InfoWatch introduces new generation DLP system

InfoWatch being one of the leading global DLP vendors introduces a new 5.0 version of its flagship InfoWatch Traffic Monitor Enterprise software to the international market. This innovative solution brings DLP segment to the new business level and opens for corporations revolutionary opportunities in cost saving and lowering operating risks.

InfoWatch Traffic Monitor 5.0 inherits advanced technologies of the previous version but first in the market introduces a business-oriented approach to the process of data leakage prevention.

«Heads of company’s business units are first to learn which information is confidential and needs to be protected. They know best who and how is permitted to work with these data. And only the owner of information can recognize a malicious intent of insider under the innocent activities at the first glance. Thus it is reasonable that the process of security management itself should be closely tied to business process», – comments Alexander Klevtsov, DLP product manager at InfoWatch.

In the context of fast changing business tasks DLP solution must provide easy and flexible system of turning company’s internal rules into security policies reflecting all the spectrum of internal threats and risks caused by data leakage. InfoWatch Traffic Monitor 5.0 implements a brand new platform which independently analyses the completeness of specified conditions and allows setting IT security policies easily and without specific knowledge

Inter alia such easy setting and usage allows dramatically change the situation with DLP solutions penetration into the SMB segment which suffers from data leaks not less than Enterprise companies but usually lack resources to implement and run such systems.

InfoWatch Traffic Monitor 5.0 analyses much more data types to build a threat model than traditional DLP systems. For example thanks to the built-in tools for interaction with the HR Department, InfoWatch Traffic Monitor allows customization and use of special targeted policies for monitoring of personnel who are included in a risk group, with the creation of special reports on the activity of such employees. Employees who are probationers or who are serving out their notice are most at risk – InfoWatch Research Center repeatedly noted that these employees leak the data most commonly.

The solution concept implements various business units’ involvement in security management. InfoWatch Traffic Monitor 5.0 allows assigning role-based access privileges for different groups of users - HR, legal department, marketing, top management, etc. and controlling information which they consider confidential.

Depending on which policy has been breached notification of a divisional director, where the alleged offender works is implemented. This includes both direct break of IT security policies (sending out or copying confidential information) as well as illegitimate storage. Such notifications allow preventing negligence of data usage as well as malicious leak.

InfoWatch Traffic Monitor identifies the malefactor and copartnership and gathers incident statistics which allows preventing the most crucial threats including conspiracy (internal and external malefactors). All information is stored in a single database for further incident forensics, building reports and prompt response to the incident. Data on breaches represent graphs indicating breach trends, number of breaches, reach statistics by policy and by category.

Access to the system management console is provided through user-friendly web interface. The system can be managed from any workstation irrespective of the operating system being used (Windows, Linux, Apple Mac OS) or a browser which makes management process easy and comfortable.

Interception and analysis technologies were also significantly improved. InfoWatch Traffic Monitor 5.0 detects confidential data transfer irrespective of the data type whether it is plain text, graphics (photos, etc.) or binary data. At that the malefactor can’t bypass the system by changing the file resolution, adding image noise, etc.; unlike other DLP systems в отличие от других InfoWatch Traffic Monitor 5.0 understands file content rather than just defining whether it matches some formal criteria.

Modern business applications are an essential tool which helps organizations to make more efficient decisions, save costs and boost productivity. They store huge volumes of corporate data including confidential that is why new InfoWatch Traffic Monitor version highlights the technology of databases protection. This technology detects database downloads from business applications and blocks it unauthorized distribution. In case of an incident digital proofs can be used for forensics and trial.

The solution is supplied in two configurations – InfoWatch Traffic Monitor Enterprise for large companies and InfoWatch Traffic Monitor Standard optimized for SMB companies. Thanks to increased productivity the solutions do not create network overload and do not influence on usual work process.

«New InfoWatch Traffic Monitor version is a huge step forward in DLP systems development, – comments Tatiana Beley, InfoWatch marketing director.. – If earlier these systems were mainly used for solving the IT security tasks now they can help meeting business challenges. New generation of DLP systems help business to be sure in security of valuable or confidential data, give understanding of all internal and external flows in organizations, allows revealing conspiracy, malefactors, people involved in industrial spying; help дает conducting business intelligence in order to control employee activities and defining the level of personnel loyalty. This leads directly to saving costs, decrease of business risks and enterprise protection against internal threats. Over InfoWatch Traffic Monitor 5.0 development we followed this business-oriented concept, and now we are ready to offer our customers new and more efficient model of information flows management within the company.».

Read more  

l.12-.057c.834-.407 1.663-.812 2.53-1.211a42.414 42.414 0 0 1 3.345-1.374c2.478-.867 5.078-1.427 7.788-1.427 2.715 0 5.318.56 7.786 1.427z" transform="translate(-128 -243)"/>