Www.dataresolve.com 70+ enterprise customers Customers in 15+ industry segments 6 million+ work hours analyzed 1000+ alerts generated daily.

Slides:



Advertisements
Similar presentations
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
Advertisements

LeadManager™- Internet Marketing Lead Management Solution May, 2009.
Compliance on Demand. Introduction ComplianceKeeper is a web-based Licensing and Learning Management System (LLMS), that allows users to manage all Company,
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in Acceleratio specializes in developing high-quality enterprise.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
Designed By: Technical Training Department
Secure Private Cloud Storage for Business. The Market Trend File Sharing Any Device Any Where Public clouds are good enough to personal users but security.
Apps VS Mobile Websites Which is better?. Bizness Apps Survey Bizness Apps surveyed over 500 small business owners with both a mobile app and a mobile.
1Lecturer: Dalia Mirghani Saadabi. 2 A set of computers connected together so that they can communicate is called a computer network. This involves installing.
Providing downloadable: Adobe eBooks OverDrive Audio Books OverDrive Videos OverDrive Music MobiPocket eBooks.
Prof. Vishnuprasad Nagadevara Indian Institute of Management Bangalore
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
eScan Total Security Suite with Cloud Security
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
LANDesk Endpoint Security Audit 2.5
AtomPark Software is founded in The head office is located in Saint-Petersburg, Russia. Company is officially registered in the United States. AtomPark.
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
Zscaler New Interface and Reporting From Saturday 8 th June 2013.
Continuous Backup for Business CrashPlan PRO offers a paradigm of backup that includes a single solution for on-site and off-site backups that is more.
NON-COMPULSORY BRIEFING SESSION REQUEST FOR INFORMATION: ICT SECURITY SOLUTIONS RAF /2015/00019 Date: 29 September 2015 Time: 10:00.
FitnessGram® 2015 Student Information System (SIS) Extract Import Training for Georgia School Year.
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
Introduction We are India's leading directional media marketing company enabling SME discovery. Pioneers in discovery of platforms across B2B,B2C & C2C.
Introduction We are India's leading directional media marketing company enabling SME discovery. Pioneers in discovery of platforms across B2B,B2C & C2C.
Introduction We are India's leading directional media marketing company enabling SME discovery. Pioneers in discovery of platforms across B2B,B2C & C2C.
ITS Lunch & Learn November 13, What is Office 365? Office 365 is Microsoft’s software as a service offering. It includes hosted and calendaring.
OsMonitor Wangya Computer Co., Ltd. Employee Monitoring Software.
Presented by - Appsolz.com Mobile Apps for Business Growth.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
CloudKit 365 Office 365 reporting made easy. Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in Acceleratio.
Computer Security Keeping you and your computer safe in the digital world.
GroupRocket.net. Years back checking s in the morning was the first ever thing most of the professionals would start their day with. And with the.
The BEST Citrix/Microsoft RDS alternative
Database Encryption Market to Global Analysis and Forecasts by Types, End User and Deployment Type No of Pages: 150 Publishing Date: Jan 2017 Single.
Database Encryption Market to Global Analysis and Forecasts by Types, End User and Deployment Type No of Pages: 150 Publishing Date: Feb 2017 Single.
Database Encryption Market to Global Analysis and Forecasts by Types, End User and Deployment Type No of Pages: 150 Publishing Date: Apr 2017 Single.
Database Encryption Market to Global Analysis and Forecasts by Types, End User and Deployment Type No of Pages: 150 Publishing Date: May 2017 Single.
The BEST Citrix/Microsoft RDS alternative
Advanced Endpoint Security Data Connectors-Charlotte January 2016
BUILD SECURE PRODUCTS AND SERVICES
Secure your complete data lifecycle using Azure Information Protection
The time to address enterprise mobility is now
“Introduction to Azure Security Center”
Amazon Storage- S3 and Glacier
Software Applications for end-users
Letsignit, an Automated Signature Solution for Microsoft Office 365 and Microsoft Exchange, Provides Efficiency in Branding and Customization OFFICE.
Secure your complete data lifecycle using Azure Information Protection
Understanding best practices in classifying sensitive data
Virtual Private Network (VPN) Market
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Red Flags Rule An Introduction County College of Morris
Lifesize® Technical Update
Collaborative Business Solutions
Letsignit, an Automated Signature Solution for Microsoft Office 365 and Microsoft Exchange, Provides Efficiency in Branding and Customization OFFICE.
FitnessGram® 2015 Student Information System (SIS) Extract Import Training for Georgia School Year.
Microsoft Virtual Academy
Microsoft Data Insights Summit
Comodo Dome Data Protection
SysKit Security Manager
Presentation transcript:

70+ enterprise customers Customers in 15+ industry segments 6 million+ work hours analyzed alerts generated daily

Why Cyber Intelligence is needed? inDefend uses Business Cyber Intelligence as a unique approach towards reducing the business risks of a company through intelligent analysis of the information flowing within and outside the company in four major problem areas: Unexpected Attrition predicting and controlling employee attrition Productivity Loss Tracking Entertainment and Unproductive activities of the employees IT Misuse & Espionage IT misuse, espionage and Corporate Fraud Data Theft Loss of confidential and business sensitive data from un authorized insiders or external entities

Solution What is inDefend Business in-Cloud? inDefend is the next generation cloud based technology which uses Cyber intelligence to keep you informed about business risks through data loss, productivity, attrition and malicious insider behaviour and helps you reduce these risks.

