+ All Categories
Home > Documents > What You Will Find in this...

What You Will Find in this...

Date post: 04-Sep-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
43
Transcript
Page 1: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:
Page 2: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

Contacts: +7 (495) 22 900 22 www.infowatch.com, [email protected]

Partner Contacts:

www.infowatch.com/contacts

What You Will Find in this Brochure

About InfoWatch........................................................ 3

Our Customers .......................................................... 3

Select the right InfoWatch solution to fulfill your business needs ......................................................... 4

Data Loss Prevention & Protection (DLP) ......................... 4 Intellectual Property Protection ......................................... 4 Risk Management and Compliance .................................. 4 Customer Experience and Reputation Management ........ 4

Our Products ............................................................. 5 InfoWatch Traffic Monitor Enterprise ................................. 5 InfoWatch CryptoStorage Enterprise................................. 5 InfoWatch KRIBRUM ........................................................ 6

Technology Excellence ............................................ 6

InfoWatch Traffic Monitor Enterprise Product Overview .................................................................... 7

Product Architecture.......................................................... 7 Data Monitoring and Protection ......................................... 8 Analysis and Decision Making Engine .............................. 9 Data Archiving and Reporting ........................................... 9 Vertical Industries Served ............................................... 10 Benefits ........................................................................... 10 Key Features in Traffic Monitor Enterprise 4.0* .............. 11 System Architecture ........................................................ 12 System Requirements ..................................................... 12

InfoWatch CryptoStorage Enterprise Product Overview .................................................................. 13

Product Architecture........................................................ 13 Your Gains ...................................................................... 14 InfoWatch CryptoStorage Enterprise Benefits ................. 15 System requirements ...................................................... 15

InfoWatch KRIBRUM Product Overview ............... 16 Efficient Marketing and InfoSecurity in Web 2.0 .............. 16 How It Works ................................................................... 17 Key Features ................................................................... 17 Vertical Solutions ............................................................ 18 How to Get Started.......................................................... 18

Select the right InfoWatch product for your goal 19

Data Loss Prevention & Protection (DLP) ............ 19 Information Control is a Business Priority ....................... 19 InfoWatch DLP Solution Components ............................. 20

InfoWatch guide to successful DLP implementation ....... 21 What you gain with InfoWatch DLP solution ................... 21

Intellectual Property Protection ............................. 22 Why Intellectual Property? Why now? ............................. 22 The Basics of Intellectual Property Protection ................. 22 How to Keep Intellectual Property Safe? ......................... 23 InfoWatch Intellectual Property Protection Framework ... 23 Action Plan for Protecting Intellectual Property ............... 24 What you gain with InfoWatch Intellectual Property protection solution ........................................................... 24

Risk Management and Compliance ....................... 25 Information as a Risk ...................................................... 25 Data leakage and misuse trends ..................................... 25 More than DLP ................................................................ 25 Solution Architecture ....................................................... 26 Enabling Compliance Functionality ................................. 27 Forensics vs. Privacy ...................................................... 28 What you gain with InfoWatch Risk Management and Compliance solution ........................................................ 28

Customer Experience and Reputation Management ............................................................ 29

Corporate Reputation in a New Environment .................. 29 Social Media Monitoring (SMM) ...................................... 29 The Solution .................................................................... 29 What you get from Social Media Monitoring .................... 30 KRIBRUM is Efficient and Easy-to-Use ........................... 30 Vertical Solutions ............................................................ 31 Solution for Banking ........................................................ 31 Solution for Airlines ......................................................... 32 Solution for Telecoms ..................................................... 32 Solution for Consumer Brands ........................................ 33

Success Stories....................................................... 34 InfoWatch Helps Prime Focus, a Global Visual Services Group, Protect Intellectual Property ............................... 34 InfoWatch Supports Raiffeisen Bank Russia in Securing Bank Data Confidentiality ................................................ 36 InfoWatch Supports Leading Russian and CIS Mobile Operators in Their Data Protection and Compliance Efforts38 InfoWatch Safeguards Banking Sensitive Data, Simplifies Security Risk Management and Ensures Compliance at First Energy Bank of Bahrain .......................................... 40 InfoWatch Group of Companies Contact Information ...... 42

Page 3: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

Contacts: +7 (495) 22 900 22 www.infowatch.com, [email protected]

Partner Contacts:

www.infowatch.com/contacts

About InfoWatch

InfoWatch is a group of innovative technology companies focused on developing and providing cutting-edge comprehensive technologies and services dedicated to Data Loss Prevention & Protection, Intellectual Property Protection, Customer Experience and Reputation Management, as well as Risk Management and Compliance solutions.

The company was founded in 2003 as a spin-off of Kaspersky Lab, subsequently acquired its first clients in 2004 and in the recent years has matured into a dynamically growing independent enterprise which currently remains amongst the top leaders on the global software market.

InfoWatch group of companies includes several organizations working in the sphere of information security, corporate information security and linguistic analysis, namely InfoWatch, Kribrum and EgoSecure.

With over 8-years of experience in data analysis and protection research InfoWatch has elaborated a strategic approach emphasizing on the development and implementation of comprehensive data monitoring and analysis solutions.

Businesses and government agencies rely on InfoWatch solutions when they make a strategic decision on being aware of the business-related information flows within the organization and even outside its boundaries.

Our Customers Finance/Banking Telecommunication

s Manufacturing Media Energy & Power Government

Ministry of Finance

Ministry of Customs

Ministry of Emergency

Situations

Moscow Court of

Arbitration

*InfoWatch Business Partners Network http://infowatch.com/partners

Corporate Fact Sheet Established in 2003 as a spin-off of Kaspersky Lab Headquartered in Moscow City Global Partnership Alliances in Europe, South America, Russia and CIS, Middle East and Asia * More than 150 successful projects

Mission With over 8 years of extensive real-world software development expertise InfoWatch is committed to becoming a leading enterprise-level IT solution provider on the market empowering its customers with a mixture of world-class technologies and services.

Page 4: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 4

Select the right InfoWatch solution to fulfill your business needs Data Loss Prevention & Protection (DLP) Having the ability to prevent data loss or rapidly respond to an incident may help your business on significantly minimizing the overall damage to avoid further prejudice. To safeguard corporate sensitive data against leakage InfoWatch offers its comprehensive software framework comprised of several state-of-the-art technologies, services and industry expertise that enables you to manage your information circulation, prevent unauthorized access and distribution.

“InfoWatch solutions helped us to put a stop to over 369 different information security violations within a span of only six months after product deployment.” - Svetlana Belyalova, Information Security Director for Raiffeisen Bank Russia

Intellectual Property Protection The bigger success a company makes the more unique data it generates. To keep your patents, trade secrets or employee know-how’s safe you need InfoWatch's best in class technologies and services. These solutions are dedicated to help your company on efficiently classifying and prioritizing your data to protect it against a wide range of threats that may be caused as a result of employees’ negligent or malicious actions.

“We enjoyed working with InfoWatch team on this project; not only did they offer us a comprehensive solution to protect our intellectual property, but they also were diligent enough to deliver qualified high-quality integration and technical support services.” - Feroz Shaikh, Vice President IT for Prime Focus.

Risk Management and Compliance Understanding your corporate information flow specifics and the company’s public image facilitates efficient decision-making and provides the basis for corporate governance, compliance and risk management. InfoWatch data monitoring and classification solutions are designed to control and safeguard corporate digital assets while providing assistance in managing a wide range of risks associated with circulation of commercial, personal and other confidential data. This process ensures that you easily meet regulatory requirements and international information security standards.

“We highly appreciate the quality of work delivered by InfoWatch. With InfoWatch solutions we are able to mitigate information security risks and conduct effective investigations of internal information security incidents.” - Harold Bandurin, IT Technologies Director for RusHydro.

Customer Experience and Reputation Management In the 21st century the winner is the one who is able to consider customer feedback faster and more efficiently than the competitors. Doing so is easy with a fully automatic cloud-based InfoWatch service that collects and analyzes (applying sentiment extraction) huge data volumes on a company / product / service on the Internet and represents the results in handy reports. Use these reports to evaluate corporate brand perception and analyze customer feedback on the Internet.

Your goal vs. InfoWatch product Traffic Monitor Enterprise

CryptoStorage Enterprise KRIBRUM

Data Loss Prevention & Protection + + Intellectual Property Protection + + Risk Management and Compliance + + + Customer Experience and Reputation Management +

Page 5: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 5

Our Products InfoWatch Traffic Monitor Enterprise Comprehensive modular software solution designed to prevent leakage or unauthorized distribution of sensitive corporate data. InfoWatch Traffic Monitor Enterprise acts both as an endpoint sentry, enforcing policy at the PC level, and as network gatekeeper – monitoring unstructured data traffic to ensure sensitive data is not leaked or exposed via email, webmail, social networking, instant messaging, or other online channels.

Our solution features: • Identification of sensitive data with unmatched precision, combining application of several

analysis technologies • Reliable protection of enterprise security perimeter through the control of most common data

transfer channels such as email (SMTP), web (HTTP(S)), instant messengers (OSCAR-based IMs – 40+ client types are currently supported), as well as removable data storage devices, local or network printers

• Automatic analysis and decision making: the solution automatically detects sensitive data and renders a comprehensive verdict on its further handling according to security policies

• Fast time-to-benefit: a set of preloaded industry-specific data processing and decision making rules and policies enable enterprises to immediately benefit from the data protection solution

• Forensic Storage for monitoring current activity with sensitive information (online queries) and retrospective analysis and investigation (analytic queries)

• Flexible deployment options: inline, ICAP and interception via copy mode (SPAN, port mirroring, etc.)

• Support for standard RHEL-core for low-level traffic interception to avoid possible hardware incompatibility issues

• Information security metrics for use in risk management and compliance processes • Toolset for meeting various standard and compliance requirements • Built-in reports and queries for real-time and historical incident assessments • High performance and reliability

InfoWatch CryptoStorage Enterprise Client-server software solution features sensitive transparent data encryption (for laptops, desktops, USB drives, optical media, local and network folders), centralized management of information access rights and reporting.

