Www.searchinform.ru Data Loss Prevention in the Banking Industry.

Slides:



Advertisements
Similar presentations
Aspire Vertical Markets Law Office. Law Office Solutions.
Advertisements

DIGIDOC A web based tool to Manage Documents. System Overview DigiDoc is a web-based customizable, integrated solution for Business Process Management.
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
RbitPoint Computer Network Monitoring Software Complete Software Solution for Controlling all computers from your desk www. samaysoftware. net.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
«Challenges companies face when building information security systems» Practical Aspects of Deploying Data Leak Prevention Systems Based on SearchInform.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
We make it easier for businesses of all sizes to safely accept checks transmodus offers clients automation utilizing our online processing platform for.
Practical Aspects of DLP System Deployment
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Internet…issues Managing the Internet
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
OPC Alarm.NET.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Make your messaging reliable use it Messaging. A single and global solution Send, receive and process any type of message through the appropriate channel.
Security Guidelines and Management
Chapter 7 Database Auditing Models
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
© 2011 Autodesk Securing AutoCAD IP in the era of WikiLeaks Presenter: Rahul Kopikar Co-Founder, Seclore Technology.
Presence Applications in the Real World Patrick Ferriter VP of Product Marketing.
Presented By: Product Activation Group Syndication.
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
Comprehensive DLP Solutions in Large Geographically Dispersed Companies.
Information Systems Today: Managing in the Digital World TB4-1 4 Technology Briefing Networking.
«Points at issue» Practical Aspects of Deploying a DLP System Based on the Experience of SearchInform Ltd
Surveillance Equipment For Internet Activities It is a Internet activities surveillance equipment designed for sniffer package from networking, converter.
AtomPark Software is founded in The head office is located in Saint-Petersburg, Russia. Company is officially registered in the United States. AtomPark.
Application Layer CHAPTER 2. Announcements and Outline  Administrative Items  Questions? Recap 1.Introduction to Networks 1.Network Type 2.N etwork.
CIM6400 CTNW (04/05) 1 CIM6400 CTNW Lesson 6 – More on Windows 2000.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
SEC835 Practical aspects of security implementation Part 1.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Computer Emergency Notification System (CENS)
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Network Security & Accounting
BEST Guard – Information Logging. bEST Guard Records all actions executed on an MFP Produkt type: Server based application (software only) Development.
«Fly Carrier» agent software Optimization of data transmission over IP satellite networks.
Living Online Module Lesson 23 — Networks and Telecommunication Computer Literacy BASICS.
Incident Security & Confidentiality Integrity Availability.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
DECISION Group Inc.. Decision Group Monitoring Center Solution on Internet Access for LEA or Intelligence.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Cyberoam.
Vehicle Management System. 2 About BMS Company BMS International Systems Development Ltd. BMS develops and implements sophisticated and easy to use “all-in-one”
DLP Solutions in Large Geographically Dispersed Companies.
1 A Look at the Application Authorized users can access Communicator! NXT from any Internet-capable computer via the Web.
Colleen Alber OnBase Mail Integrations. Agenda 1.Integration for Microsoft Outlook 2.Mailbox Importer.
GroupRocket.net. Years back checking s in the morning was the first ever thing most of the professionals would start their day with. And with the.
Software Overview How to… Review Video and Data  Review the Journal Review the Journal  Simple Search Simple Search  Advanced Search Advanced Search.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Network Monitoring Kathryn Hockman. What is Network Monitoring Network Monitoring involves the use of a system that is constantly monitoring a network.
G063 - Intranets, the Internet and Extranet. Learning Objectives: At the end of this topic you should be able to: describe the characteristics and purpose.
3.1 Types of Servers.
Internet Business Associate v2.0
Maintaining Windows Server 2008 File Services
CONFIGURING A MICROSOFT EXCHANGE SERVER 2003 INFRASTRUCTURE
Introduction to Operating Systems
3.1 Types of Servers.
The Information Protection Problem
3.1 Types of Servers.
CHAPTER 2 Application Layer.
of DLP System Deployment
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
Employee Monitoring Solution
COMPLETE BUSINESS TEXTING SOLUTION
Comodo Dome Data Protection
Presentation transcript:

Data Loss Prevention in the Banking Industry

Leaks of sensitive data may not only weaken a bank’s competitive position, but also lead to negative attitude on the part of clients and competent state authorities. Loss of sensitive data on customers (both private and corporate) and/or their financial deals is surely the most dangerous type of data leaks. Data Loss Prevention in the Banking Industry

Banking security officers lay a special emphasis on the following types of information security threats (data leaks): Data Leaks

 A “dramatic” brain drain to rival companies. Employees planning to resign may take confidential data with them.  Loss of corporate customer information. Banks usually offer special terms to major corporate clients. Data Leaks