Why inDefend Cyber Intelligence ? Job Search Tracking Monitor Job searches across different job portals Monitor resume uploads by employees Monitor s related to employee attrition Monitor confidential customer and lead database uploads before resignation Helpful in predicting employee resignations thereby enabling you to take necessary steps beforehand Productivity Tracking Track web activities of all employees like social media usage, video streaming, pornography access, Google & other web searches and 56 other web categories Tracking unproductive activities of employees like Gaming, Social Media Usage, Chatting, Online Shopping, etc. Track application usage of different employees Monitoring Employee Determine misuse of IT resources by employees Detect s sent to unrelated internal recipients Detect confidential corporate information being sent to suspicious third parties by employees Detect internal freelancing by employees Detect probable corporate fraud and espionage by using sensitive keywords in sensitive web searches and employee chats Award winning Data Security Control s, attachments and web file uploads Control file copy onto USB and CD-DVD media Control website activities through different browsers Control file transfer over IM Clients like Skype and Windows Live Messenger Control usage of internet data cards Control usage of different applications and proxies which generally bypass standard firewalls

The Intelligence Factor - 1 The intelligence in the solution lies in the feature where the product aggregates all the malicious alerts generated in the network, and presents it to the business owner or the top management in three ways: Cyber Intelligence Sensors – Social network style alerts Daily Reports – Summary of alerts generated throughout the day Real-time SMS Alerts – SMS Notification sent for the most sensitive activities happening in your network Cyber Intelligence Reports – Advanced insights are provided into your organization’s activities and recommendations are given to improve processes 4 focus areas of inDefend Cyber Intelligence

The Intelligence Factor - 2 inDefend is loaded with 7 Cyber Intelligence alerts  Social networking alerts  Pornography access alerts  Job search alerts  Sensitive search alerts  Pen drive usage alerts  Web file upload alerts  Gmail attachment alerts 23 more sensors being added to the existing product

How does it work ?

Social network style Dashboard

Cyber Intelligence Report The solution also offers a service based on its product inDefend called CI (Cyber Intelligence) Reporting for the management. This report is created by manually by our cyber security analysts by analyzing the data collected over time and then compiling it in a comprehensive document which gives a report on the different business risk areas, using which the management can take appropriate actions to avoid such risks. Sample report can be downloaded from here.here.

Daily Report inDefend sends you reports of the following activities on a daily basis: Aggregate of all Cyber Intelligence Alerts PDF report of the alerts with details like: – Activity Time – Computer where activity occurred – User linked to the alert type – Details related to the activity type Daily reports keep you updated on the move when you do not have direct access to the dashboard.

Cyber Intelligence Add-ons SMS Alerts for various sensitive activities – Job Searches – Pornographic Access – Sensitive Web searches Screenshot Monitoring – Periodic screenshots of end-user’s desktop activities

Data Collection modules – CI Engine By monitoring the following points of information flow out of your computers: – All Website activities through Firefox, IE, Safari, Chrome. – SMTP s – Gmails – SMTP Attachments – Personal Webmail Attachments – Files uploaded to the Internet – Google Chats – Skype Chats – Google /Yahoo/Bing Searches – Applications – Proxies – USB Storage Devices (Pen Drives/External Storage Drives/SD Cards) – CD/DVD Drives – Offline computers By deeply monitoring end-user’s activity on your computers using the following : – Screenshots

Endpoint Protection By Controlling – Outgoing attachments and File Uploads – USB and CD-DVD activities – Browsing activities – File transfer over IM/Messaging Clients like Skype and Windows Live Messenger – Data copied on personal devices – Different Applications and Proxies By Shadow logging of crucial & suspicious data transfer – Shadow Log , Attachments and File Uploads By Blocking internet data cards and allowing selectively By Enforcing policies on laptops and desktops both inside and outside your network By Enforcing the use of only encrypted storage devices By Blocking employees from copying information on their personal media devices

Who is using inDefend ? enterprise customers and counting Serving customers in 16 different industry segments Customers spread out in 13 different countries 6 million work hours analyzed till date An average of alerts generated on a daily basis and counting To know more about our customers, please click here.here

Product Offerings *Pricing of each version available on request

How to start ? Get started by signing up for inDefend Business Cyber Intelligence from our Cloud Signup LinkCloud Signup Link On signup you will get access to the following: – Free 14 day Trial of inDefend Business Cyber Intelligence – Online Live Demo of the product – Free Product Demo and Assisted Installation – Introductory Cyber Intelligence Report for your company

About Data Resolve Data Resolve Technologies is a fast growing young software product company, in the area of Cyber Security and Cyber Intelligence, and helps businesses secure their data from theft and loss, along with business risk mitigation through the security analytics module of their award winning product – inDefend Business. Data Resolve has thousands of footprints in their customers’ network spread out in dozens of countries, and is highly recommended for any medium size company’s top management who want to assess the risk of their business through Cyber Intelligence, and achieve global standard of data security. “The Game Changers” – A national best seller published by Random House Publishing has covered the story of Data Resolve under top 20 extraordinary success stories from Indian Institute of Technology, Kharagpur. More details about the company, products, customers, promoters, management, advisors etc. can be found at More about product available at Contact Us If you would like to speak to us on phone or want to set up a meeting we are available on the following:- Data Resolve Technologies Private Ltd 3 rd Floor, J2, Jain Link Building, Block EP & GP, Sector – V Salt Lake City, Kolkata, INDIA Mobile: Phone: /