• Unmatched data security and ease of use for corporate employees • Centralized setup and management with high access rights granularity • Multi-user hierarchical access to protected information • Supervisory group feature for managing critical business circumstances in case of an emergency

when a password has been lost or stolen, or data access should be granted to an authorized supervisor

• Certification center provides a user friendly interface for managing different types of keys for users with personal access rights to various encrypted objects. Such keys could be generated for a single session, for a certain period of time with an expiration date or infinitively

Page 6: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 6

• High performance during encryption and decryption • Centralized logging of all actions with protected information for extensive customizable reporting • Strong encryption algorithms used: AES 128/256

InfoWatch KRIBRUM Cloud-based social media monitoring solution to help companies manage their reputation by improving customer experience and leveraging customer opinion expressed online for market-winning product development.

• Evaluate corporate brand perception by Internet audience and compare your own and competitive brands

• Detect unfavorable discussions concerning your company and resolve them by addressing negative comments directly to mitigate reputation risks

• Analyze customer reviews to detect product / service flaws and improve it • Analyze customer support services efficiency and improve customer care immediately • Analyze and improve marketing campaigns’ efficiency, define market trends based on informal

customer opinions

Technology Excellence Proven InfoWatch technologies are designed to control all major data transmission channels to perform complex data recognition, analysis, storage and encryption.

While working with enormous amounts of unstructured data our products utilize sentiment scoring, contextual, morphological and linguistic analysis (support for English, Arabic, Vietnamese, German, French, Italian, Spanish, Russian and other European languages), optical character recognition (OCR), template and digital fingerprint analysis technologies. All of those together make InfoWatch products extremely efficient for unstructured data analysis.

For the best-in-class content analysis we are proud to present our Autolinguist feature that enables automatic creation of data processing rules and technology framework or can be used for vertically-adapted data processing rules and technology framework customization for each industry served.

To accomplish the highest level of data safety you are able to maximize the use of our genuine folder/container/full disk encryption tools.

Searching for opinion on your brand online you will not miss a thing when using our proprietary web crawler along with getting all the data crystal-clear and properly arranged with efficient SPAM/duplication filtering and sentiment scoring technologies.

Page 7: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 7

InfoWatch Traffic Monitor Enterprise Product Overview Product Architecture InfoWatch Traffic Monitor Enterprise is a comprehensive software product designed to proactively tackle all business tasks for data protection, monitoring, analysis and archiving. InfoWatch product functionality architecture diagram is presented below.

Data Archive and Reporting

• Archiving of intercepted data and analysis results

• Graphical reporting system:

*Online and retrospective queries

*Statistic reports

Data Monitoring and Protection

Gateway DLP• Web Monitor• Mail Monitor• IM Monitor• IRM Integration*

End-point Protection • Device Monitor• Transparent Data

Encryption*

Analysis and Decision Making Engine

Data Analysis• Metadata analysis• Content analysis

*Linguistic analysis*Digital fingerprints*Templates analyzer

Decision Making • Allow data transmission• Block• Further processing

Product functionality architecture

1. Data Monitoring and Protection Module

• Gateway DLP component includes: • Web Monitor for controlling data sent via webmail, secure web sources (including Outlook

OWA or equivalent), social networks, blogs, Internet-forums and etc. • Mail Monitor to effectively control data information flows through corporate mail systems

within the enterprise • IM Monitor designed to control sensitive corporate information being transmitted via

instant messengers • IRM integration (Oracle IRM) module that is cost-effective and is designed to help

companies that have already deployed such solutions to save on expenses associated with implementing a fully-functional information security system

• End-point Protection component includes: • Device Monitor featuring control over local and network printers, portable devices and

removable media and shadow copying of data being printed, scanned or written to a device

• Transparent Data Encryption (InfoWatch CryptoStorage Enterprise) for policy-based encryption of file folders, removable mass storage media, hard discs, laptops, PCs, network resources, as well as in virtual or cloud environments1

1 InfoWatch CryptoStorage Enterprise is delivered separately.

Page 8: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 8

2. Analysis and Decision Making Engine • Data Analysis component is comprised of:

• Metadata analysis technologies used to effectively analyze formal attributes within a particular sensitive information piece: who, when and where transmits the data, its file type, name, size and etc. File header analysis and Optical Character Recognition (OCR) technologies are utilized to perform data analysis for identification purposes to accurately identify drawings, designs, multimedia content and a variety of other types of data. Afterwards this data is converted into text providing an ability to subsequently analyze it with unmatched precision

• Content analysis technologies include: Linguistic analysis technology to analyze unstructured data and define its subject

(category), sensitivity level, etc. Digital fingerprinting technology to identify previously labeled confidential quotes

within the information flow Templates analyzer technology to control template-based data, for example, social

security or tax file numbers • Decision Making component

makes it possible to produce a decision to allow or block the data being transmitted, as well as provides an opportunity to request for further data information processing for an authorized officer to review or seal with an "IRM-Encrypted" stamp.

3. Data Archive and Reporting Module • Data Archive and Reporting component

Forensic Storage is a centralized protected archive that stores the intercepted data for a defined period for analytics and reporting purposes. It also comes with an intuitive graphical reporting system that enables online & retrospective queries to effectively analyze captured essential data and delivers comprehensive statistic reports.

Data Monitoring and Protection The Gateway DLP component intercepts confidential and sensitive information that is being accessed, copied, printed, and transmitted in the normal course of doing business through e-mail, internet protocols, file transfer and IM (for more details please refer to the Key Features in Traffic Monitor Enterprise 4.0 section). The intercepted information provides an ample opportunity to process, analyze and subsequently produce a decision. As a result there are two ways to accurately select an optimal implementation mode that would be ideally suitable for the company's IT infrastructure. To monitor and block essential corporate data traffic inline mode may be chosen as an appropriate way to process the entire sensitive information flow through an ICAP capable gateway. Alternatively the component can be tuned to function in a constant copy mode, allowing to mirror and copy all the essential data via the SPAN mirroring port.

The Endpoint Protection component includes a local security agent – InfoWatch Device Monitor - that installs on the end-user's workstation. This agent is designed to centrally manage security policies of controlled PC's. It integrates with Microsoft Active Directory, which provides an ability to effortlessly automate the process through centralized installation on all employees' workstations. This makes possible to obtain and distribute corporate policy rules amongst everyone within the directory or apply specific rules for certain users or user groups. The software agent provides controlled access to local and network printers, portable devices, as well as shadow copying data being printed, scanned or written to external media.

Page 9: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 9

When the data is copied to removable mass-storage devices (26 device types are currently supported), printed or scanned, the local agent makes shadow copies of all the files (including text extraction from graphics formats using Optical Character Recognition) and can even block the transmission process entirely. The data captured by InfoWatch OCR technology is subsequently converted into text providing an ability to analyze it with unmatched precision. Moreover, these shadow copies are collected within the Forensic Storage archive, where they are classified according to meta data attributes, such as User PC ID's, dates and times when the data was actually copied or printed, as well as file names, file size and etc.

To achieve a maximum level of security InfoWatch CryptoStorage Enterprise software endpoint agent can be used to encrypt corporate data that is copied to external media devices or stored on user workstations including laptops.

Analysis and Decision Making Engine The sensitive corporate data that gets intercepted through communication channels is processed by a high-performance (up to 200Mbit/s) Linux-based Analysis and Decision Making Engine for further analysis.

Depending on which InfoWatch solution type is chosen - whether it's Data Loss Prevention, Risk Management & Compliance or Intellectual Property Protection - the module uses a variety of proper data processing rules and technologies to carry out analysis and decision making. The integration of content (linguistic and digital fingerprint analysis coupled with a template analyzer) and metadata technologies are responsible for ensuring that the system delivers the highest level of data analysis efficiency and decision making sustainability. For more details please refer to the InfoWatch Technology white paper.

Based on the predefined data processing rules and analysis results the application automatically produces a decision on how the captured sensitive information should be processed further (transmitted to the intended recipient, blocked or sent to an authorized officer in charge of information security). This allows on performing additional processing, consideration, or stamping the data sets with an "IRM-encrypted" seal. InfoWatch Analysis and Decision Making engine provides extensive details about the nature of the intercepted data without the necessity of getting direct access to its content, thus; making it ideal to comply with country-specific personal privacy regulations. Obtaining access to this captured information is available upon request, although is subject to legal permission.

Integration with Microsoft Active Directory enables unified user identification for all monitored data transfer channels.

Data Archiving and Reporting This feature enables conducting post-processing data analysis and reporting. The intercepted data along with the analysis results is stored in a centralized protected archive – Forensic Storage. Thanks to the responsibility zones management an authorized officer can be assigned rights to access reporting and analysis results in strong accordance with his or her position on the company organizational chart. Forensic Storage allows viewing the history of all data transmissions for a defined period and features monitoring of current actions with sensitive data (online queries) as well as retrospective analysis and investigation (analytic queries).

The required data can be searched by: • formal attributes of the intercepted objects (monitor type, sender/recipient, sent date/time, etc.) • attributes added during the object’s content analysis • content of the intercepted objects (full-text search)2

2 In accordance with existing privacy regulations special legal or workers’ council permission is required to enable full-text search.

Page 10: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 10

The integrated graphical reporting system clearly shows the specifics of sensitive information flow. For example, graphic reports can be applied to track uploading confidential information to various web sites, etc.

Depending on an InfoWatch solution type selected by the customer Forensic Storage archive may include up to 60 preloaded report templates and queries. Customized reports and search functionality are available upon request.

Vertical Industries Served To speed up the overall deployment process and let enterprises immediately take advantage from the product usage, InfoWatch Traffic Monitor Enterprise is supplied with a set of preloaded data processing and decision-making rules, report templates and analytic queries, which are customized for a variety of vertical industries. Currently InfoWatch Traffic Monitor has already proven itself in a mixture of various different industries, such as finance and banking, telecommunications, manufacturing, media, energy & power and government.

