SlideShare a Scribd company logo
1 of 10
How inDefend helps in
WFH scenario?
www.dataresolve.com 2
COVID – Its impacts across organizations
“Recent Indian CIO Survey reveals 41% of CIOs feels
this Pandemic will slow down buying sentiments
and recovery process will start after 6 months..” As
per CIO Survey..
Organizations globally never tested its BCP at
this scale
Not ready to transition and run businesses from
home
Traditional systems not ported on cloud to
support remote worker
Adequate controls for information leak
protection not well embedded
Employee attendance and how to measure
productivity is challenged by management and
board under Work from home
Big issue how to sustain culture, manage
Pandemic stress
Manage customer expectations with limited
capacities
Best Practices that organizations going to adopt to manage this and unknown
adversaries & Pandemics:
• RPA in terms of process automation will take a front-seat in business processes
• CRMs, BOTs, AI Engagement tools, Messengers, Video Conferencing will bridge the
gap of face to face interactions
• Augmented reality coupled with Natural Language Processing along-with contextual
content will change the client engagement experience
• Adoption of cloud
• Data Privacy is key as users accessing confidential data from home
• Using 2FA, SSLs, Data backup, DLP, Employee Monitoring is part of mainstream
buying these days
www.dataresolve.com 3
What Best Practices Organisations are following to address below challenges?
www.dataresolve.com 4
With PM Modi announcing a nationwide complete lockdown for 21 days to stop the spread of
the COVID-19 pandemic, Part 2 of CIO India’s survey on ‘Business Continuity amid Coronavirus’,
conducted 23-25 March, shows that 96% of organizations have rolled out working from home, a
significant rise from 19% just two weeks before.
With this work from home state, we started getting clients with following broad concerns:
What Best Practices Organisations are following to address below challenges?
www.dataresolve.com 5
Our Offerings – inAdvanced – Insider Threat Platform with Unified Controls
Insider Threat Response System
Data Leakage Prevention
Intellectual Property Theft
Employee Behavior Monitoring
Application Monitoring/Whitelisting
Workplace Productivity
ONE Platform
Single Platform for Information Leakage Protection
and Proactive User Behavioral Profiling
Multi Form Factor
Covers numerous types of endpoint form factors
40% Lesser TCO
40% lesser cost of operation than competitors
Adaptive Deployment
Cloud or On-Premise or Hybrid Deployment
Architecture Ready
High Pluggability
API and Connector Ready Platform
High Flexibility
Highly customizable features and reporting
State-Of-The-Art Tech
Based on state-of-the-art latest technologies like
Influx DB, Node.js, Java, Angular, Golang, etc.
Scalable Microservices
Microservices based highly scalable and
distributed framework
www.dataresolve.com 6
Key Sales Drivers
www.dataresolve.com 7
How Easy is to On-board – Work from home?
Kickoff
Control Center Setup Phase
a. Server Setup on Cloud
b. Remote License Activation
c. Creation of Admin Accounts
d. Push of agents via single click
Automated Installation Phase
a. Silent Push to all endpoint agents
b. Maps to cloud server (we support all leading Cloud
instances)
Policy Formulation Phase
a. Best Practice >> 30 days learning mode
b. Ship product with based Work from home policies – Day – 1
Client Handover and Project
Signoff
a. Policy fine-tuning
b. Auto report generation is switched on
c. Customer training executed
d. Signed off and moved to general support
Quick Sign-Off
www.dataresolve.com 8
Key Use Cases for productivity management during WFH
Risk Analysis Policy System
Monitor all Email activity for employee
working from home
User behavior monitoring for remote
employees
Control data transfer through USB devices Monitor productivity of remote employees
Block and monitor usage of unauthorized
application on endpoint
Employee forensics using screenshot
monitoring
Monitor file upload activities to
unauthorized URLs
Monitor sharing of sensitive information
through various channels
Live Alerts of incidents
Restrict print screen to sensitive information
on endpoint
Block print activity to prevent leakage of
confidential information in physical form
Real-time Surveillance for employees
working from home
Monitor email activity done from
personal/BYOD device (using SEG)
Customer Reviews
VISIT OUR WEBSITE
www.dataresolve.com
OUR WORLDWIDE PRESENCE
India (Noida, Mumbai, Bangalore, Pune, Hyderabad)
UAE (Dubai)
DATA RESOLVE TECHNOLOGIES HEAD OFFICE
ABL Workspace, 3rd floor, B-6, Sector-4, Noida,
Uttar Pradesh 201301, INDIA
Phone : +91-9266603983
ABOUT DATA RESOLVE TECHNOLOGIES
Data Resolve Technologies is an IIT Kharagpur incubated company, focused
towards building futuristic products for Insider Threat Management and
Employee Monitoring for mid-sized and large enterprises. We enable CIOs/ CISOs
and business managers to monitor and predict employee behaviour and report
any anomalous intentions detected, helping them build a secure ecosystem and
increasing employee productivity.

