWatch Traffic Monitor is designed for security officers to control the information flows and prevent unauthorized use of information.

Benefits

A single dashboard that enables you to control

the level of information security in technological

networks

Works not only in the monitoring mode, but also

prevents attacks on SCADA and PLC

High Availability: Active / Passive cluster, Bypass mode

*According to TrendMicro, compared to H1 2017**According to Kaspersky Lab

17

Page 18: INFOWATCH GROUP Information security and services · InfoWatch Traffic Monitor is designed for security officers to control the information flows and prevent unauthorized use of information.

INFORMATION SECURIT Y CONSULTING SERVICES

InfoWatch Consulting services are aimed to help organizations excel at building

a robust information security strategy. InfoWatch conducts information security

audit in the company, develops and implements corporate data protection processes, and builds

a strategy for the improvement of information security in the organization.

ONLY 22% OF ORGANIZATIONS MEASURE THE EFFICIENCY

OF THE IMPLEMENTED INFORMATION SECURIT Y TOOLS

Services included

Classification and categorization of corporate data

Development of the sensitive data processing lifecycle, as well

as ensuring its legitimacy

Adjustment of DLP system settings based on audit results, as well

as building an incident detection and response process

Formulation of key metrics of system performance and methods

of measuring them

18

Page 19: INFOWATCH GROUP Information security and services · InfoWatch Traffic Monitor is designed for security officers to control the information flows and prevent unauthorized use of information.

Development of the concept of improving protection against data leaks

in accordance with the overall business strategy of the organization

Benefits

High efficiency of the data loss prevention system at the very start

thanks to fine‑tuning during a proof‑of‑concept project

Full transparency of information flows in the organization

Legitimacy of the use of data loss prevention system

Robustness due to the alignment of processes in a single

system for ensuring information security

Measurability of the information security quality

High-performance team with 15 years of hands‑on

experience in the market and understanding

of the specifics of the development

and implementation of security systems

*According to Crowd Research Partners

19

Page 20: INFOWATCH GROUP Information security and services · InfoWatch Traffic Monitor is designed for security officers to control the information flows and prevent unauthorized use of information.

InfoWatch Academy offers corporate education programs to the private sector companies

and government organizations on cybersecurity.

What we offer

Academic programs and workshops to develop skills in information security

InfoWatch DLP product training

Development of educational materials

Cybersecurity training labs equipped with InfoWatch

software

Primary audience

Managers and government: to get knowledge of digital technology

to lead change to the future

Professionals: to develop comprehensive digital skills for quick

adoption at the workplace

Students: to get skills which are in high demand within the labor market,

hands‑on experience

CYBERSECURIT Y SKILLS DEVELOPMENT AND TRAINING

20

Page 21: INFOWATCH GROUP Information security and services · InfoWatch Traffic Monitor is designed for security officers to control the information flows and prevent unauthorized use of information.

ALL-IN-ONE SOLUTION

Takes into consideration business and industry specifics, provides fine‑tuned policies

and content filtering databases

Protects critical information, know‑how and latest inventions, financial data

Detects disloyal employees, plots, fraud, and corruption schemes

Decreases reputation risks caused by possible data leaks to social networks

Prevents cyber attacks on websites and critical infrastructure of the company

Page 22: INFOWATCH GROUP Information security and services · InfoWatch Traffic Monitor is designed for security officers to control the information flows and prevent unauthorized use of information.

SHORT LIST OF CUSTOMERS

FINANCE AND BANKING ENERGY AND POWER

TELECOMMUNICATIONS GOVERNMENT

Federal Tax Service of Russia

Federal Customs Service of Russia

The Moscow Arbitration Court

Russian Ministry of Emergency

SituationsMANUFACTURING

22

Page 23: INFOWATCH GROUP Information security and services · InfoWatch Traffic Monitor is designed for security officers to control the information flows and prevent unauthorized use of information.

CONTACT US

HeadquartersVereyskaya Plaza III, Vereyskaya str. 29, bld. 33

121357, Moscow, Russia

+7 495 22 900 22, +7 499 37 251 74

InfoWatch GulfUnit 364, DMCC Business Centre, Level 1

Jewellery & Gemplex 3, Dubai, UAE

InfoWatch SDN BHDLevel 33, Ilham Tower, No. 8, Jalan Binjai

50450 Kuala Lumpur, Malaysia

+603 2117 5177, +603 2117 5178

iw‑[email protected]

infowatch.com


Recommended