Benefits • Accurate identification of sensitive data with combined application of several analysis

technologies • Reliable protection of the enterprise security perimeter thanks to the control over the most

common data transfer channels, data copying and printing • Support for multiple file formats including popular and industry-specific file types • Preloaded data processing and decision-making rules (finance and banking,

telecommunications, manufacturing, media, energy & power and government) allowing enterprises to immediately benefit from an information protection solution

• Forensic Storage Archive for data classification, monitoring of current actions with sensitive information (online queries) and retrospective analysis, investigation (analytic queries) and reporting

• Flexible deployment options: inline and monitoring mode • High performance, scalability and reliability • Integration with transparent data encryption software (InfoWatch CryptoStorage Enterprise)

Page 11: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 11

Key Features in Traffic Monitor Enterprise 4.0*

Network traffic interception • Email (SMTP) • Web (HTTP, HTTPS) • File Transfer (FTP) • Routing (SOCKS4, SOCKS5)

Instant messaging traffic • OSCAR-based IMs – 40+ client types are currently supported • XMPP (Jabber), including Google Talk • MMP (Mail.ru agent) • MSNP (Windows Live Messenger) • Skype messaging (by means of an endpoint module)

Endpoint protection • Local agent Device Monitor installed on a user’s machine controls writing to various peripheral

devices (major types of mass storage devices, LTP-, COM-, USB- connected devices – 26 device types are currently supported), local and network printing

Complex data analysis • Popular and industry-specific files identification and analysis (program source codes, media

files, Microsoft Office and Visio, Open Office, AutoCAD, Corel Draw, Adobe Illustrator, etc.) • Content analysis technologies: digital fingerprints, templates analyzer and linguistic analysis • Extracting and analyzing text contained in graphics files using Optical Character Recognition

(OCR)

Multiple language support • Full morphological analysis in Russian, English, German, French, Spanish and Italian • Exact phrase analysis (limited) in Dutch, Kazakh, Azerbaijani, Arabic, Vietnamese, Indonesian,

Ukrainian and Turkish

Outstanding High Performance • Rapid data processing at over 200 Mbit/s

_____________________________ *To be released in early 2012

Page 12: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 12

System Architecture

Product system architecture

System Requirements Hardware requirements for particular InfoWatch Traffic Monitor Enterprise and CryptoStorage deployment are based on the number of workstations (users). Typical configuration to monitor a range of 100-3003 users is provided below:

3 InfoWatch Traffic Monitor Enterprise is capable of supporting up to 20,000 simultaneous users, handling all their traffic within a single Data Center, which is field-proven by InfoWatch customers worldwide. The corresponding hardware requirements could be provided upon request. Please contact us at [email protected] to calculate your configuration. 4 InfoWatch Traffiс Monitor Enterprise supports installation on a wide range of hardware manufactured by various vendors, including virtual machines.

Server type Quantity in cluster: Server configuration4

Traffic Monitor server 1 unit Server HP Proliant DL360 G7, 4 SFF Cage 2.5", 2x SAS SFF (2.5)HP 300GB 6G SAS 10K, 2x X5560 2.80 GHz, 4GB , P410 0MB(RAID 1,0), DVD, 2x 460W PS, ILO std (text console) Red Hat Enterprise Linux Server release 5 upd 7, x64

Forensic storage server 3 (three) months Data storage period for this configuration

1 unit HP ProLiant DL380 G7 , 8 SFF Cage 2.5" , 8x SAS HP 146GB 6G SAS 15K, E5540 2.53 GHz, 12GB, P410 512MB(RAID 1,0,5) BBWC, DVD, 2x 1200W PS, ILO std (text console) Red Hat Enterprise Linux Server release 5 upd 7, x64

Device Monitor server 1 unit Server HP Proliant DL360 G7, 4 SFF Cage 2.5", 2x SAS SFF (2.5)HP 300GB 6G SAS 10K, 2x X5560 2.80 GHz, 4GB , P410 0MB(RAID 1,0), DVD, 2x 460W PS, ILO std (text console) Windows 2003 Server Service Pack 1 .NET Framework 2.0 SP1

CryptoStorage server 1 unit MS Windows (2000 Server, XP, 2003, Vista). Hardware requirements; Pentium-4 3 GHz, 1Gb of RAM, 50 Mb of hard drive space

Page 13: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 13

InfoWatch CryptoStorage Enterprise Product Overview Protect Enterprise Data Against Unauthorized Disclosure and Data Loss While Maintaining Flexibility and Usability

Security breaches caused by unauthorized access to sensitive corporate information, careless or malicious employee actions with corporate data can have a devastating effect on any organization's business operation.

Confidential information has the greatest value to cyber criminals. Since there are a wide range of threats that put your confidential and sensitive data in jeopardy they will apply highly sophisticated methods to gain access to this data. Simple human error is one factor, but the threats span the range from purely accidental, to willful policy violations in the name of expedience, to blatant external hacking attacks and theft of confidential data or intellectual property.

• 20% of all data leaks happen because of laptop or mass-storage device loss or theft5

• The average value of a lost laptop is $49,246. 80% of these costs arise from data breaches associated with such loss6

• Intellectual property loss accounts for the 59% of the remaining cost7

Another issue arises as the workplace increasingly goes mobile. Today corporate confidential data, such as signed contracts or software code, market research or product plans, patient’s healthcare records or customer information and a variety of other information types resides mostly on employees’ laptops rather than in a secure corporate IT environment.

In this situation, loss of a device or access of unauthorized people to the information stored on it becomes much more of an issue than ever before. Traditional password protection of a laptop by integrated OS tools demonstrates its ineffectiveness. When being accessed from the other OS or hardware the data storage gets accessible again so the data can be read, copied or damaged by an unauthorized party. This particular “trick” and many others are never going to work while using InfoWatch CryptoStorage protection.

Product Architecture InfoWatch CryptoStorage Enterprise protects confidential corporate data stored on corporate servers, employee laptops, mass-storage devices, in virtual environments or cloud architectures against unauthorized access and disclosure. This client-server software product features sensitive data encryption (for laptops, desktops, USB drives, optical media, local and network folders), centralized management of information access rights and reporting.

To enable employee access to the information either a password or two-factor authentication can be used. Both approaches prove efficient in protecting information against unauthorized access. Integrated resilience tools allow restoring access to the information in case of system errors during encryption.

5 InfoWatch Global Data Leakage Report 2010 6 Ponemon Institute. The Cost of a Lost Laptop 7 Ponemon Institute. The Cost of a Lost Laptop

Page 14: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 14

Product system architecture

To contribute to business continuity and to securely recover access to the protected information in case the employee leaves the company, forgets the password or loses his/her secret key, InfoWatch CryptoStorage Enterprise comprises a supervisory group feature. This feature can be enabled by product setup. The supervisory group includes several trusted employees (InfoWatch CryptoStorage Enterprise users) whose secret keys can be used to restore access to the encrypted information. For additional data security the access can be restored only when a certain set of keys specified by product setup number of supervisory group members (quorum) are available.

Encrypted information (copied to a USB, for example) cannot be accessed outside the corporate network even by an authorized user without a special permit, issued by the InfoWatch CryptoStorage Enterprise server on a case-by-case basis. All actions with protected information are logged and stored for further analysis.

Data-at-rest protection and cloud security InfoWatch CryptoStorage Enterprise features protection of information on local machines, in network repositories, virtual environments and cloud architectures. Encrypted information can be read only by its owner or users to whom the information owner allowed access. No matter where in the cloud the data is stored it is accessible only to authorized users and is perfectly secure.

Safe hardware repair and green hardware disposal With InfoWatch CryptoStorage you can protect entire hard drives or their partitions. It is the safest way to prevent sensitive information leakage that can happen while repairing your PCs or laptops in service centers or disposal of hard drives in specialized hardware disposal agencies.

Your Gains • Management and mitigation of

financial, legal, reputational and other information-related risks associated with data loss

• Compliance with internal policies & standards, external rules and regulations, industry standards (for example PCI DSS, SOX, GLBA, HIPAA) and customer security requirements

• Cost transparency and low TCO: unlike other competing solutions, all product functionality is available inside a single module. No additional component licensing is required.

Page 15: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 15

Removable mass-storage device protection With InfoWatch CryptoStorage Enterprise you can protect information stored on various mass-storage device types – USB drives, optical media, memory cards, etc. You can copy all the data you need to a removable mass-storage device and physically move it to another location. No data breach will happen even in the event of device theft or loss.

Secure collaboration InfoWatch CryptoStorage Enterprise protects information both residing on endpoints and in server repositories to enable smooth and secure employee collaboration. Hierarchical multi-user access to the encrypted information with centralized access rights management can be easily set up. For example, employees from Microsoft AD group “sales” will have access to customer data, while the same information will not be available to the “IT” group members. The product allows protected information access outside the corporate network with special permits.

InfoWatch CryptoStorage Enterprise Benefits

Unparalleled data security and ease of use for corporate employees

• Centralized setup and management with high access rights granularity

• Multi-user hierarchical access to protected information • Supervisory group feature to restore information in case a

password is lost or stolen • Certification center provides a user friendly interface for

managing different types of keys for users with personal access rights to various encrypted objects. Such keys could be generated for a single session, for a certain period of time with an expiration date or infinitively

• High performance during encryption and decryption • Single-Sign-On mechanism and transparent on-the-fly

encryption/decryption not to interfere with regular employee activities

• Special permits to enable working with protected information outside of corporate network

• Centralized logging of all actions with protected information for extensive customizable reporting

• Strong encryption algorithms used: AES 128/256

Additional product features

• Prevention of unauthorized data deletion or modification – encrypted information cannot be accidently or intentionally deleted or modified by unauthorized users

• Guaranteed deletion of information – the data deleted with InfoWatch CryptoStorage cannot be restored even with specialized recovery programs that work perfectly for information deleted with regular OS tools

• Protection against data sniffing: the protected information stored and transmitted encrypted. It is decrypted in the RAM-memory when the data is being read (the file is being opened) and is automatically encrypted on closure

• Resilience to system errors during encryption

System requirements • Client side:

OS: MS Windows (XP, Vista, 7, 2003, 2008 R2). Hardware: Celeron 1GHz and higher, RAM 256Mb, 30Mb of hard drive space.

• Server side: MS Windows (XP, Vista, 7, 2003, 2008, 2008 R2). Hardware: Pentium-4 3 GHz, RAM 1Gb, 30 Mb of hard drive space

Page 16: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 16

InfoWatch KRIBRUM Product Overview Customer Experience and Reputation Management

InfoWatch KRIBRUM is a cloud-based social media monitoring service that provides businesses with a comprehensive structured outlook of how the Internet audience perceives a company, its products, service, personalities, and competitors.

The system gathers and analyses unlimited volumes of company-related text information, i.e. comments, references, articles, opinions, discussions, published in social media, mass media and other web resources.

