SlideShare a Scribd company logo
1 of 23
SPHERESHIELD FOR
ZOOM
Compliance & Security
OVERVIEW OF AGAT
SOFTWARE
Skype Teams Webex Slack Zoom RingCentral
PLATFORMS
SPHERESHIELD MAIN CAPABILITES
DATA LOSS PREVENTION
Inspect all content passing
through Zoom Meetings
RECORDING AI
COMPLIANCE ANALYSIS
Audio & video analysis for DLP and
eDiscovery Needs
ARCHIVE & EDISCOVERY
Compliance Archive. Search and
Export Information Easily and
Fast.
ADFS
CONDITIONAL ACCESS
Grant access to only security
policy compliant devices
SPHERESHIELD MAIN CAPABILITES
( c o n t . )
Threat Protection
Anti Virus / Malware / Phishing
Scan of all content before it
reaches end user devices.
ETHICAL WALL*
Control External and Internal
Communications and
Permissions
RISK ENGINE*
Geofencing and User and Entry
Behavior Analytics (UEBA)
*Coming Soon
RECORDING AI
COMPLIANCE
ANALYSIS
RECORDING AND ANALYSIS
eDiscovery
Search
DLP Ethical Wall
Archiving
Validation
Meeting Recording
Audio Video
Files Messages
Zoom
AUDIO
TRANSCRIPT|OCR
• Transcript of all meetings audio
• Converts speech to text in 70+ languages with
automatic language detection
• Speaker enumeration: which speaker spoke which
words and when.
• OCR : Creates a “video transcript” with all recognizable
text on screen for eDiscovery and DLP purposes
MEETING
eDISCOVERY
• Advanced search by text, user, dates and more
• Integrate with existing eDiscovery systems
• Search for personal information and export user data
• See message context of DLP incidents
• Archive data on cloud or on site
• Meet GDPR and compliance requirements
• Make meeting searchable by multiple parameters:
Users, Keywords, Topics, Dates and more.
• Search Messages, Audio and Video (files coming soon)
• Get List of participants
ADVANCED AI AND NLP
ANALYTICS
• Named entities (products, countries, etc.)
• Emotion detection: Extract from what's being said and
voice tonality emotions such as joy, sadness, anger, or
fear.
• Sentiments detection – positive / negative
• Automatic video scenes generation
• Labels and Keywords
DLP
INSPECTION
MAIN FEATURES
• Inspect messages, audio and video from meetings (Files coming soon)
• Create Granular policies based on External Traffic/ Users/Groups.
• Notifications to end-user and admin
• Incidents are displayed in SphereShield Admin Portal along with content
and users info. As well as links to eDiscovery
DLP Integration
• Integrates with the major DLP vendors: McAfee, Forcepoint, Symantec,
Fidelis, Google and Digital Guardian
• Send content to existing DLP vendors to meet existing policies. Incidents
will be displayed at the vendor’s incident manager
Coming Soon
• Real-Time Audio DLP – Detect policy violations in real time (only English)
• DLP for chats/channels (in near-real-time)
ACCESS AND SECURITY
• Threat protection – Anti Virus/Malware/Phishing :
Analyze messages and files* on Zoom meetings
conversations. Get notifications and alerts.
• Conditional Access – ensure that users can only log on
from a managed device – e.g Blackberry, MaaS 360,
Airwatch, Citrix
*Coming Soon
ROAD MAP
ETHICAL
WALL*
*Coming Soon
Control who can communicate with
whom
Internal communication between
different groups/users/domains
Federation with external, users/
Guests
Control specific collaboration
options
Control communication
types between users
Including:
IM’s,
file-sharing, Audio/Video/Screen-sharing
ETHICAL
WALL
SAMPLE POLICIES: INTERNAL AND EXTERNAL
MY COMPANY
MY
COMPANY
Group A
Group B Group C
IM
Audio/Video
Files
Allow Policy
…..
Limit Policy
IM
Audio/Video
Files
…..
IM
Audio/Video
Files
Block Policy
…..
Group A
Other Group
Allow Policy
IM
Audio/Video
Files
…..
IM
Audio/Video
Files
Limit Policy
…..
IM
Audio/Video
Files
Block Policy
…..
IM
Audio/Video
Files
Block Policy
…..
Federated
Company A
Federated
Company B
External Policy Using
Ethical Wall
Internal Policy
Using Ethical Wall
FEATURES
• Control communications in Zoom Meetings
• After meeting alerts – To end users and admins via
IM’s/email/logs
• Real-Time Notifications during meeting*
• Auditing and reports for training and awareness
• Works like a firewall – scans policies from top to bottom
*On Road Map
RISK ENGINE
Meet security requirements
GEO FENCING
• Set Geo Fencing rules based on groups, domains or users.
• Allow, block or monitor access from specific countries.
• Get IP of all active users
• Shows map of all active users and detect when sign in is
done from a location / IP that is blocked by geo fencing
policy. Sends message when incident is detected
OPERATION
MODES &
TOPOLOGY
CLOUD TOPOLOGY
SERVICE OFFERING
SaaS - online service
Customers don’t need to install anything.
Each customer will have dedicated servers
A customer installation solution
Customers install SphereShield in their DMZ or
Cloud (e.g. Azure, AWS)
A Free Trial is available
MORE INFO
Visit our website
Contact us
+972-525209860
https://AGATSoftware.com
sales@agatsoftware.com

