As a result, the system prevents leakage of complex structured data and excludes false positives, while having no impact on corporate business processes.
Banning the staff from doing certain activities within business apps
InfoWatch Traffic Monitor 6.5 helps generate a role model to control both how employees use business systems and how data is extracted from them.
Ban on data copying to clipboard
Ban on making screenshots
These rules effectively regulate even cases when an employee runs an application through a terminal session.
Role management for data marts
Ban on data extraction from mission-critical apps (CRM, ERP, 1C)
Control over in-house software operations
Preventing data leaks from mobile devices
Introducing mobile devices to a corporate environment dissolves enterprise network perimeter and makes sensitive data control even more challenging. To address this challenge, we developed InfoWatch Device Monitor Mobile.
The module makes it possible to control how employees use email, web resources, photos and messengers on their iOS and Android mobile devices. That said, employees can use smartphones and tablets in full and remain as efficient as usual; the solution just mitigates the risk of confidential information leakage via a mobile channel.
Images taken with a smartphone's camera
Messages and messengers (including Skype for Android devices)
With InfoWatch Traffic Monitor 6.5, you can monitor how sensitive information is moved via the most vulnerable and critical routes, excluding ordinary business operations. The system alerts a security officer only if a clipboard operation may cause a data leakage; for example, when data is copied from a business system to an instant messenger.
InfoWatch Traffic Monitor 6.5 now better handles screenshots:
Filtering screenshots by a certain employee or workstation
Filtering screenshots by an active application
Screenshots as an incident investigation tool
While investigating events, a security officer can select an incident and view screenshots made before and after it, thus promptly reconstructing and investigating what really happened.
And what is more...
Intercepting files being copied from a desktop to shared resources
Detecting triangular seals InfoWatch Traffic Monitor will identify the transfer of a sealed document even if a seal is upside-down or overlapped by printed or handwritten text.
Intercepting files being copied to a mobile device (MTP support) When an employee tries to use a mobile device as a flash drive.