SlideShare a Scribd company logo
1 of 15
Download to read offline
inDefend-Business Integrated Data Privacy Offerings 
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 
www.dataresolve.com
Agenda Insider Threat Challenges Understanding Insider Threats and Trends What 3rd Party Assessment Reported Employee DNA – Data Privacy Standpoint What’s the approach moving forward? Data Resolve Offerings, Architecture & Differentiators About Data Resolve Customer Speaks 
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 
2
Insider Threats Reporting Challenges Are we able to monitor employee behavior before s/he leaks the information? Are we able to assess his / her productivity vis-a-via organization goals? Are we able to enforce strong BYOD controls? Are we getting integrated view of employee activities from multiple service points that doesn’t fall under DLP purview? Are training sessions/ simulations games prevented insider threats? Insider threat is impossible to counter because of the insider’s resources and access permissions? Do business takes responsibility of these challenges? Are we able to catch disgruntled or employee’s/contractors with mal-intent well before? 
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 
3
Let’s Look at What Research Says – Ineffectiveness (Cont.) 
Alarming facts: 
More than 50% of the service provider organisations revealed that insiders who do not work in IT department and consequently do not have privileged access have carried out insider incidents at their organisations. 
As per 89% of the service provider organisations, behavioural motivation to break existing norms is the primary motive that leads to insider threat. 
Audit and review is still the primary source of identification and learning about insider incidents with around 89% service provider organisations and 75% client organisations being alerted about insider incidents at service provider organisations through this method. 
Source: PWC-DSCI Study 
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 
4
Let’s Look at What Research Says – Ineffectiveness (Cont.) 
Source: PWC-DSCI Study 
5
As per 89% of the service provider organisations, behavioural motivation to break existing norms is the primary motive that leads to insider threat. 
Let’s Look at What Research Says – Ineffectiveness 
Source: PWC-DSCI Study 
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 
6
Employee DNA – Data Privacy Standpoint 
Employee Viewpoint: So many data privacy trainings, enablement in progress, now I have one DLP client as well. Don’t you trust me? Am not happy as am tied with so many security control, allow me to breathe. Every-time you ask me to enforce rights on documents that am sharing with externals partners, this is part of my job. 
CISO Viewpoint: As a CXO how do we ensure we monitor, protect this data lifecycle from a single pane of glass, I have so many tools to manage now Difficult to get an integrated view across messengers, chats, social sites, BYOD devices, web services, cloud services, rights management, mobile behaviour analysis and its increasing . .too much on the table. Who did what, how, what went out, why we couldn’t stop it; study says it takes hours to identify this from set of people monitoring alarms from DLP…is it effective? 
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 
7
Our Recommended Approach Build an integrated data privacy control framework that addresses all these challenge's proactively…. 
Approach should tie up all end – points and data movements be it mobile, handheld, end-points, irrespective of where data goes 
Reduce burden on end-users and departments when it comes to there involvement, define boundaries and react 
Empower business heads so they take there own decisions with right information 
Reduce monitoring foot-print from multiple controls to one 
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 
8
Data Resolve Offerings 
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 
9 inDefend Integrated Data Privacy Platform mitigates risks associated with information life-cycle: Platform mitigates risks associated with data movement within and outside organization boundaries Platform covers all end-points – tablets, mobiles, end-point computing devices Integrated security analytics layer provide view on the fly for data moving outside to trusted and untrusted users Provide forensics, investigation support with due-diligence Enforced employee monitoring and behaviour analysis Data Privacy Analytics platform on exiting vendor products. Centralized Cloud Delivery Model Stack covers: Data Leak Prevention Information Rights Management Mobile Workforce Management Employee Behaviour Monitoring Enforced Encryption Employee Forensics Asset Management & Monitoring