The efficiency of relevant information extraction and reliability of automatic text analysis, with sentiment scoring and topic categorization, are enabled by proprietary cutting-edge search and linguistic analysis technologies.

InfoWatch KRIBRUM provides direct, prompt and structured data and analytics (supplementing traditional focus groups and questionnaires):

• Quantitative estimation and history of the audience’s interest to the monitored objects and their properties

• Emotional attitude to monitored objects and their properties

• Ideas and complaints concerning products services as a whole and their characteristics in particular

• Geography of customers, active online communities, opinion leaders, origins of publications and more

Efficient Marketing and InfoSecurity in Web 2.0 InfoWatch KRIBRUM helps enterprises strengthen their market positions in the actual customer-centric world, where most audience is online and is more influenced by each others’ opinions than by any PR or advertising.

While traditional approaches to market monitoring and customer interactions are not sufficient any longer, InfoWatch delivers a next-generation solution for reputation management, customer experience management and marketing efficiency improvement in the Web 2.0 environment. KRIBRUM provides actionable insights for:

• Monitoring and maintaining the brand perception • Identifying and resolving critical situations before they grow out of control • Retaining customer loyalty by keeping in touch with the audience and providing instant personal

support • Gathering competitive intelligence for building an efficient competitive strategy • Developing market-winning products by leveraging accumulated customer feedback • Boosting marketing efforts efficiency basing on up-to-date information on market trends,

competitive landscape, product uptake, perception of promo campaigns by the target audiences and etc.

Page 17: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 17

How It Works

Key Features

Efficient information extraction • Broad coverage: all types of online media are monitored (social networks, blogs

and microblogs, online mass media, forums, industry-focused portals, video portals, etc.) • High level of relevant information extraction thanks to the use of a proprietary web crawler

in addition to common search engines and search APIs of social media (where available) • Data extraction accuracy – up to 95% of spam and duplicates are filtering out • Close-to-real-time monitoring – information is provided within 2-4 hours since it appears • Monitoring online activities of authors and communities

specified by Customer

Automatic analysis • Advanced matured proprietary linguistic technologies with

due consideration of industry-specific context are applied for the highly reliable automatic text analysis

• Automatic sentiment scoring with over 80% fidelity • Automatic text categorization by topics with support of

custom categories and keywords (tags) • Detection of original and following publications, geography

and other attributes • Comparison of any parameter with that of any competitor

Multi-Language Support • Full support of English, Russian and Arabic languages;

other languages are coming soon

Page 18: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 18

Extensive Easy-to-Use Reporting • Web access to all data and analytics • Direct links to found online comments, with their full text available within the system • Instantly available visual reports, each graph element is clickable to provide more details • Export to XLS, PDF, XML, etc. • Workflow support, role-based access model

Deployment and Integration • API for integration with corporate IT systems (BI, CRM, call center, etc.) • Deployment in any environment, including a private cloud

Vertical Solutions InfoWatch delivers industry-specific solutions those providing superior quality of relevant information extraction and automatic analysis, thanks to:

• Using industry-specific dictionaries, taxonomies, ontologies, and search queries (“linguistic models”)

• Support of industry-specific topics and product categories • Monitoring pre-selected industry-focused web resources along

with general media with an option to add any other websites upon request

How to Get Started Running a Proof-of-Concept project enables a Customer to evaluate InfoWatch KRIBRUM in its entire scope. During a PoC the system is fine-tuned to perfectly suit the Customer’s business in real informational environment. Upon finishing the PoC, the Customer can sign for the annual subscription to take advantage of a specially tailored service.

Vertical solutions: • Retail banking • Telecommunications • Airlines • Consumer goods

Page 19: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 19

Select the right InfoWatch product for your goal

Data Loss Prevention & Protection (DLP) Information Control is a Business Priority Modern business’ sustainability and efficiency to a great extent depends on how well their sensitive information is protected. The loss of confidential data, such as customer database, intellectual property, financial or legal documentation, market research or personal data can significantly affect businesses of any size. Even a single data leak can result in spoiled reputation, regulatory fines, customer churn or loss of competitiveness.

The ever growing data volumes, typical for modern enterprises, severely complicate the challenging task of safeguarding corporate information. Huge amounts of data generated by business processes and personnel make it hard to precisely identify what information is confidential and requires protection: usually only about 20 percent of data is structured, about 10 percent of sensitive data is modified each day, and newly created (so called “zero-day”) confidential documents account for about 10% of sensitive data volume in an enterprise.

Rapid proliferation of mobile computing devices, sensitive data sharing across geographically distributed offices, widespread outsourcing projects and other new trends of global collaboration create additional obstacles in securing information confidentiality, making the traditional infrastructure security approach insufficient.

It means that nowadays efficient data management and protection can be only achieved while focusing on the data itself.

Your goal vs. InfoWatch product Traffic Monitor Enterprise

CryptoStorage Enterprise KRIBRUM

Data Loss Protection & Prevention + +

Intellectual Property Protection + +

Risk Management and Compliance + + +

Customer Experience and Reputation Management +

Page 20: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 20

InfoWatch DLP Solution Components InfoWatch DLP is a comprehensive solution (see picture below) designed to address all business tasks for data protection, monitoring, analysis and archiving.

• Endpoint protection component provides control over local and network printers, portable

devices and removable media and shadow copying of the printed or written to a device data and encryption of file folders, removable mass storage media, hard discs or their partitions

• Network / gateway protection component controls data sent via mail, secure web and web-mail, blogs, Internet-forums, instant messengers and offers integration with digital rights management systems (i.e. Oracle IRM) helping companies that have already deployed such solutions to save their expenses on implementing a fully-functional information security system

• Content Analysis Engine performs metadata and content analysis through linguistic analysis, digital fingerprinting, optical character recognition and template analyzer. InfoWatch Content Management system also uses file header information to perform analysis of data and uniquely identify sensitive data (drawings, designs, multimedia content, etc.)

• Storage component is a centralized protected archive that stores the intercepted data for analytical and reporting purposes. The component is also used for incident investigation

InfoWatch DLP components are a part of InfoWatch Traffic Monitor Enterprise and CryptoStorage Enterprise Product Family.

Page 21: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 21

InfoWatch guide to successful DLP implementation • Identify current data leakage paths • InfoWatch consulting team and company’s technical staff will play a major role in this process.

Proper risk analysis will yield more accurate and applicable results • Identify information to be protected • Usually it is a most expensive and time consuming task that includes: data identification, data

discovery and data classification • Identify what type of solution is required • There are many different types of products on the market that promise to solve data loss issues.

However not all address the problem as well as content-aware DLP solutions. Content-aware InfoWatch Traffic Monitor Enterprise DLP solution focuses on controlling the content or data itself

• Decide why the content needs to be protected • Is it for compliance reasons or for protection of Intellectual Property? This could change not only

how the content is identified but also how it is handled and reported on • Create technical DLP policy • This step is the beginning of implementation stage. Once the solution is installed it is a time to

create a policy that recognizes the actual content to be controlled and defines how it will be controlled

• Run DLP solution in test mode (2 months of live testing is recommended) • Like with any other IT implementation, comprehensive live testing is a major factor for ensuring

project success • Communicate data protection policies • Employees need to be informed about the project to guarantee its success • DLP system policy enforcement • Prioritize the policies and release the most important and critical ones first. Ensure sufficient

coverage to rectify any issues • Keep DLP system and data classifications up-to-date

What you gain with InfoWatch DLP solution • Accurate identification of sensitive data with combined application of several analysis

technologies • Reliable protection of enterprise security perimeter through the control of most common data

transfer channels, data copying and printing • Support for multiple file formats including popular and industry-specific file types • Automatic analysis and decision making: the solution automatically detects sensitive data and

renders a comprehensive verdict on its further handling according to security policies. • Fast time-to-benefit: a set of preloaded industry-specific data processing and decision making

rules and policies enable immediate benefitting from the data protection solution. • Central repository for data classification, monitoring of current actions with sensitive information

(online queries) and retrospective analysis, investigation (analytic queries) and reporting • Flexible deployment options: in-line and monitoring mode • High performance, scalability and reliability

Page 22: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 22

Intellectual Property Protection Why Intellectual Property? Why now? New or original knowledge and creative expression of ideas is the driving force of successful businesses in the 21st century. Safeguarding such knowledge and creative expression from inadvertent disclosure or its unauthorized use by competitors is becoming increasingly critical for developing and retaining competitive advantage. Building a business also requires various types of other resources, including a network of relationships and sources of funds.

Intellectual property protection drivers • There is a vast supply of new intellectual property, accessible to some degree by anyone • The law provides little protection for the creators to profit by it • The skillful exploitation of intellectual property is the single biggest factor in business success

these days

The intellectual property protection system provides a key tool for: • keeping at bay unscrupulous competitors, • developing relationships with employees, consultants, suppliers, subcontractors, business

partners and customers • obtaining funds

The Basics of Intellectual Property Protection Intellectual property can be anything from a particular manufacturing process to plans for a product launch, a secret like a chemical formula, or a list of the countries in which your patents are registered.

The formal definition, according to the World Intellectual Property Organization is creations of the mind — inventions, literary and artistic works, symbols, names, images and designs used in commerce.

Intellectual property includes but is not limited to proprietary formulas and ideas, inventions (products and processes), industrial designs, and geographic indications of source, as well as literary and artistic works such as novels, films, music, architectural designs and web pages. Your company's intellectual property, whether that's patents, trade secrets or just employee know-how, may be more valuable than its physical assets.

Intellectual property is often overlooked category of leaks. Whether you are a computer chip manufacturer creating the next great processor or a Wall Street investment firm creating the next investment package of high-growth funds, intellectual property is the greatest competitive advantage a company has toward sustainability and profitability. Most intellectual property data losses go unreported for two reasons: 1) there are no public disclosure laws, to date, that apply to intellectual property, and 2) the impact on corporate reputation and valuation from a publicized loss would likely be tremendous.

The direct costs of an intellectual property leak typically include: • Fees for legal recourse to address who leaked the data and discover if it is being used

inappropriately • Short-term impact to R&D cost recuperation • Long-term impact to profitability/revenue projections • System and process audits to identify and correct the source of the leak

The cost of a leak can vary as long-term effects can be difficult to estimate.