More Related Content

Similar to Secure Zoom Meetings with SphereShield Compliance

Sphereshield for webex
Sphereshield for webexSphereshield for webex
Sphereshield for webexAGAT2
 
Sphere shield for webex presentation 3.1
Sphere shield for webex presentation 3.1Sphere shield for webex presentation 3.1
Sphere shield for webex presentation 3.1AGAT2
 
SphereShield for Webex Meeting
SphereShield for Webex MeetingSphereShield for Webex Meeting
SphereShield for Webex MeetingAGAT2
 
Sphere shield for webex
Sphere shield for webexSphere shield for webex
Sphere shield for webexAGAT2
 
SphereShield For Skype - Presentation
SphereShield For Skype - PresentationSphereShield For Skype - Presentation
SphereShield For Skype - PresentationAGATSoftware
 
SphereShield for Skype for Business - Compliance and Security
SphereShield for Skype for Business - Compliance and SecuritySphereShield for Skype for Business - Compliance and Security
SphereShield for Skype for Business - Compliance and SecurityYoav Crombie
 
BlackDuck Suite
BlackDuck SuiteBlackDuck Suite
BlackDuck Suitejeff cheng
 
Software Security in the Real World w/Kelsey Hightower
Software Security in the Real World w/Kelsey HightowerSoftware Security in the Real World w/Kelsey Hightower
Software Security in the Real World w/Kelsey HightowerAnchore
 
Kyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epoKyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epoKyle Taylor
 
Homeland Product Booklet
Homeland Product BookletHomeland Product Booklet
Homeland Product BookletKenny Elliott
 
Employing automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptxEmploying automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptxJeffrey Lam
 
Offre revendeurs UC
Offre  revendeurs   UCOffre  revendeurs   UC
Offre revendeurs UCRachid ZINE
 
Microsoft Lync Online Overview - from Atidan - 200 level Presentation
Microsoft Lync Online Overview - from Atidan - 200 level PresentationMicrosoft Lync Online Overview - from Atidan - 200 level Presentation
Microsoft Lync Online Overview - from Atidan - 200 level PresentationDavid J Rosenthal
 
Emma Aubert | Information Protection
Emma Aubert | Information ProtectionEmma Aubert | Information Protection
Emma Aubert | Information ProtectionMicrosoft Österreich
 
Implementing Security on a Large Multi-Tenant Cluster the Right Way
Implementing Security on a Large Multi-Tenant Cluster the Right WayImplementing Security on a Large Multi-Tenant Cluster the Right Way
Implementing Security on a Large Multi-Tenant Cluster the Right WayDataWorks Summit
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...MongoDB
 