Offerings Architecture 
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 
10
Intelligence Factors 
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 
11 
The intelligence of the solution lies in the approach of automatic detection of all the sensitive events generated in the network, and presentation to the administration and top management in the following ways: 
Cyber Intelligence Sensors 
–Social network styled alerts Daily Email Reports * 
–Summary of alerts generated throughout the day Real-time SMS Alerts* 
–SMS Notification sent for the most sensitive activities happening in your network Cyber Intelligence Reports* 
–Advanced insights are provided into your organization’s activities and recommendations are given to improve processes Screenshot Monitoring* 
–Periodic screenshots of end-user’s desktop activities Cyber Seal* 
–Provide departments real-time data violation status
Differentiators Integrated client Stealth supported Less foot-print on machine (Less than 10% run-time memory utilization) Multiple OS support (Windows family, Ubuntu, Linux, Android, IOS) 
Cloud supported Encrypted communication (external storage devices with white-labelled approach + partial disk) Centralized policy roll-out Offline support Integrated architecture enforces real-time blocking across data life-cycle that is missing in disparate vendor approach Customized Reporting (This integrates with your organization business processes and a customized approach that no one delivers) Integrated dashboard for advanced analytics DLP Analytics (Reduced cost to manage data privacy operations) 
Enforced external drive encryption (external storage devices with white-labelled approach + partial disk) Enforced rights management (on the fly enforced options on edit, print, forward, up-load, wipe out, print-screen options) Employee Forensics Employee monitoring and productivity analysis Focus on Co-creation Advanced mobile workforce management module 
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 
End - Point 
Architecture 
Reporting 
Advanced Features 
12
About Us 
Incubated in IIT Kharagpur Focused on addressing data theft, data loss with security analytics from on-premise and cloud platform, product christened as “inDefend” targeted for Enterprise, SMB and End-Consumers TIE, Kolkata selected the company as best emerging IT Company from West Bengal 
70+ enterprise customers 50000+ retail product downloads Customers in 15+ industry segments 6 million+ work hours analyzed 1000+ alerts generated daily 
CEO & Founding Team Member 
Alma-Mater –IIM-Kolkata 
CTO & Founding Team Member Alma-Mater –IIT-Kharagpur 
Strategic Alliance Lead & Founding 
Team Member Alma-Mater 
–IIT-Kharagpur 
Client Relationship Lead & Founding Team Member Alma-Mater – 
IIT-Kharagpur 
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 
Leadership Team 
Our Awards 
13
Customer Speaks 
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 
14 
"Easier for IT to track and stop unprofessional activity of the users. Support is excellent.“ - IT Manager, Mid-sized ITeS company, Kolkata "Indefend is exceptional from any other product available in the globe, i have tested many security software but the features as mentioned in those software's does not meet when it comes to practical testing. Indefend meets all the features as mentioned and works perfectly. The technical support is prompt and very responsive.” - Senior IT Administrator, Mid-sized ITeS company, Kolkata "In-defend Enterprise has been the best experience I've ever had in solving issues of Data Security. Ive tried many other products but in-defend gave me the best solution. Also the constant upgrade of its features and it excellent customer support team gives me much confidence in Data Resolve Technologies and shows how competent they are in delivering their goals.“ - IT Operations Manager, Petroleum Engineering company, Nigeria 
Client Testimonials 
70+ enterprise customers 
13 countries covered 
Customers in 15+ industry segments 
6 million+ work hours analyzed 
1000+ alerts generated daily
Thank You!! 
Our Award Winning Product 
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 
Website www.dataresolve.com www.indefend.com Demo https://cloud.indefend.com/ Email marketing@dataresolve.com

