You are here

What's new in InfoWatch Traffic Monitor

InfoWatch
Traffic Monitor 
Designed to prevent

Agent-based DLP

InfoWatch Traffic Monitor prevents sensitive data from leaving a user desktop, and thus enables a security officer to avert internal threats at the very moment when an incident is going to happen.

Blocking data leaks via:

  • Corporate email
  • Webmail
  • Social media
  • HTTP(S) protocol
  • Removable media
  • FTP

All power of InfoWatch technologies is applied to analyze data at any attempt to send it from an employee's desktop or mobile device:

As a result, the system prevents leakage of complex structured data and excludes false positives, while having no impact on corporate business processes.

Restrict the staff from misconduct within business apps

InfoWatch Traffic Monitor helps generate a role model to control both how employees use business systems and how data is extracted from them.

  • Restrict data copying to clipboard
  • Restrict making screenshots
  • Restrict printing

These rules effectively regulate even cases when an employee runs an application through a terminal session.

Addressed tasks

  • Role management for data marts
  • Restrict data export from mission-critical apps (CRM, ERP, etc.)
  • Control over operations in custom business apps

Preventing data leaks from mobile devices

Introducing mobile devices to a corporate environment dissolves enterprise network perimeter and makes sensitive data control even more challenging. To address this challenge, we developed InfoWatch Device Monitor Mobile.

The module makes it possible to control how employees use email, web resources, photos and messengers on their mobile devices. That said, employees can use smartphones and tablets in full and remain as efficient as usual; the solution just mitigates the risk of confidential information leakage via mobile channel.

  • Images taken with a smartphone
  • Messages and messengers
  • Corporate email and webmail
  • Data posted on the web
  • Apps being launched
  • Cloud storage control

Supported models of Android devices:

  • Samsung Galaxy S3/S4/S5/S6/A3/A5/J1
  • Huawei Ascend P6 / Honor 5x
  • Google (ASUS) Nexus 7
  • Xiaomi Redmi Note 3 Pro
  • Asus ZENFONE 2

Incident investigation improvements

With InfoWatch Traffic Monitor, you can monitor how sensitive information is moved via the most vulnerable and critical routes, excluding ordinary business operations. The system alerts a security officer only if a clipboard operation may cause a data leakage; for example, when data is copied from a business system to an instant messenger.

Analysis results highlighting

  • compatible with all analysis technologies
  • highlights particular keywords or text fragments

Incident notifications (for security officers and violators)

  • customizable for different policies
  • contain a brief description of the incident
  • any changes occurred in the incident are reported to a security officer

Report manager

  • query and report management (including hierarchy and access right management)
  • query results caching
  • events exporting, including attachments

What else?

  • Intercepting files being copied from a desktop to shared resourcess
  • Intercepting files being copied to a mobile device (MTP support)
  • New investigation tools:
    • Quick Event Search by ID
    • Increased productivity of full-text search
    • Distribution of access rights to search queries