Page 23: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 23

Intellectual Property Categories The four legally-defined categories of intellectual property are:

• Patents (registered invention) • Trademarks (a name, phrase, sound or symbol used in association with services or products); • Copyrights (written or artistic expressions fixed in a tangible medium) • Trade secrets (a formula, pattern, device or compilation of data that grants the user

an advantage over competitors)

But intellectual property can also be something broader and less tangible than these four protected classes: it can simply be an idea.

How to Keep Intellectual Property Safe? Know what you’ve got. (If all employees understand what needs to be protected, they can better understand how to protect it, and whom to protect it from. InfoWatch Traffic Monitor technologies – linguistic analysis, template analyzer, OCR and file signatures checking - can help you identify and categorize intellectual property medium.)

Prioritize it. (For years protection of intellectual property had been done through risk and cost-benefit analysis. Use a map of your company's assets and determine what information, if lost, would hurt your company the most. InfoWatch consultants can help you in this process)

Label it. (If information is confidential to your company, put a banner or .label on it that says so – comes really helpful in the court.)

Lock it up. (Physical and digital protection is a must. Encryption (InfoWatch CryptoStorage) and digital right management systems (Oracle IRM Integration) will help you keep your digital assets safe)

Educate employees. (Humans are often the weakest link in the defensive chain)

Use right tools. (InfoWatch Traffic Monitor Enterprise tool not only locates sensitive documents, but also keeps track of how they are being used, and by whom)

InfoWatch Intellectual Property Protection Framework

Page 24: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 24

Action Plan for Protecting Intellectual Property • Include Intellectual Property strategy into the business plan • Demonstrate top-down commitment to protecting Intellectual Property • Develop rational internal process for handling and safeguarding Intellectual Property • Conduct employee training on regular basis • Document Intellectual Property and related SOP (standard operating procedures) • Search and evaluate competitors’ Intellectual Property

What you gain with InfoWatch Intellectual Property protection solution The most obvious and direct return on investment from InfoWatch Intellectual Property Protection solution is preventing data leaks, however; additional benefits include adherence to regulatory compliance and improvement to business operations or relationships management. Organizations that have implemented InfoWatch solutions derive these extra values from their investment by refining business processes and improving operational inefficiencies as a result of the increased visibility they have into their information flows.

Page 25: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 25

Risk Management and Compliance Information as a Risk Social networking may sound ethereal, but it can translate into real benefits for any company. Organizations that rely heavily on external social networks score 24 percent higher on a measure of radical innovation than companies that don't. Online networks can help hire the right people, market the product or even find a manufacturer.

At the same time CIO’s and other top managers are very reserved about the ability to ensure enterprise security when it comes to the use of social networking, mobile platforms and cloud computing, according to a new survey from IBM. Most of the perceived risks have to do with the accessibility, use and control of data, especially when it comes to social networking and the potential danger of having unauthorized access to confidential, proprietary information. IT leaders are grappling with how to take advantage of the benefits that all of these solutions have to offer without risking their organization's business continuity, jeopardizing compliance or diminishing brand strength.

Data leakage and misuse trends • Grow rapidly: at least 2 incidents per day • Intentional leaks are growing • Most of the leaks go unannounced • Cost more: average incident clean-up cost was $7.2 mln / leak in 2010 • No 100% efficient solution yet; prevention of accidental leaks mostly

One data leak can result in continuous cost. After addressing its customers or partners concerns, conducting an internal investigation, repairing any damage to internal systems and dealing with expected litigation, the company can count on external audits, increased regulatory body oversight and a damaged reputation to stay with it for a while. One mistake can have far-reaching consequences, and a serious leak may mean that the business will never recover – or at least never return to “normal”.

Social network sites are potentially useful business tools, but only if it is approached with an adequate amount of caution and common sense. Since social networking was not created with security in mind, InfoWatch Risk Management and Compliance solution helps mitigate this risk while keeping the doors open for enhancing business communications and gaining completive advantage.

More than DLP Unlike the classical risk management model that had been developed around the management of structured data, InfoWatch focuses on analysis of information flow beyond known sources.

InfoWatch Risk Management and Compliance solution offers more than just DLP stand-alone products from other vendors. It is a comprehensive information management solution that integrates with corporate infrastructure and business processes. Our products are not "policy-driven", but "data-driven" and aimed at discovering new information flows within the enterprise, as well as optimizing the existing ones.

Since the unstructured data is intended for human consumption, InfoWatch solution for Risk Management and Compliance (see Solution Architecture picture below) provides text mining functionality for enabling the discovery of such data and gathering its sources, ownership information, destinations and patterns for the optimization of business processes.

Page 26: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 26

Solution Architecture

DLP toolset – control of major data transmission channels and reliable protection of sensitive information against unauthorized access and loss with InfoWatch Traffic Monitor Enterprise and CryptoStorage Enterprise Product Family

Forensics – investigation and archiving component used in conjunction with InfoWatch Traffic Monitor Enterprise

Reputation Management – cloud-based social media monitoring component helping companies manage their reputation risks in the Internet with InfoWatch Kribrum

When implemented properly, InfoWatch Risk Management and Compliance solution returns a wealth of information about data being stored, transferred and used on and across the networks and the Internet. Using DLP toolset and Forensics for data discovery and through studying the results and better understanding of data flows, the company will be able to determine where to apply extra layers of protection. It may choose to take advantage of the built-in active prevention features within the DLP toolset or choose to utilize other controls to enable this protection. Reputation Management component helps companies manage their reputation risks in the Internet sources like Facebook, Twitter and etc. by identifying and resolving critical situations before they grow out of control. It is important to recognize the fact that InfoWatch Risk Management and Compliance Solution can help identifying specific types of information within much larger repositories of unstructured data.

Page 27: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 27

Enabling Compliance Functionality Government regulations and worker privacy laws play a significant role in how organizations structure and implement data protection policies. The more globally dispersed the organization is, the more impact international law has on policy and workforce monitoring. Even though privacy laws and regulations vary from country to country, there are a number of requirements that should guide the formation of policy that enables the organization to demonstrate compliance:

• Protect security of the data itself • Demonstrate regulatory compliance • Safeguard employee privacy

Compliance with what? • Company internal policies & standards • External rules and regulations • Industry standards • Customer (security) requirements

Application Usage and Risk Report (5th Edition, Spring 2010) from Palo Alto Networks shows that barriers to accessing applications are at an all-time low, accelerating the adoption of applications regardless of geography or vertical industry. While financial services and healthcare workers increasingly rely on social media for business collaboration, they often ignore the associated risks such as non-compliance, data loss and threat propagation. These risks can jeopardize the company’s network as well as the integrity of the entire business operation.

94 percent of the healthcare and financial services organizations included in the study use an average of 28 social networking applications, including Facebook, Twitter and LinkedIn. Both industries have regulations that require organizations to control and monitor information flow across social networking applications in order to protect the confidential data they manage. However, because social networking apps use port 80 or port 443, all traffic appears to be browser-based traffic. This lack of visibility into social networking traffic could be a violation, or lead to violations, of compliance with industry rules and regulations.

InfoWatch Traffic Monitor Enterprise and CryptoStorage Enterprise Product Family enable compliance by providing:

• Forensic storage (archive) and investigation tools • Control over the information flow • Data security • Real-time and historical reports

Page 28: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 28

PCI-DSS SOX GLBA HIPAA

Industry Retailers, merchants, payment processors, acquirers

Publicly traded companies

Banks, financial Institutions, insurers, securities brokers

Healthcare providers, health plans and self-insured employers

Data Example

Cardholder data and sensitive information, including: primary account number, name, service code and expiration date

Unannounced financial data, trade secrets

Names, addresses, phone numbers, bank and credit card account numbers and social security number

Names, addresses, phone numbers, e-mail, date of birth, social security number, medical record number, insurance benefit number.

Penalties $500,000 per incident for noncompliance; loss of certification, business and consumer confidence; cessation of ability to process transactions

Up to $5M plus prison time, depending on intent.

Up to $100,000 per violation

Failure to comply: up to $25,000. Wrongful disclosure: up to $250,000, depending on pretense and intent, plus prison time.

Products for meeting compliance requirements

InfoWatch Traffic Monitor InfoWatch CryptoStorage Enterprise

InfoWatch Traffic Monitor InfoWatch CryptoStorage Enterprise

InfoWatch Traffic Monitor InfoWatch CryptoStorage Enterprise

InfoWatch Traffic Monitor InfoWatch CryptoStorage Enterprise

Technologies used for data analysis

InfoWatch Linguistic Analysis Digital Fingerprinting InfoWatch Template Analyzer InfoWatch AutoLinguist

InfoWatch Linguistic Analysis Digital Fingerprinting InfoWatch Template Analyzer InfoWatch AutoLinguist

InfoWatch Linguistic Analysis Digital Fingerprinting InfoWatch Template Analyzer InfoWatch AutoLinguist

InfoWatch Linguistic Analysis Digital Fingerprinting InfoWatch Template Analyzer InfoWatch AutoLinguist

Forensics vs. Privacy The topic study conducted by our legal advisors outlines the following:

• InfoWatch Traffic Monitor and CryptoStorage Enterprise Product Family support security risk management and compliance purposes based on general audit and compliance requirements

• It may serve to implement general data protection requirements related to disclosure and access control in specific situations (data processor relationships, automated retrieval procedures and notification requirements for specific data types)

• Such tools may serve to fulfill genuine business interests by protecting business secrets in areas/ branches with high dependency on research and proprietary information

DLP toolset requires specific configuration and integration into the customer’s overall security scheme (categorization of information, employee directives, works-council agreement, individual information and consent of the employees)

What you gain with InfoWatch Risk Management and Compliance solution • High-tech competitive advantage for managing operations, risks and reputation • Better understanding of business processes and trends • Reduction of financial loss • Compliance with regulatory requirements • Protection of commercial secrets, intellectual property • Increased trust of customer and partners

Page 29: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 29

Who benefits most from automatic SMM

• Telecom operators

• Retail banks

• Airline carriers • Consumer goods

large manufacturers

Customer Experience and Reputation Management Corporate Reputation in a New Environment The importance that corporate reputation has to a company's success is recognized increasingly, especially by public companies operating on highly competitive mass markets as their reputation almost directly translates into market position and overall capitalization.