More Related Content

What's hot

It Capabilities.2009
It Capabilities.2009It Capabilities.2009
It Capabilities.2009Diontealley
 
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
Customer Spotlight:Deploying a Data Protection Program in less than 120 DaysCustomer Spotlight:Deploying a Data Protection Program in less than 120 Days
Customer Spotlight: Deploying a Data Protection Program in less than 120 DaysDigital Guardian
 
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...DFLABS SRL
 
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and TrendsMaclear LLC
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices Troy C. Fulton
 
Automated Decision Making Comes to Age
Automated Decision Making Comes to AgeAutomated Decision Making Comes to Age
Automated Decision Making Comes to AgeComputer Aid, Inc
 
DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013DFLABS SRL
 
P r o t e c t i n g y o u r b u s i n e s s
P r o t e c t i n g y o u r b u s i n e s sP r o t e c t i n g y o u r b u s i n e s s
P r o t e c t i n g y o u r b u s i n e s smatele41
 
IT Asset Management by Miradore
IT Asset Management by MiradoreIT Asset Management by Miradore
IT Asset Management by MiradoreMiradore
 
It implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-briefIt implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-briefVisal Thach
 
IT Asset Management System for UL-Software Engineering
IT Asset Management System for UL-Software EngineeringIT Asset Management System for UL-Software Engineering
IT Asset Management System for UL-Software EngineeringShiv Koppad
 
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data CenterIDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data CenterSunbird DCIM
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10jpmccormack
 
An Adaptive Priority Approach for Effective Problem Resolution in ITSM
An Adaptive Priority Approach for Effective Problem Resolution in ITSMAn Adaptive Priority Approach for Effective Problem Resolution in ITSM
An Adaptive Priority Approach for Effective Problem Resolution in ITSMProdapt Solutions
 
IT Asset management presentation
IT Asset management presentationIT Asset management presentation
IT Asset management presentationAshita Mehra
 
MSP Sales Tactics | How to Create Effective Marketing Messages
MSP Sales Tactics | How to Create Effective Marketing MessagesMSP Sales Tactics | How to Create Effective Marketing Messages
MSP Sales Tactics | How to Create Effective Marketing MessagesDavid Castro
 
Trillium Software Building the Business Case for Data Quality
Trillium Software Building the Business Case for Data QualityTrillium Software Building the Business Case for Data Quality
Trillium Software Building the Business Case for Data QualityTrillium Software
 
20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh ShanmughanathanSharath Kumar
 

What's hot (20)

It Capabilities.2009
It Capabilities.2009It Capabilities.2009
It Capabilities.2009
 
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
Customer Spotlight:Deploying a Data Protection Program in less than 120 DaysCustomer Spotlight:Deploying a Data Protection Program in less than 120 Days
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
 
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
 
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and Trends
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
 
Automated Decision Making Comes to Age
Automated Decision Making Comes to AgeAutomated Decision Making Comes to Age
Automated Decision Making Comes to Age
 
DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013
 
P r o t e c t i n g y o u r b u s i n e s s
P r o t e c t i n g y o u r b u s i n e s sP r o t e c t i n g y o u r b u s i n e s s
P r o t e c t i n g y o u r b u s i n e s s
 
IT Asset Management by Miradore
IT Asset Management by MiradoreIT Asset Management by Miradore
IT Asset Management by Miradore
 
It implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-briefIt implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-brief
 
IT Asset Management System for UL-Software Engineering
IT Asset Management System for UL-Software EngineeringIT Asset Management System for UL-Software Engineering
IT Asset Management System for UL-Software Engineering
 
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data CenterIDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
An Adaptive Priority Approach for Effective Problem Resolution in ITSM
An Adaptive Priority Approach for Effective Problem Resolution in ITSMAn Adaptive Priority Approach for Effective Problem Resolution in ITSM
An Adaptive Priority Approach for Effective Problem Resolution in ITSM
 
IT Asset management presentation
IT Asset management presentationIT Asset management presentation
IT Asset management presentation
 
MSP Sales Tactics | How to Create Effective Marketing Messages
MSP Sales Tactics | How to Create Effective Marketing MessagesMSP Sales Tactics | How to Create Effective Marketing Messages
MSP Sales Tactics | How to Create Effective Marketing Messages
 
Trillium Software Building the Business Case for Data Quality
Trillium Software Building the Business Case for Data QualityTrillium Software Building the Business Case for Data Quality
Trillium Software Building the Business Case for Data Quality
 
20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan
 
IT ASSET MANAGEMENT
IT ASSET MANAGEMENTIT ASSET MANAGEMENT
IT ASSET MANAGEMENT
 
Og Disparate It Mgmt Tool Impact Report
Og Disparate It Mgmt Tool Impact ReportOg Disparate It Mgmt Tool Impact Report
Og Disparate It Mgmt Tool Impact Report
 

Similar to InDefend-Integrated Data Privacy Offerings

Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
Enterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftEnterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftAppsian
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowMapR Technologies
 
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...infoLock Technologies
 
Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution Priyanka Aash
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should KnowIBM Security
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsCA Technologies
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityJessica Santamaria
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityJessica Santamaria
 
Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...
Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...
Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...Stratio
 
Data protection services lifecycle approach to critical information protection
Data protection services  lifecycle approach to critical information protectionData protection services  lifecycle approach to critical information protection
Data protection services lifecycle approach to critical information protectionAujas Networks Pvt. Ltd.
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Net at Work
 