Sanctuary Device Control
Sanctuary Device ControlSanctuary Device Control
Sanctuary Device ControlHassaanSahloul
 

Similar to Secure Zoom Meetings with SphereShield Compliance (20)

Sphereshield for webex
Sphereshield for webexSphereshield for webex
Sphereshield for webex
 
Sphere shield for webex presentation 3.1
Sphere shield for webex presentation 3.1Sphere shield for webex presentation 3.1
Sphere shield for webex presentation 3.1
 
SphereShield for Webex Meeting
SphereShield for Webex MeetingSphereShield for Webex Meeting
SphereShield for Webex Meeting
 
Sphere shield for webex
Sphere shield for webexSphere shield for webex
Sphere shield for webex
 
SphereShield For Skype - Presentation
SphereShield For Skype - PresentationSphereShield For Skype - Presentation
SphereShield For Skype - Presentation
 
SphereShield for Skype for Business - Compliance and Security
SphereShield for Skype for Business - Compliance and SecuritySphereShield for Skype for Business - Compliance and Security
SphereShield for Skype for Business - Compliance and Security
 
BlackDuck Suite
BlackDuck SuiteBlackDuck Suite
BlackDuck Suite
 
Software Security in the Real World w/Kelsey Hightower
Software Security in the Real World w/Kelsey HightowerSoftware Security in the Real World w/Kelsey Hightower
Software Security in the Real World w/Kelsey Hightower
 
Core Values Decision Sept
Core Values Decision SeptCore Values Decision Sept
Core Values Decision Sept
 
DLP and MDM Datasheet
DLP and MDM DatasheetDLP and MDM Datasheet
DLP and MDM Datasheet
 
IT security solutions
IT security solutionsIT security solutions
IT security solutions
 
Kyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epoKyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epo
 
Homeland Product Booklet
Homeland Product BookletHomeland Product Booklet
Homeland Product Booklet
 
Employing automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptxEmploying automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptx
 
Offre revendeurs UC
Offre  revendeurs   UCOffre  revendeurs   UC
Offre revendeurs UC
 
Microsoft Lync Online Overview - from Atidan - 200 level Presentation
Microsoft Lync Online Overview - from Atidan - 200 level PresentationMicrosoft Lync Online Overview - from Atidan - 200 level Presentation
Microsoft Lync Online Overview - from Atidan - 200 level Presentation
 
Emma Aubert | Information Protection
Emma Aubert | Information ProtectionEmma Aubert | Information Protection
Emma Aubert | Information Protection
 
Implementing Security on a Large Multi-Tenant Cluster the Right Way
Implementing Security on a Large Multi-Tenant Cluster the Right WayImplementing Security on a Large Multi-Tenant Cluster the Right Way
Implementing Security on a Large Multi-Tenant Cluster the Right Way
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
 
Sanctuary Device Control
Sanctuary Device ControlSanctuary Device Control
Sanctuary Device Control
 

Recently uploaded

Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 

Recently uploaded (20)

Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 

Secure Zoom Meetings with SphereShield Compliance

  • 2. OVERVIEW OF AGAT SOFTWARE Skype Teams Webex Slack Zoom RingCentral PLATFORMS
  • 3. SPHERESHIELD MAIN CAPABILITES DATA LOSS PREVENTION Inspect all content passing through Zoom Meetings RECORDING AI COMPLIANCE ANALYSIS Audio & video analysis for DLP and eDiscovery Needs ARCHIVE & EDISCOVERY Compliance Archive. Search and Export Information Easily and Fast. ADFS CONDITIONAL ACCESS Grant access to only security policy compliant devices
  • 4. SPHERESHIELD MAIN CAPABILITES ( c o n t . ) Threat Protection Anti Virus / Malware / Phishing Scan of all content before it reaches end user devices. ETHICAL WALL* Control External and Internal Communications and Permissions RISK ENGINE* Geofencing and User and Entry Behavior Analytics (UEBA) *Coming Soon
  • 6. RECORDING AND ANALYSIS eDiscovery Search DLP Ethical Wall Archiving Validation Meeting Recording Audio Video Files Messages Zoom
  • 7. AUDIO TRANSCRIPT|OCR • Transcript of all meetings audio • Converts speech to text in 70+ languages with automatic language detection • Speaker enumeration: which speaker spoke which words and when. • OCR : Creates a “video transcript” with all recognizable text on screen for eDiscovery and DLP purposes
  • 8. MEETING eDISCOVERY • Advanced search by text, user, dates and more • Integrate with existing eDiscovery systems • Search for personal information and export user data • See message context of DLP incidents • Archive data on cloud or on site • Meet GDPR and compliance requirements • Make meeting searchable by multiple parameters: Users, Keywords, Topics, Dates and more. • Search Messages, Audio and Video (files coming soon) • Get List of participants
  • 9. ADVANCED AI AND NLP ANALYTICS • Named entities (products, countries, etc.) • Emotion detection: Extract from what's being said and voice tonality emotions such as joy, sadness, anger, or fear. • Sentiments detection – positive / negative • Automatic video scenes generation • Labels and Keywords
  • 11. MAIN FEATURES • Inspect messages, audio and video from meetings (Files coming soon) • Create Granular policies based on External Traffic/ Users/Groups. • Notifications to end-user and admin • Incidents are displayed in SphereShield Admin Portal along with content and users info. As well as links to eDiscovery DLP Integration • Integrates with the major DLP vendors: McAfee, Forcepoint, Symantec, Fidelis, Google and Digital Guardian • Send content to existing DLP vendors to meet existing policies. Incidents will be displayed at the vendor’s incident manager Coming Soon • Real-Time Audio DLP – Detect policy violations in real time (only English) • DLP for chats/channels (in near-real-time)
  • 12. ACCESS AND SECURITY • Threat protection – Anti Virus/Malware/Phishing : Analyze messages and files* on Zoom meetings conversations. Get notifications and alerts. • Conditional Access – ensure that users can only log on from a managed device – e.g Blackberry, MaaS 360, Airwatch, Citrix *Coming Soon
  • 15. Control who can communicate with whom Internal communication between different groups/users/domains Federation with external, users/ Guests Control specific collaboration options Control communication types between users Including: IM’s, file-sharing, Audio/Video/Screen-sharing ETHICAL WALL
  • 16. SAMPLE POLICIES: INTERNAL AND EXTERNAL MY COMPANY MY COMPANY Group A Group B Group C IM Audio/Video Files Allow Policy ….. Limit Policy IM Audio/Video Files ….. IM Audio/Video Files Block Policy ….. Group A Other Group Allow Policy IM Audio/Video Files ….. IM Audio/Video Files Limit Policy ….. IM Audio/Video Files Block Policy ….. IM Audio/Video Files Block Policy ….. Federated Company A Federated Company B External Policy Using Ethical Wall Internal Policy Using Ethical Wall
  • 17. FEATURES • Control communications in Zoom Meetings • After meeting alerts – To end users and admins via IM’s/email/logs • Real-Time Notifications during meeting* • Auditing and reports for training and awareness • Works like a firewall – scans policies from top to bottom *On Road Map
  • 19. GEO FENCING • Set Geo Fencing rules based on groups, domains or users. • Allow, block or monitor access from specific countries. • Get IP of all active users • Shows map of all active users and detect when sign in is done from a location / IP that is blocked by geo fencing policy. Sends message when incident is detected
  • 22. SERVICE OFFERING SaaS - online service Customers don’t need to install anything. Each customer will have dedicated servers A customer installation solution Customers install SphereShield in their DMZ or Cloud (e.g. Azure, AWS) A Free Trial is available
  • 23. MORE INFO Visit our website Contact us +972-525209860 https://AGATSoftware.com sales@agatsoftware.com