InfoWatch proposes innovative security solutions

During BIS Summit 2016, InfoWatch Group has unveiled a range of new information security solutions and has told the audience about new data protection concepts and technologies in the face of ongoing changes — in the Agile Era.

At the summit, Natalya Kaspersky, President of InfoWatch Group, held round table «Government, Business and Society in a New Reality of Digital World: Opportunities, Risks, and Collisions»bringing together executives and officials from the Russian Ministry of Communications and Mass Media, Bank of Russia's Chief Information Protection and Security Department, I.T. Group, VTB Bank, Information Democracy Fund, and the Moscow School of Management Skolkovo.

Rustem Khairetdinov, Deputy CEO at InfoWatch Group, addressed the plenary session with his vision of how to transform information security (IS) objectives and efforts in the Agile Era, and emphasized how it is important to integrate IS solutions and business processes.

"Agile-born information systems need a dramatically different approach to security," said Rustem Khairetdinov. "Legacy security paradigm ‘First develop, then protect’ does not work anymore because changes occur faster, previously separate information systems are integrated, and users now include company’s contractors, customers, and even prospects. Attackers are becoming more skillful and better armed. Evolving social media and social engineering techniques merge online and offline threats, with offenders now combining technical and information attacks and actively using machine learning."

"Information security professionals must address the new threats with adequate solutions powered by the state-of-the-art scientific achievements. This is a challenge requiring all stakeholders – business users, developers, IT specialists, and information security officers – to change the ways they communicate with each other," added Deputy CEO of the Group.

Nikolay Zdobnov, Deputy Sales Director, InfoWatch Group, announced 'a new target for DLP record highs.' He delivered a presentation on a new DLP vector across both Big Data and enterprise information security: BigDLP. Nikolay believes that existing DLP solutions are not good enough to meet the needs of IS teams and a scale of today's information threats. This is where BigDLP takes lead by making business executives aware of potential threats and events in advance.

"Ever-increasing speed of changes and emerging data channels dilute enterprise security perimeter," said Nikolay Zdobnov. "In this case, BigDLP systems must acquire information from almost any source, depending on the context and content, including environments that have never been touched by traditional DLP solutions. For instance, it could be a company or its products mentioned in online media, with an author being identified as the company’s employee. Such systems must be able to process, analyze, and interpret dynamic data on an object’s behavioral specifics and environment, with real-time reports being delivered."

A new concept behind the exhibited InfoWatch Traffic Monitor 6.5 is truly simple: prevent rather than report incidents. The concept was reflected in the features of Version 6.5: blocking confidential data leaks from workstations, restricting operations in business-critical data apps, and banning data copy-paste with clipboard and screenshots.

In addition, the audience saw another new product, InfoWatch Vision, which visualizes information flow intelligence in real time to identify potential internal offenders and investigate incidents in every detail.

A separate booth demonstrated comprehensive protection solutions for automated industrial control systems. The attendees could check the level of enterprise information security and listen to InfoWatch experts’ recommendations on how to ensure information security of automated industrial control systems.

Furthermore, InfoWatch experts revealed the features of a new IS concept rooted in Attack Killer solution, which ensures continuous enterprise security and web infrastructure protection against DDoS attacks and hacking.

l.12-.057c.834-.407 1.663-.812 2.53-1.211a42.414 42.414 0 0 1 3.345-1.374c2.478-.867 5.078-1.427 7.788-1.427 2.715 0 5.318.56 7.786 1.427z" transform="translate(-128 -243)"/>