Dlp Methodology
Dlp MethodologyDlp Methodology
Dlp Methodologytbeckwith
 

Similar to InDefend-Integrated Data Privacy Offerings (20)

Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10
 
Enterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftEnterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoft
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
 
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
 
Secure Iowa Oct 2016
Secure Iowa Oct 2016Secure Iowa Oct 2016
Secure Iowa Oct 2016
 
Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Chris Reed Sigma PDF
Chris Reed Sigma PDFChris Reed Sigma PDF
Chris Reed Sigma PDF
 
Eng Solutions - Capability Statement-Latest
Eng Solutions - Capability Statement-LatestEng Solutions - Capability Statement-Latest
Eng Solutions - Capability Statement-Latest
 
InsiderAttack_p3.ppt
InsiderAttack_p3.pptInsiderAttack_p3.ppt
InsiderAttack_p3.ppt
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analytics
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
 
Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...
Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...
Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...
 
Data protection services lifecycle approach to critical information protection
Data protection services  lifecycle approach to critical information protectionData protection services  lifecycle approach to critical information protection
Data protection services lifecycle approach to critical information protection
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
Dlp Methodology
Dlp MethodologyDlp Methodology
Dlp Methodology
 

Recently uploaded

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 

Recently uploaded (20)

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 

InDefend-Integrated Data Privacy Offerings

  • 1. inDefend-Business Integrated Data Privacy Offerings Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM www.dataresolve.com
  • 2. Agenda Insider Threat Challenges Understanding Insider Threats and Trends What 3rd Party Assessment Reported Employee DNA – Data Privacy Standpoint What’s the approach moving forward? Data Resolve Offerings, Architecture & Differentiators About Data Resolve Customer Speaks Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 2
  • 3. Insider Threats Reporting Challenges Are we able to monitor employee behavior before s/he leaks the information? Are we able to assess his / her productivity vis-a-via organization goals? Are we able to enforce strong BYOD controls? Are we getting integrated view of employee activities from multiple service points that doesn’t fall under DLP purview? Are training sessions/ simulations games prevented insider threats? Insider threat is impossible to counter because of the insider’s resources and access permissions? Do business takes responsibility of these challenges? Are we able to catch disgruntled or employee’s/contractors with mal-intent well before? Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 3
  • 4. Let’s Look at What Research Says – Ineffectiveness (Cont.) Alarming facts: More than 50% of the service provider organisations revealed that insiders who do not work in IT department and consequently do not have privileged access have carried out insider incidents at their organisations. As per 89% of the service provider organisations, behavioural motivation to break existing norms is the primary motive that leads to insider threat. Audit and review is still the primary source of identification and learning about insider incidents with around 89% service provider organisations and 75% client organisations being alerted about insider incidents at service provider organisations through this method. Source: PWC-DSCI Study Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 4
  • 5. Let’s Look at What Research Says – Ineffectiveness (Cont.) Source: PWC-DSCI Study 5
  • 6. As per 89% of the service provider organisations, behavioural motivation to break existing norms is the primary motive that leads to insider threat. Let’s Look at What Research Says – Ineffectiveness Source: PWC-DSCI Study Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 6
  • 7. Employee DNA – Data Privacy Standpoint Employee Viewpoint: So many data privacy trainings, enablement in progress, now I have one DLP client as well. Don’t you trust me? Am not happy as am tied with so many security control, allow me to breathe. Every-time you ask me to enforce rights on documents that am sharing with externals partners, this is part of my job. CISO Viewpoint: As a CXO how do we ensure we monitor, protect this data lifecycle from a single pane of glass, I have so many tools to manage now Difficult to get an integrated view across messengers, chats, social sites, BYOD devices, web services, cloud services, rights management, mobile behaviour analysis and its increasing . .too much on the table. Who did what, how, what went out, why we couldn’t stop it; study says it takes hours to identify this from set of people monitoring alarms from DLP…is it effective? Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 7
  • 8. Our Recommended Approach Build an integrated data privacy control framework that addresses all these challenge's proactively…. Approach should tie up all end – points and data movements be it mobile, handheld, end-points, irrespective of where data goes Reduce burden on end-users and departments when it comes to there involvement, define boundaries and react Empower business heads so they take there own decisions with right information Reduce monitoring foot-print from multiple controls to one Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 8
