|
| Logo: Infowatch.com |
InfoWatch - innovation is a Russian company that is dedicated to developing software in the monitorreo field, analysis and data protection.
InfoWatch products help large enterprises, public institutions and SMEs to control the distribution of information outside the company, to increase efficiency and meet the requirements of regulatory bodies.
InfoWatch Traffic Monitor
integrated software solution designed for large companies interested in protecting their data from internal threats. This product lets you control the leakage of sensitive information Through different channels and data sharing protocols and includes the following modules:
- Module for network perimeter protection ( control HTTP (s), SMTP , IM, network printers)
- Stock Module centralized management and - Forensic Storage InfoWatch . Advantages
. Precise identification of confidential data of several technologies using content analysis.
. Perimeter Protection secure corporate networks.
. Support different types and file formats, including Microsoft Office and Open Office .
. preset rules based processing and filtering of content to accelerate their applications.
. Centralized archive employee monitoring work and data reports.
. Schema integration flexible IT structures .
. Certification of the Federal Technical and Export Control ( FSTEK ) of Russia .
InfoWatch CryptoStorage
|
| Image: anti-malware.ru |
Software for individuals and small businesses protect their data without use authorization by encryption. Encrypt catalogs, logical disks and removable data carriers (USB-flash, CD / DVD, memory cards, etc). Allows you to create containers of sensitive data - such as cabinet files, encrypt data on remote computers, ranging from a local network, and organize safe access to the same hierarchy. Advantages
. Encryption of any data, including the download of the operating system, applications, files, diaries, Hibermate file, Windows Crash Dump Files .
. Simplicity and ease of use: encryption "On the fly" in a transparent, uniform principles of operation with all kinds of programs, interactive feedback mechanisms for passwords.
. Encryption algorithms stable and high operational efficiency.
. License unlimited free technical support for one year.
content analysis technology
linguistic analysis
The automatic classification of the analyzed information, is made on terms and combinations available in the document. The categories can be flexibly adjust.
Fingerprints
Search quotes in the document have confidential documents previously processed.
pattern analyzer
Location, document review, data are formed according to certain patterns, for example, passport numbers, credit cards, etc. The patterns can be adjusted flexibly.
(sources: InfoWatch; Softline.ru )
0 comments:
Post a Comment