To manage corporate reputation and secure positive customer experience and business profitability, it’s crucial to have in-depth and instant knowledge of what people are saying about the company, what they want and complain on, how customers rate products and services of the company and its competitors.

As the Internet has evolved to become the most ubiquitous and influential communication media where any person has an own voice, and where people easily and enthusiastically exchange their opinions, traditional PR and marketing approaches are no longer efficient.

Businesses need to adopt next-generation tools for managing corporate communications and reputation in the open online environment.

Social Media Monitoring (SMM) Independent feedback is trusted much higher than any advertising in traditional media, so private opinions expressed online can boost demand for some products and ruin market prospects of others.

Social media – blogs, forums and social networks – are places that are absorbing and concentrating most of this valuable customer feedback that businesses need to know and work with every day.

Moreover, people are generally more willing to share negative experience than to tell ‘success stories’, so the more customers a company has, the more complicated online environment it has to cope with.

Employing an efficient automated tool for social media monitoring and analysis is crucial for a business success in the Internet-driven world.

The Solution InfoWatch KRIBRUM is a cloud-based social media monitoring solution.

KRIBRUM provides businesses with a comprehensive structured outlook of how the Internet audience perceives a company, its products, service, personalities, and competitors.

The system gathers and analyses unlimited volumes of company-related unstructured text data, i.e. comments, references, articles, opinions, published in the Internet, and delivers structured visual reports at any time.

KRIBRUM combines proprietary cutting-edge search and linguistic technologies for efficient data extraction and automatic analysis with high-quality sentiment scoring and topic categorization.

Page 30: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 30

Key Features at a Glance • Immense search coverage

with a proprietary web crawler

• Close-to-real-time monitoring

• Spam & duplication filtering with up to 95% efficiency

• Automatic sentiment scoring with over 80% reliability

• Industry-focused solutions • Extensive visual reporting • Role-based access model

• Multiple languages support

What you get from Social Media Monitoring InfoWatch KRIBRUM provides structured information directly from end customers and other stakeholders, which enables you to:

• Monitor and maintain the brand perception • Keep in touch with the target audience: find out what

people think and establish direct communications to nurture customer loyalty

• Identify critical situations before they grow out of control and resolve them by addressing negative comments directly

• Improve customer experience by providing instant personal online support

• Stay aware of what competitors do and how customers react

• Accumulate customer feedback in a categorized structure to develop market-winning products/services

• Determine market trends through informal customer opinions

• Increase marketing efforts efficiency, tune promo campaigns “on the fly” basing on the target groups’ feedback

KRIBRUM is Efficient and Easy-to-Use Coverage Search engines cannot guarantee a full coverage due to being too general, no matter whether a manual or an automatic information retrieval is used. The proprietary web crawling technology applied in addition to common search engines allows gathering over 90% of information on the monitored objects.

Data extraction accuracy Web search brings vast amount of diverse links, a great deal of which are irrelevant to the monitored object, are duplicates or homonyms. Such entries are filtered out with up to 95% efficiency.

Close-to-real-time monitoring Average “life span” of social content generally equals to 6-8 hours. To enable a real-time reaction when needed, KRIBRUM detects relevant data as soon as it appears and generates reports at any required time.

Automatic text analysis with sentiment scoring and topic categorization The gathered information is processed, structured and analyzed. Comprehensive linguistic technologies are applied for automatic categorization and sentiment scoring (positive, negative, neutral) of each mentioning, with over 80% fidelity.

Multi-language text analysis Especially important for geographically distributed companies.

Visualization and reporting The results of monitoring and analysis are provided in visual reports with any required filters at any needed time. Interactive graphs make it easy to dig into details or have a general view.

Page 31: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 31

Industry focus There is no universal language, and same words may have different meanings and express different emotions in various contexts. To ensure high accuracy of automatic sentiment analysis the current context, mainly accustomed by industry specifics, is considered: a ‘linguistic model’ is created for each industry.

Vertical Solutions InfoWatch delivers industry-specific solutions providing high-quality extraction and automatic analysis, thanks to:

• Using industry-specific dictionaries, taxonomies, ontologies, and search queries (“linguistic models”) • Support of industry-specific topics and product categories • Monitoring pre-selected industry-focused web resources with an option to add other websites

upon request

KRIBRUM vertical solutions address key business cases of each target industry, as described below.

Solution for Banking

Reputation Management Reputation is critical for the key risks in banking:

• Retaining market share and liquidity management Reputation easily suffers from negative references (fair or not), smear campaigns (‘black PR’), confidential data leakage or improper distribution of corporate information, irresponsible or harmful behavior of own staff, etc. KRIBRUM enables prompt reaction to situations potentially damaging to the corporate reputation, so it brings value to the departments involved into management of the key risks: marketing communication, information security and treasury.

Marketing Communications The system provides direct information from the target audiences on:

• Brand perception, active communities, opinion leaders, attitude to competitors, reaction to PR & promotion, etc.

KRIBRUM thus enables Marketing Department to improve communications with customers, increase the efficiency of promotional activities and build a working competitive strategy.

Product Management Built-in specific product categories provide structured customers’ feedback on the key banking products:

• Payments, cards, loans, deposits, and more

Product Managers use this data to detect product gaps and develop new market-winning products.

Channels Management KRIBRUM enables evaluation the service quality in different channels:

• Branches or service outlets, ATM, eBanking This information is vital for improving customer experience with the bank and thus retaining customer loyalty.

Page 32: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 32

Solution for Airlines Product Management for Customer Experience Improvement KRIBRUM delivers a complete feedback from airline clients on their experience with the carrier and the carrier’s alliance partners. It includes quantitative data and informal suggestions on each aspect of the onboard service, flight schedule, booking options, etc. The information is structured in specific built-in categories:

• Booking, pricing, airports, aircrafts, staff, and more KRIBRUM also reveals customer preferences in various regions. By leveraging customer feedback and considering their requests, the air carrier can improve overall service level and enhance the service offering to gain and retain clients.

Marketing Communications KRIBRUM provides marketers with an actual customer intelligence to be used as a sober basis for targeted promotional activities:

• Customer experience with various joint loyalty programs • Airline brand perception and expectations, geographical distinctions in target groups, and etc.

Competitive Intelligence A complete outlook of customer attitude and uptake of various competing offerings, with competitive comparisons by any parameter available within the same interface, enables to detect emerging market trends and build a winning competitive strategy to secure and strengthen the carrier’s market positions.

Solution for Telecoms Customer Experience Management & Churn Prevention InfoWatch KRIBRUM delivers subscribers’ references to various problems people are actually having:

• Issues with networks (connection), VAS, devices, rate plans, and etc. Such cases can be processed by support team in the same way as regular requests. Fast and personal response to online complaints from a Carrier representative helps retain subscriber’s loyalty and prevent churn. To enable efficient real-time online customer support, KRIBRUM provides:

• API for integration with CEM / CRM / Call Center / Customer Support IT solutions. • Functionality for direct interactions with customers on communities’ web sites from the service UI

Marketing Communications KRIBRUM provides prompt, complete, direct and structured information from the target audiences on:

• Brand perception, advertising and PR perception, opinion leaders, geographical distinctions, etc. This enables Customer’s Marketing to better target promotional activities and increase their efficiency.

Product Management InfoWatch KRIBRUM contains built-in specific categories to accumulate structured feedback on the key telecom products:

• Voice calls, video calls, voicemail, SMS, MMS, 3G, 4G, EDGE, GPRS, Wi-Fi, and more

These data enables to detect and improve the current products’ drawbacks and develop market-winning VAS, tariff plans, and etc.

Page 33: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 33

Competitive Intelligence KRIBRUM tracks subscribers’ feedback on competitors’ offerings and provides the same data on competitors as on the Customer’s monitored objects. Competitive comparison by any parameter is available at any moment.

Network Development Subscribers’ comments on connection quality help identify most urgent or persistent problems with the network.

Solution for Consumer Brands

Marketing Communications InfoWatch KRIBRUM provides information of the quality and timeliness those can hardly be achieved using traditional marketing methods (focus groups, questioning, surveys). This is especially true in case of high differentiation of target audience, which is a very characteristic trend of the actual market environment showing the demand for customization of products, personalization of service and customer-specific sales approach.

Product Management To investigate consumers’ attitude to the observed products and their parameters and features, any specific product categories can be added for automatic analysis by KRIBRUM. This enables Customer’s Product Managers to improve current products and develop new appealing products.

Competitive Intelligence KRIBRUM tracks consumers’ feedback on competitors’ offerings and provides the same data on competitors as on the Customer’s monitored objects, with a competitive comparison available at any moment, which helps building a winning competitive strategy.

Customer Intelligence KRIBRUM gathers information on consumers involved in brand discussions and consumption, identifying their preferences, consumption habits, purchase situations, influencers of buying decisions, as well as available demographic and geographical situation. The data can be stored in a CRM system for further use for Customer Experience Management, Product Development and Marketing Communications.

Page 34: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 34

Success Stories

InfoWatch Helps Prime Focus, a Global Visual Services Group, Protect Intellectual Property

Introduction The challenge of intellectual property protection still remains to be deficient. In fact most of the times the majority of people tend to be reluctant to overlook on this important task or not address this problem entirely given the nature that the actual meaning of what intellectual property could or couldn’t be still confuses everyone. Intellectual property (IP) can be anything from a particular manufacturing process to plans for a product launch, a secret like a chemical formula, or a list of the countries in which your patents are registered.

Intellectual property is the greatest competitive advantage a company has towards sustainability and profitability and thus should be carefully protected against loss or disclosure. In every specific case only the company itself can define what comprises its intellectual property and should be secured.

Customer Prime Focus is a global Visual Entertainment Services group that provides creative and technical services to the Film, Broadcast, Commercials, Gaming, Internet and Media industries. Visual Entertainment Services is a new definition for an industry where technology, visual delivery platforms and content are converging and evolving. Prime Focus lists BBC, Corner Stone Entertainment, the Brooklyn Brothers, Warner Bros. Streetlight Films and many other companies among its customers.