 Leakage of information on bank transactions, i.e. related parties, accounts and amounts transacted. If such data leaks are made public, a bank will most surely lose a lot of its clients and become a weaker competitor on the market. That is why controlling bank staff is a critical issue. Data Leaks

 Internal messages, i.e. discussing team problems, mistakes, etc. may be of great use to rivals and other untrustworthy parties. ICQ and other instant messengers are usually used in a bank for such work-related conversations. Sensitive data may be exposed to employees who are not authorized to work with such information. Data Leaks

 Leaks to the media. Data Leaks

 Marketing programs and innovations being developed may also leak outside the bank.  Exposure of investment plans to untrustworthy parties may ruin important commercial projects. Data Leaks

 Banking security information exposed to third parties gives broad options to criminals. Data Leaks

 Leakage of information on cash shifts (including cash loans) may lead to common robbery of clients or bill collectors. Data Leaks

SearchInform software solution is an ideal option for corporate clients enabling interception, analysis and control of internal data flows. Its major advantage over companies offering similar solutions is a proprietary similar-content search feature. You can use text fragments or entire documents as queries. The search will return either identical documents or documents similar in content or meaning. SearchInform Solution

Information Security Perimeter SearchInform Information Security Perimeter allows tracking data leaks through е-mail, ICQ, Skype, removable media (USB/CD), and printed documents. It can also find sensitive data-at-rest where they do not belong.

SearchInform Information Security Perimeter incorporates several pieces of software providing unbiased and duly documented information on bank data flows within a limited time period. Information Security Perimeter

SearchInform Server allows indexing data stored on every LAN PC. Administrator can choose any computer or disk for indexing. Workstations Indexing

MailSniffer intercepts traffic on a protocol level, indexes intercepted messages and provides search in them. The following protocols are supported: SMTP, POP3, IMAP, MAPI, and HTML. It allows tracking data leaks and backing up all corporate . Even if a message was advertently or inadvertently deleted, its content remains available for full-text search. Monitoring Traffic

MailSniffer intercepts HTTP traffic. It monitors messages sent through the following web-services: google.com, yahoo.com, etc. All intercepted data are stored in a database and available for search and analysis. Monitoring Traffic

HTTPSniffer intercepts HTTP traffic, i.e. messages of web-blogs and social networks. Monitoring HTTP Traffic

Monitoring Instant Messaging Traffic IMSniffer intercepts messages of popular IM clients and saves them to a database you can search in afterwards using specific search modes (morphology, similar-content search, etc.). Limiting your search criteria is also possible (e.g. querying messages of two particular employees during a specific time interval).

SkypeSniffer is used to control Skype traffic, i.e. voice and text messages, as well as attached files. All intercepted data are saved to a database and are available for full-text search (with morphology and synonym analysis, similar- content search, etc.). Limiting your search criteria is also possible (e.g. querying messages of two particular employees during a specific time interval). Intercepting Skype Traffic

Monitoring Removable Media Data DeviceSniffer is a software solution designed to intercept data recorded to USB, CD or DVD. All intercepted data are available for full-text search and unique similar-content search. This technology prevents data leaks through removable media.

Monitoring Printed-out Documents PrintSniffer monitors local and network printers and discovers sensitive information in printed documents. It monitors printed-out documents, indexes them and sends them to a database. Intercepting printed documents data allows not only to discover possible data leaks, but also find out if the printers are used as intended.

Each component of company’s information security perimeter is in compliance with a single access rights differentiation system. It allows flexible configuration, and you can tune the rights to access intercepted documents any way you want it. Access Rights Differentiation System

DataCenter DataCenter controls all the indexes created by Information Security Perimeter components. DataCenter enables you to split indexes so as to speed up access to data; schedule index splits on various parameters like size, document count, and time; monitor operation of every Information Security Perimeter component and alert you on every found malfunction by .

AlertCenter AlertCenter is a software solution uniting all Information Security Perimeter components into a single unit. It queries all data intercepted by Information Security Perimeter against a user-managed query list, and immediately notifies information security officers, should any violations of information security be discovered. This software application incorporates server console and AlertCenter client, which allows differentiating access rights to notifications and settings between information security officers.

AlertCenter AlertCenter is an independent application that can be connected to any index created by SearchInform products and can with a preset time interval scan a search index for user specified keywords.

AlertCenter AlertCenter client and other SearchInform applications allow security officers viewing incident-related documents and investigating the details of each incident. White user lists make it possible to exclude certain incidents from monitoring as they do not involve data leaks. Event and result logs show how efficient the fight against data leaks is.

Summary Summary SearchInform solutions are successfully used in banks and financial organizations, state owned and large production, telecommunication and IT companies of Russia and neighboring countries.

Thank you for being with us!