You are here

What's new in InfoWatch Traffic Monitor Enterprise 6.5

InfoWatch
Traffic Monitor 6.5
Designed for prevention

Agent-based DLP

InfoWatch Traffic Monitor 6.5 blocks sensitive data once it leaves a user desktop, and thus enables a security officer to avert internal threats at the very moment when an incident is going to happen.

Blocking data leaks via:

  • Corporate email (SMTP, MAPI)
  • FTP
  • Removable media
  • Webmail (Gmail, Yahoo and Outlook.com)
  • Social media (Facebook, etc.)
  • HTTP(S) protocol

All power of InfoWatch technologies is applied to analyze data at any attempt to send it from an employee's desktop:

As a result, the system prevents leakage of complex structured data and excludes false positives, while having no impact on corporate business processes.

Banning the staff from doing certain activities within business apps

InfoWatch Traffic Monitor 6.5 helps generate a role model to control both how employees use business systems and how data is extracted from them.

  • Ban on data copying to clipboard
  • Ban on making screenshots
  • Printing ban

These rules effectively regulate even cases when an employee runs an application through a terminal session.

Addressed tasks

  • Role management for data marts
  • Ban on data extraction from mission-critical apps (CRM, ERP, 1C)
  • Control over in-house software operations

Preventing data leaks from mobile devices

Introducing mobile devices to a corporate environment dissolves enterprise network perimeter and makes sensitive data control even more challenging. To address this challenge, we developed InfoWatch Device Monitor Mobile.

The module makes it possible to control how employees use email, web resources, photos and messengers on their iOS and Android mobile devices. That said, employees can use smartphones and tablets in full and remain as efficient as usual; the solution just mitigates the risk of confidential information leakage via a mobile channel.

  • Images taken with a smartphone's camera
  • Messages and messengers (including Skype for Android devices)
  • Corporate email and webmail
  • Data posted on the web
  • App run
  • Cloud storage control (Google Drive, Dropbox)

Supported models of iOS devices:

  • iPhone 4/4s5/5s/6
  • iPad 1/2/3/mini/air

Supported models of Android devices:

  • Samsung Galaxy S3/S4/S5/S6/A3/A5/J1
  • Huawei Ascend P6 / Honor 5x
  • Google (ASUS) Nexus 7
  • Xiaomi Redmi Note 3 Pro
  • Asus ZENFONE 2

Control over data going through clipboard

With InfoWatch Traffic Monitor 6.5, you can monitor how sensitive information is moved via the most vulnerable and critical routes, excluding ordinary business operations. The system alerts a security officer only if a clipboard operation may cause a data leakage; for example, when data is copied from a business system to an instant messenger.

Screenshots

InfoWatch Traffic Monitor 6.5 now better handles screenshots:

  • Filtering screenshots by a certain employee or workstation
  • Filtering screenshots by an active application

Screenshots as an incident investigation tool
While investigating events, a security officer can select an incident and view screenshots made before and after it, thus promptly reconstructing and investigating what really happened.

And what is more...

  • Intercepting files being copied from a desktop to shared resources
  • Detecting triangular seals
    InfoWatch Traffic Monitor will identify the transfer of a sealed document even if a seal is upside-down or overlapped by printed or handwritten text.
  • Intercepting files being copied to a mobile device (MTP support)
    When an employee tries to use a mobile device as a flash drive.
  • Multi-user sessions supported