You are here

InfoWatch Endpoint Security Features

InfoWatch EndPoint Security follows the principle "first, understand the company's situation, then build a security".
Insight analyzes the situation inside the company, while the functional modules of InfoWatch EndPoint Security ensure its protection.

INSIGHT MODULE

A module for in-company monitoring and diagnostics

Detects personnel misbehavior and corporate network weaknesses, generates clear reports that show what areas and processes need extra protection.

Insight collects data on:

  • PERIPHERY LEVEL:

    • Copying data to external devices: who, when, and what
    • Using external devices and removable media
    • User rights to access files and external devices
    • Personnel activities analyzed by business hours and days
    • Categories of data copied by employees (executable files, documents, xls files, videos, logs, etc.) to external media
    • Attempts to access prohibited devices and files
  • NETWORK DIRECTORY LEVEL:

    • Most popular types of devices (network folders, cloud storages, terminal disks)
    • Statistics on network directory usage by employees and departments
    • Personnel activities analyzed by business hours and days
    • Categories of data copied by employees (executable files, documents, xls files, videos, logs, etc.) to network directories
  • APPLICATION LEVEL:

    • Statistics on application launching and using
    • Most popular applications with breakdown by a certain employee or department
    • Background and active applications on staff computers
    • Categorizing of applications (e.g., required and non-required for work)
    • Software program or application can be deleted directly from the console
  • INTERNET LEVEL:

    • Various websites browsed by employees
    • Staff activities in the Internet by business hours or days
    • Statistics on background and active use of the Internet resources

INFRASTRUCTURE AND DATA PROTECTION MODULES

Protection focused on the most vulnerable infrastructure elements and business processes.

How InfoWatch EndPoint Security protects your business

  • CRITICAL INFORMATION ACCESS CONTROL BASED ON EMPLOYEE RIGHTS

    Active use of removable drives, flash disks, tablets, smartphones, and other communication devices by office employees associates with serious risk of company's sensitive information copying and misusing by employees.

    InfoWatch EndPoint Security controls access to devices, ports, network interfaces, network directories, and cloud storages.

    The product provides vast access right control options:

    • by list of permitted drive types;
    • by permitted device models (access is granted to device models from permitted list only, while access to any other models is prohibited);
    • by device serial numbers (access is granted to devices with specific serial numbers irrespective of user rights);
    • by list of permitted wireless networks (access to Wi-Fi networks not included in permitted network list can be denied).
  • INFORMATION CONTROL DURING ITS COPYING, STORING AND USING IN CLOUD STORAGES

    Small companies actively use clouds for data exchange and storage; however, only few such companies consider cloud information protection.

    InfoWatch EndPoint Security monitors all files sent by employees to Dropbox, OneDrive, GoogleDrive, or BoxSync, and manages such actions by prohibiting or allowing document uploads depending on specific data type and format.

    InfoWatch EndPoint Security features enable secured file exchange via cloud storages.

  • DATA PROTECTION AGAINST THEFT IN CASE OF LAPTOPS OR FLASH DRIVES BEING LOST

    Removable media and laptops are the most vulnerable devices in the corporate infrastructure because employees often lose or leave them.

    InfoWatch EndPoint Security offers simple and handy information protection using data encryption. With data encryption enabled, InfoWatch EndPoint Security can significantly enhance stored information security:

    • no stranger can read your data;
    • device loss or theft will not cause data leakage;
    • all data is automatically encrypted as soon as it is created without hindering employee activities and requiring extra time (transparent encryption).

    The product can encrypt information on laptops, PCs, external devices, and cloud storage directories.

    Data is encrypted in a background mode going absolutely unnoticed but transparent for employees.

    In InfoWatch EndPoint Security, encryption can be either initiated by an employee or forced by system administrator. Mobile encryption function of InfoWatch EndPoint Security enables out-of-office employees to use data securely.

  • APPLICATION LAUNCH CONTROL

    Games, movies, music and other entertainment content... Are you sure your employees are not watching a new movie on a corporate desktop right now? Or playing games? How does your company monitor this?

    InfoWatch EndPoint Security can be used to manage application launch and control personnel access to apps based on white (allowed) or black (denied) lists. This insures that no prohibited software or file will be installed or executed on office computer during working hours.

  • POWER SUPPLY MANAGEMENT SYSTEM

    It helps configure an option to switch off non-used computers according to a schedule or presets in order to consume less power in idle mode, and treat computer turning-on beyond working hours as an incident.

  • DATA WIPING

    Administrator can configure scheduled permanent destruction of data in recycle bins and users' temporary folders, as well as permit users to irrecoverably remove any files and folders on their own. Five information erasure options are offered ranging from the least recourse-consuming option to the most reliable one.

  • REPORTING SYSTEM

    With the reports, you can view logs (where various events are recorded such as user right grant/change, external device use, computer activities, system status, and history of user operations with external devices) and even learn how computer power supply management can save money and reduce CO2 emission.