InfoWatch Data Control: a simple solution of complicated problems

The InfoWatch Company is entering a market of small and medium business with a unique for this segment simple program hardware solution – the system of data leak prevention InfoWatch Data Control. The new product takes control over the main channels of data leak, it is simple to operate, does not require any specific features from an enterprise and is affordable at a price all along – it offers everything that a small-scale enterprise needs for data security.

The product InfoWatch Data Control is unique in its own way, because the market of data leakage prevention systems does not provide with products that may cover necessities of small-scale enterprises. Meanwhile InfoWatch has developed a product that responds to any requirements of a small-scale company in the field of saving corporate secrets, commercial secrets or any other types of confidential information. Such requirements have become a problem of today especially after the adoption of multiple laws about personal data as well as on account of a crisis situation in economics when the concurrence have become as aggravated as never before.

The solution is a n appliance that carries out the monitoring and filtering of data passed to somewhere outside the company via e-mail, web or systems of instant messaging communications (e.g. ICQ) and blocks the transmission of confidential information via these channels. InfoWatch Data Control permits to analyze both the intercepted data according to its formal attributes – the type of intercepted data, sender / recipient, datum / time of sending off, file name / type / size etc. - and the content of an intercepted object. If any words, phrases or parts of a text indicating the confidentiality of data were detected within the flow of outgoing information, the system makes a decision to block the sending of data to somewhere outside the company (blocking outgoing traffic containing confidential data with a further notification of a security officer) or to notify a security officer about the incident (copy-mode).

Regardless of the type of confidential information that needs to be protected (personal data or technological information, numbers of credit cards or telephone numbers, others) InfoWatch Data Control effectively prevents any attempts to pass this information to somewhere outside the company. The unique feature of this solution is an option of confidential data security from the moment of their creation with no need of any further actions concerning installing or indexing that should be done by the user (so called “zero-day documents” security).

The doubtless advantages of InfoWatch Data Control for the client are the minimization of regulative risks (the compliance with requirements of legislation concerning data protection), risks of damaging business reputation, in particular as a result of trials, the protection of intellectual property and the commercial secret of a company. And all of this with the preservation of operating conditions of existing in company business processes and IT solutions during the installation of Data Control solution.

InfoWatch Data Control will be useful for both companies operating personal data (medical institutions, banks, service providers, notary’s offices etc.) and companies that possess valuable technological information, the loss of which may damage their competitiveness (IT, pharmacy, building industry etc.)

The solution is intended for small and medium enterprises with from 50 to 500 employees in number.

Natalya Kaspersky, InfoWatch Chief Executive: “The Russian SMB market of systems of data leak prevention is an almost undeveloped segment today and in these terms our solution has excellent perspectives. We get a lot of requests from small and medium enterprises, which we couldn’t offer anything till this very moment because earlier InfoWatch solutions were first of all intended for corporations. Now we do have something that we can offer a small customer: a comprehensive, effective, simple and affordable product for an optimal protection against internal threats”.

l.12-.057c.834-.407 1.663-.812 2.53-1.211a42.414 42.414 0 0 1 3.345-1.374c2.478-.867 5.078-1.427 7.788-1.427 2.715 0 5.318.56 7.786 1.427z" transform="translate(-128 -243)"/>