Challenges Maintaining a trustworthy relationship amongst customers and partners is of outermost importance for a media services company like Prime Focus. Providing such a company with new movie or game ideas for production, the global international filming or gaming vendors want to be assured that these digital assets are kept confidential until the official release date given the fact that the entertainment market constantly absorbs an enormous amount of competitiveness. Cases when competitors learn about upcoming projects and come up with a product first are not that rare in the visual entertainment market.

Prime Focus, as a globally-operating company, guaranteeing its customers with end-to-end solutions from pre-production to final delivery was keen on keeping intellectual property of its customers protected against malicious or accidental leakage and disclosure. The emphasis was made on safeguarding video (movies) and text files (scripts).

The requirements list included prevention of video and text files leaving the corporate network and a unified archive for long-term storage of the information on activities done with the essential data to enable retrospective analysis when needed.

Date of implementation: January 2011

The Prime Focus

facility in Mumbai, India is one of the busiest

VFX facilities in the region.

With a capacity seating of over 600 artists

and 10 plus features in production at any

given moment.

Feroz Shaikh Vice President IT

Prime Focus: “When choosing

the right intellectual property protection

solution we decided to implement

InfoWatch Traffic Monitor, as it features

complex information analysis, arbitrary data

categorization and unified Forensic

Storage.”

Page 35: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 35

Solution To ensure reliable intellectual property protection during the overall selection process Prime Focus carefully studied all available alternatives to minimize the integration efforts and impact it would have on the existing IT infrastructure. The company was choosing from several vendors, including InfoWatch. InfoWatch offered Prime Focus its enterprise-grade internal data protection solution – InfoWatch Traffic Monitor Enterprise. The solution gives companies full control over their information flow and helps safeguarding intellectual property.

InfoWatch Traffic Monitor Enterprise provides comprehensive protection against information leakage and data breaches. It acts as a network gatekeeper – monitoring outbound traffic to ensure sensitive data is not leaked or exposed via email, webmail, social networking, instant messaging, or other online channels and controls local activities with the data (copying and printing).

Several analysis technologies, such as in-house developed linguistic analysis, digital fingerprinting and templates analyzer provide high intellectual property detection reliability. The analysis results trigger automatic decision on whether e-mailing or copying this specific information would be a security policy violation and on how it should be processed further, for example, sent or blocked. The decision is based on pre-defined security policies and rules that can be easily customized.

The intercepted and analyzed data is stored in a centralized archive – Forensic Storage for retrospective analysis and investigations.

InfoWatch not only offered a comprehensive reliable solution, but was also able to fulfill Prime Focus' specific requirements for 64-bit OS support.

Results InfoWatch cooperation with the media company started from a pilot project. PrimeFocus is happy with the way software integration was carried out and how InfoWatch delivered exceptional technical support, training and consulting services throughout all stages of project implementation, which had only taken a couple of days to complete. Subsequently the customer extended the cooperation with a commercial agreement, thus expressing their assurance in the choice made towards a solution provider. Today InfoWatch Traffic Monitor Enterprise successfully safeguards Prime Focus’ intellectual property and helps strengthening trustworthy relationships with customers and partners.

InfoWatch Traffic Monitor Enterprise

is a comprehensive packaged software solution that gives

enterprises full control over their information flow, helps minimize

financial and other risks, associated with data loss and ensure

legal compliance in the data protection field.

Customer Reference Competition in visual entertainment market is really fierce today. Our customers share with us their future release plans and rely on our discretion in keeping them safe. To better serve the needs of our respected customers we decided to implement additional security measures – a special intellectual property protection solution. Wherever possible, Prime Focus collaborates with leading technology vendors and IT developers. We enjoyed working with InfoWatch team on this project; not only did they offer us a comprehensive solution to protect our intellectual property, but they also were diligent enough to deliver qualified high-quality integration and technical support services. Feroz Shaikh Vice President IT Prime Focus

Page 36: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 36

InfoWatch Supports Raiffeisen Bank Russia in Securing Bank Data Confidentiality

Introduction Internal data protection is one of the most major issues for financial organizations. Banks handle significant amounts of personal information of existing and potential customers. This information must be thoroughly protected against disclosure; as such a disclosure inevitably leads to significant reputational and financial damage. Local and international standards, for example PCI DSS, require financial organizations to seriously address the problem of information security. In particular, sensitive information must be protected both when stored and transferred. All operations with the information should be monitored and recorded with the option of recorded data analysis.

Customer Raiffeisen Bank Russia is a subsidiary of the Austrian banking group “Raiffeisen”. The bank has operated in Russia since 1996, providing various financial services to both retail and corporate customers. Today, Raiffeisen Bank Russia is one of the most reliable financial institutions on the Russian market with the BBB- rating according to Standard & Poor’s. Raiffeisen Bank is a member of major Russian and International associations, including Visa International Service Association and MasterCard International Incorporated.

Challenges To protect their sensitive data and comply with internal and external information security regulations Raiffeisen Bank Russia needed a solution to control their e-mail flow. The bank rolled out strict requirements to the solution: scalability for easy deployment across all bank branch offices, reliability to guarantee protection of sensitive data combined with uninterrupted e-mail exchange and long-term data storage feature to retrospective analysis and investigation.

Solution After careful study of available solutions, Raiffeisen Bank Russia turned to InfoWatch for the InfoWatch Traffic Monitor Enterprise product. InfoWatch Traffic Monitor is a comprehensive software solution that gives enterprises full control over their information flow, controlling the data transmitted outside the corporate network via corporate or web-mail, web-pages, IMs, printed or copied to removable mass-storage devices.

The intercepted data is first analyzed according to formal attributes, such as monitor type, sender/recipient, send date and time, etc. Then the contents of the data packets are extracted and analyzed using several content analysis technologies. After analysis conducted based on pre-defined security policies and rules, the solution automatically makes the decision on how the intercepted information piece should be processed further – sent or blocked.

Date of implementation: August 2009

Svetlana Belyalova, Information Security

Director: “The solution helped us

to prevent 369 information security

violations during about half a year after

implementation.”

Page 37: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 37

In the event of a security policy violation the security officer will be notified. InfoWatch Traffic Monitor provides the security officer with detailed information on the intercepted object, without direct access to its contents to comply with personal data privacy regulations.

The analyzed data is stored in a centralized archive – Forensic Storage – for further reporting and statistics.

Results InfoWatch Traffic Monitor Enterprise was successfully integrated into the bank’s IT infrastructure and is now actively used to control corporate e-mail exchange. The solution has proved to be easy to manage and maintain: several information security officers now effortlessly control e-mail flow in all bank branch offices throughout Russia ensuring that no confidential data ever leaves the company via e-mail although at the same time allowing for all regular business mail to pass.

The solution helps Raiffeisen Bank Russia to minimize financial and other risks associated with information loss and ensure legal compliance to information security requirements.

In the first six months after installation 369 information security violations were prevented thanks to InfoWatch Traffic Monitor Enterprise.

Customer reference “Reputational risks arising from confidential data loss are most important for a bank, as reputation counts among major assets of a financial institution. Bad reputation means no customers and no future.

DLP solutions are most effective today in protecting sensitive information against leakage. We decided to choose InfoWatch Traffic Monitor Enterprise as it combines the most effective data analysis technologies, including linguistic analysis, digital fingerprints and analysis. The complex application of these technologies delivers the required information security level.

InfoWatch Traffic Monitor Enterprise fully controls outgoing e-mail flow (SMTP). Thanks to relevant data categorization the solution installed in all our branch offices can be easily managed by several information security officers with the same high protection level. The solution helped us to prevent 369 information security violations during the first 6 months after implementation.” Svetlana Belyalova Information Security Director Raiffeisen Bank Russia

InfoWatch Traffic Monitor Enterprise

is a comprehensive packaged software solution that gives

enterprises full control over their information flow, helps minimize

financial and other risks, associated with data loss and ensure

legal compliance in the data protection field.

Page 38: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 38

InfoWatch Supports Leading Russian and CIS Mobile Operators in Their Data Protection and Compliance Efforts

Introduction Because of their business specifics telecom operators collect and process an enormous amount of personal data – customer names, addresses, IDs, account numbers, complaints, and etc. This information is used to better understand customers’ needs, work out new attractive service offers, shared with 3rd parties such as outsourced call-centers conducting a study on customer satisfaction on carrier’s request or promoting carrier’s new initiatives.

Local and international regulators pay great attention to the matter of keeping the data collected by telecom operators secured. Nowadays in almost every country in the world there are specific legislations in place that govern personal data processing, for example Federal Data Protection Act in Germany, Data Privacy Directive and Privacy and Electronic Communication Regulation in the European Union, Data Privacy Act in the UK, Federal Law on Personal Data in Russia, and many others.

The amount of accumulated information and regulators’ requirements put carriers under a high pressure and force them to thoroughly address the issue of data protection: people are generally very sensitive when it comes to their personal information. Even a single customer data leak can result in corrupted reputation, devastating customer churn, financial underperformance and regulatory fines.

Customers 2 leading Russia & CIS mobile carriers with approximately 115 million subscribers.

Both carriers have a diversified service portfolio for end-users and business customers, ranging from basic local and international mobile calls to differentiated value-added services like WiFi and 3G connectivity.

The carriers are members of respected Russian and international telecommunication industry associations.

InfoWatch in Brief • Established in 2003 • The only European

Data Leakage Prevention Solutions vendor

• More than 140 successful projects

Selected Customers: • 2 out of 3 top Russian

mobile carriers • 3 out of 5 largest

Russian banks • 4 Russian federal

ministries • 5 out of 7 top Russian

oil companies

Challenges To protect their sensitive data, comply with personal data protection legislation and multiple internal and external information security regulations, the carriers needed a solution that would give them full control over their information flow and provide insight into where and how the information is transmitted and who uses it.

The carriers had a range of requirements to the desired solution: scalability for easy deployment across their regionally distributed facilities, reliability to guarantee protection of confidential data combined with uninterrupted business-processes, enhanced performance to handle a huge amount of data, long-term data storage and information access logging features for further investigation.

Page 39: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 39

Solution Both carriers addressed InfoWatch for its enterprise-grade internal data protection solution – InfoWatch Traffic Monitor Enterprise. The solution provides enterprises with full control over corporate information flow, helps achieving better operational efficiency and ensuring compliance with multiple local and international data privacy and protection regulations.