  • 9. Data Resolve Offerings Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 9 inDefend Integrated Data Privacy Platform mitigates risks associated with information life-cycle: Platform mitigates risks associated with data movement within and outside organization boundaries Platform covers all end-points – tablets, mobiles, end-point computing devices Integrated security analytics layer provide view on the fly for data moving outside to trusted and untrusted users Provide forensics, investigation support with due-diligence Enforced employee monitoring and behaviour analysis Data Privacy Analytics platform on exiting vendor products. Centralized Cloud Delivery Model Stack covers: Data Leak Prevention Information Rights Management Mobile Workforce Management Employee Behaviour Monitoring Enforced Encryption Employee Forensics Asset Management & Monitoring
  • 10. Offerings Architecture Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 10
  • 11. Intelligence Factors Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 11 The intelligence of the solution lies in the approach of automatic detection of all the sensitive events generated in the network, and presentation to the administration and top management in the following ways: Cyber Intelligence Sensors –Social network styled alerts Daily Email Reports * –Summary of alerts generated throughout the day Real-time SMS Alerts* –SMS Notification sent for the most sensitive activities happening in your network Cyber Intelligence Reports* –Advanced insights are provided into your organization’s activities and recommendations are given to improve processes Screenshot Monitoring* –Periodic screenshots of end-user’s desktop activities Cyber Seal* –Provide departments real-time data violation status
  • 12. Differentiators Integrated client Stealth supported Less foot-print on machine (Less than 10% run-time memory utilization) Multiple OS support (Windows family, Ubuntu, Linux, Android, IOS) Cloud supported Encrypted communication (external storage devices with white-labelled approach + partial disk) Centralized policy roll-out Offline support Integrated architecture enforces real-time blocking across data life-cycle that is missing in disparate vendor approach Customized Reporting (This integrates with your organization business processes and a customized approach that no one delivers) Integrated dashboard for advanced analytics DLP Analytics (Reduced cost to manage data privacy operations) Enforced external drive encryption (external storage devices with white-labelled approach + partial disk) Enforced rights management (on the fly enforced options on edit, print, forward, up-load, wipe out, print-screen options) Employee Forensics Employee monitoring and productivity analysis Focus on Co-creation Advanced mobile workforce management module Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM End - Point Architecture Reporting Advanced Features 12
  • 13. About Us Incubated in IIT Kharagpur Focused on addressing data theft, data loss with security analytics from on-premise and cloud platform, product christened as “inDefend” targeted for Enterprise, SMB and End-Consumers TIE, Kolkata selected the company as best emerging IT Company from West Bengal 70+ enterprise customers 50000+ retail product downloads Customers in 15+ industry segments 6 million+ work hours analyzed 1000+ alerts generated daily CEO & Founding Team Member Alma-Mater –IIM-Kolkata CTO & Founding Team Member Alma-Mater –IIT-Kharagpur Strategic Alliance Lead & Founding Team Member Alma-Mater –IIT-Kharagpur Client Relationship Lead & Founding Team Member Alma-Mater – IIT-Kharagpur Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM Leadership Team Our Awards 13
  • 14. Customer Speaks Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 14 "Easier for IT to track and stop unprofessional activity of the users. Support is excellent.“ - IT Manager, Mid-sized ITeS company, Kolkata "Indefend is exceptional from any other product available in the globe, i have tested many security software but the features as mentioned in those software's does not meet when it comes to practical testing. Indefend meets all the features as mentioned and works perfectly. The technical support is prompt and very responsive.” - Senior IT Administrator, Mid-sized ITeS company, Kolkata "In-defend Enterprise has been the best experience I've ever had in solving issues of Data Security. Ive tried many other products but in-defend gave me the best solution. Also the constant upgrade of its features and it excellent customer support team gives me much confidence in Data Resolve Technologies and shows how competent they are in delivering their goals.“ - IT Operations Manager, Petroleum Engineering company, Nigeria Client Testimonials 70+ enterprise customers 13 countries covered Customers in 15+ industry segments 6 million+ work hours analyzed 1000+ alerts generated daily
  • 15. Thank You!! Our Award Winning Product Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM Website www.dataresolve.com www.indefend.com Demo https://cloud.indefend.com/ Email marketing@dataresolve.com