InfoWatch Traffic Monitor Enterprise intercepts email, Web, secure Web, IM, network printing traffic and makes shadow copies of data being printed, scanned, written to external media, sent by email, or posted to a social network. The intercepted data is first analyzed according to formal attributes, such as sender/recipient, send date and time, etc. Then the contents of the data are extracted and analyzed using several content analysis technologies, such as digital fingerprints, templates analyzer and linguistic analysis. The combined application of several content analysis technologies ensures more precise and accurate confidential data identification.

After analysis the solution automatically produces a decision on how the intercepted data should be processed further – sent or blocked. The decision is reached according to pre-defined security policies and rules that can be flexibly customized.

The security officer gets alarmed in the event that a security policy has been breached. InfoWatch Traffic Monitor Enterprise provides the security officer with comprehensive information on the intercepted data without giving direct access to it to ensure that no personal data / correspondence privacy acts are violated. The security officer can confirm or alter the system’s decision.

The intercepted data is stored in a centralized archive – Forensic Storage – for an unlimited storage time. InfoWatch Traffic Monitor Enterprise allows tracing all employees’ operations with the data and features users’ current activity monitoring and retrospective analysis.

InfoWatch Products:

InfoWatch Traffic Monitor Enterprise

is a comprehensive packaged software solution

that gives enterprises full control over their information flow,

helps minimize financial and other risks, associated

with data loss and ensure legal compliance in the data

protection field.

Results InfoWatch cooperation with the carriers started from a pilot project that was later extended to serve the needs of their multiple regional branch offices throughout Russia and CIS. Thus the carriers validated their assurance when choosing internal data security solutions provider. To speed up the implementation InfoWatch supplied the product with a set of preinstalled data processing rules (set of preloaded data processing and decision-making rules, report templates and analytic queries, which are customized for a variety of vertical industries.), especially custom-tailored for telecommunications market.

InfoWatch Traffic Monitor Enterprise was successfully integrated into carriers’ IT infrastructure and is now used to provide reliable protection of the network security perimeter. The solution helps carriers protect both of their own and their customers’ data and comply with the requirements of the Russian Federal Law “On Personal Data” and several other standards and regulations.

Page 40: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 40

InfoWatch Safeguards Banking Sensitive Data, Simplifies Security Risk Management and Ensures Compliance at First Energy Bank of Bahrain

Introduction Today, the vital importance of confidential data protection and overall information security has become absolutely apparent, especially in the banking industry where most of the data is considered to be sensitive & essential for any business to remain competitive. At the same time, corporate data volumes are substantially growing, IT infrastructure is going more diverse, and corporate staff is getting more involved into using various web and mobile services, which all makes corporate information protection to be a really challenging task. Customer First Energy Bank B.S.C. (c) (“FEB” or the “Bank”) is an Islamic investment bank licensed by the Central Bank of Bahrain and is headquartered in Manama, Kingdom of Bahrain. The Bank operates an extensive network across the region, emphasizing on investments in development, production, transportation, storage, refining and distribution of hydrocarbons, as well as on oilfield services and energy sector technologies. FEB also explores opportunities to invest in the development of power generation capacity and renewable energy technologies. The Bank operates in accordance with Islamic Sharia’a principles as a financial partner in project development, joint ventures, mergers and acquisitions, including asset & portfolio management. FEB has an authorized share capital of $2 billion USD and a paid up capital of $1 billion USD. The Bank’s shareholders include investors from Bahrain, the United Arab Emirates, Libya, Saudi Arabia and other countries within the region. Challenges Faced by the challenges of sensitive data protection in the rapidly emerging information environment, First Energy Bank required an industry-proven solution to safeguard its confidential information, "zero-day" documentation and a variety of other private banking data from leakage and improper distribution, while simplifying security management with minimal IT resources. Among major requirements, First Energy Bank needed full support for Arabic languages, while complying with general and banking industry-specific info security standards and regulations. Solution InfoWatch DLP Banking Suite secures confidential banking data by controlling its distribution and addresses critical security and compliance requirements. The Suite includes InfoWatch Traffic Monitor Enterprise that delivers comprehensive easy-to-manage functionality of Data Loss

Date of implementation: November 2011

FEB was incorporated in the Kingdom of

Bahrain in June of 2008 and is the first Islamic investment

bank entirely focused on the global energy

sector, predominantly within Middle East and

North Africa.

Page 41: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 41

Prevention & Protection (DLP) both on gateway (web, secure web, and email traffic control) and endpoint (reading, copying and printing control with shadow copies functionality) levels, and CryptoStorage Enterprise that enables transparent encryption of sensitive data on laptops, desktops, USB drives, optical media, local and network folders restricting access to encrypted data solely by the person who encrypted it. Subsequently, an integrated InfoWatch Forensic Storage technology archives the data for further analysis and investigation, in compliance with banking security requirements. First Energy Bank selected the InfoWatch solution over the rest of the competition not only due to its functionality, reliable performance and compliance, but also because of InfoWatch expertise in addressing the specific banking business needs, and fast time to benefit: InfoWatch DLP Banking Suite comprises a set of preloaded banking-specific data processing and decision making rules (including the Arabian Linguistic Analysis Engine) and policies. It automatically detects banking sensitive data and renders a comprehensive verdict on its further handling according to banking security or compliance policies. Another InfoWatch advantage is the capability of archiving terabytes of analytical data, including those from corporate email streams for further retrospective analysis and forensic compliance. Results The efficiency of InfoWatch DLP Banking Suite and timeliness of its deployment was demonstrated within just 72 hours upon deployment: InfoWatch Traffic Monitor Enterprise successfully prevented an internal security policy breach. The incident was identified, blocked, captured and analyzed by InfoWatch proprietary Decision Making Engine, and then the incident was stored in InfoWatch Forensic Storage Archive for further processing. The whole InfoWatch team is delighted to be part of this project to securely enable First Energy Bank's business with our latest innovations to prevent security breaches and safeguard their most essential digital assets. This project clearly demonstrates that InfoWatch protection and encryption solutions entirely meet today's Middle East banking security and compliance standards. Customer Reference “We had witnessed an immediate demonstration of comprehensive functionally and the actual value this DLP solution had brought to our Bank, which is definitely above all other previously tested solutions. We are delighted with InfoWatch’s technology excellence and expertise in banking domain, which underlies their efficiency in preventing both accidental and intentional data loss. Partnership with InfoWatch secures our business in a complicated information environment.” Ali Al Saegh IT Security Manager FirstEnergyBank

InfoWatch Traffic Monitor Enterprise

is a comprehensive packaged software solution that gives

enterprises full control over their information flow, helps minimize

financial and other risks, associated with data loss and ensure

legal compliance in the data protection field.

Page 42: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 42

InfoWatch Group of Companies Contact Information InfoWatch group of companies includes several international organizations with local offices and distributed network of business partners all around the world. Local Offices Russian Federation InfoWatch Headquarters 2-aya Zvenigorodskaya str., 13, bld. 41 123022, Moscow, Russia www.infowatch.com Office: +7 495 22 900 22 Fax: +7 495 22 900 22 [email protected] [email protected] [email protected]

Germany EgoSecure GMBH - InfoWatch Group Subsidiary Pforzheimer str. 134 76275, Ettlingen, Germany www.egosecure.com Office: +49(0)7243 / 354 95-0 Fax: +49(0)7243 / 354 95-10 [email protected] [email protected]

Business partners Asia-Pacific

Communication Links Ravi Kiran Estate Unit N 116 first floor Plot N B58, Oshiwara Link Road, Next to Monginis Factory, Andheri West, Mumbai – 400053, India Office: +91-22-26736767 Fax: +91-22-267-36863 Site: www.comlinks.in E-mail: [email protected]

SPECTRUM (Comguard) 522, Arcadia, Hiranandani Estate, Ghorbunder Road, Thane (W)-400607, Maharashtra, India Tel: +91-22-40243181 Fax: +91-22-40243181 Site: www.spectrumme.com E-mail: [email protected]

XPAND Solutions 20/3 Manthope Second Street Maduvankarai Guindy, Chennai – 600032, India Tel +91-422-4288127 Fax: +91-422-4288199 Site: www.xpand.in E-mail: [email protected]

Page 43: What You Will Find in this Brochuretech-titan.com/infowatch/pdf/InfoWatch_Corporate_Brochure_02-02-… · Contacts: +7 (495) 22 900 22 , IW-Global@infowatch.com Partner Contacts:

www.infowatch.com © 2011, InfoWatch 43

Softline Solutions International Sdn Bhd Тel: +603 6411 3699 ext. 7153 Support Line: +603 6411 3698 Fax: +603 6411 3696 [email protected] E-mail: [email protected] Unit K-3A-3A, block K, Solaris Mont Kiara, Jalan Solaris Off Jalan Duta Kiara, Mont Kiara 50480 Kuala Lumpur, Malaysia Site: www.softline.my

CHIPSANG & ASHMANOV Co., Ltd. Tel : +84 (8) 39 33 99 55 Fax : +84 (8) 39 33 34 86 Head Office Lot T2-4, Saigon Hi Tech Park, D1 Street, Dist. 9, HCMC, Vietnam Branch 253 Dien Bien Phu Street, Ward 7, Dist. 3, HCMC, Vietnam Site: www.csa.vn E-mail: [email protected]

Middle East

Fakhro Electronics WLL Tel:1722 0091(D) Fax:1722 0049 P.O. Box 39, Manama, Kingdom of Bahrain, Office 12, Building 425, Road 1805, Manama 318 Site: fakhro.com E-mails: [email protected], [email protected]

Spartan Infotech Co. WLL Tel: +973 77110190 Fax: +973 77110191 2nd Floor, No. 668, Al Hasan Building, Diplomatic Area 317, Manama, Kingdom of Bahrain Site: spartaninfotech.com E-mail: [email protected]

Gulf Bureau for research and economic consultants Tel +96614655370 Fax +96614631045 Business development manager 501\502 Rabayat bld., Olaya road, P.O. Box 92658, Riyadh – 11663, Kingdom of Saudi Arabia Site: gulf-bureau.com E-mail: [email protected]

Softline Тel +98 (21) 88794947 ext. 108 2nd Floor, No. 259, Dastgerdi St., Tehran, Islamic Republic of Iran Site: www.softlinegroup.com E-mail: [email protected]


Recommended