More Related Content

What's hot

Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsVMware
 
AccessPaaS by SafePaaS
AccessPaaS by SafePaaSAccessPaaS by SafePaaS
AccessPaaS by SafePaaSJane Jones
 
AccessPaaS (SafePaaS)
AccessPaaS (SafePaaS)AccessPaaS (SafePaaS)
AccessPaaS (SafePaaS)Emma Kelly
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODSierraware
 
Primend praktiline konverents - Pilveteenuste ja BYOD haldus
Primend praktiline konverents - Pilveteenuste ja BYOD haldusPrimend praktiline konverents - Pilveteenuste ja BYOD haldus
Primend praktiline konverents - Pilveteenuste ja BYOD haldusPrimend
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesCisco Canada
 
The impact of consumerization
The impact of consumerizationThe impact of consumerization
The impact of consumerizationMichel de Goede
 
A Primer on iOS Management and What's Changing
A Primer on iOS Management and What's ChangingA Primer on iOS Management and What's Changing
A Primer on iOS Management and What's ChangingIvanti
 
The 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementThe 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementJumpCloud
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application SecuritySecureAuth
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyLogicalis Australia
 
Ekran System - Employee Activity Monitoring Tool
Ekran System - Employee Activity Monitoring ToolEkran System - Employee Activity Monitoring Tool
Ekran System - Employee Activity Monitoring Toolcloudlabs
 
The Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementThe Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementOneLogin
 
Webinar - How to choose the Right Compliance Management Software for your Org...
Webinar - How to choose the Right Compliance Management Software for your Org...Webinar - How to choose the Right Compliance Management Software for your Org...
Webinar - How to choose the Right Compliance Management Software for your Org...TeamLease Regtech Pvt Ltd
 
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Kim Jensen
 
Secure Mobility from GGR Communications
Secure Mobility from GGR CommunicationsSecure Mobility from GGR Communications
Secure Mobility from GGR CommunicationsGGR Communications
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices Troy C. Fulton
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesHarsh Kishore Mishra
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Chris Pepin
 

What's hot (20)

Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
 
Tachyon_Flyer
Tachyon_FlyerTachyon_Flyer
Tachyon_Flyer
 
AccessPaaS by SafePaaS
AccessPaaS by SafePaaSAccessPaaS by SafePaaS
AccessPaaS by SafePaaS
 
AccessPaaS (SafePaaS)
AccessPaaS (SafePaaS)AccessPaaS (SafePaaS)
AccessPaaS (SafePaaS)
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
 
Primend praktiline konverents - Pilveteenuste ja BYOD haldus
Primend praktiline konverents - Pilveteenuste ja BYOD haldusPrimend praktiline konverents - Pilveteenuste ja BYOD haldus
Primend praktiline konverents - Pilveteenuste ja BYOD haldus
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
The impact of consumerization
The impact of consumerizationThe impact of consumerization
The impact of consumerization
 
A Primer on iOS Management and What's Changing
A Primer on iOS Management and What's ChangingA Primer on iOS Management and What's Changing
A Primer on iOS Management and What's Changing
 
The 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementThe 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity Management
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility Strategy
 
Ekran System - Employee Activity Monitoring Tool
Ekran System - Employee Activity Monitoring ToolEkran System - Employee Activity Monitoring Tool
Ekran System - Employee Activity Monitoring Tool
 
The Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementThe Future of Enterprise Identity Management
The Future of Enterprise Identity Management
 
Webinar - How to choose the Right Compliance Management Software for your Org...
Webinar - How to choose the Right Compliance Management Software for your Org...Webinar - How to choose the Right Compliance Management Software for your Org...
Webinar - How to choose the Right Compliance Management Software for your Org...
 
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014
 
Secure Mobility from GGR Communications
Secure Mobility from GGR CommunicationsSecure Mobility from GGR Communications
Secure Mobility from GGR Communications
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013
 

Similar to DLP solution - InDefend in WFH Situations

The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organizationChris Pepin
 
Transforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsTransforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsBlueboxer2014
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaJim Kaplan CIA CFE
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Steve Markey
 
Building a Smarter Workplace
Building a Smarter WorkplaceBuilding a Smarter Workplace
Building a Smarter WorkplaceChris Pepin
 
Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...
Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...
Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...Cognizant
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityRobert Kleinschmidt
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013Arrow ECS UK
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersJeremy Siewert
 
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) AnswerContent Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) AnswerZia Consulting
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNorth Texas Chapter of the ISSA
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Securityarms8586
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application PlatformNugroho Gito
 
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Technologies
 
Enterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-PremEnterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-PremDipesh Mukerji
 
Build a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYODBuild a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYODGraham Chalk
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsHerve Danzelaud
 

Similar to DLP solution - InDefend in WFH Situations (20)

The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organization
 
Transforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsTransforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending Apps
 
BEST CYBER SECURITY PRACTICES
BEST CYBER SECURITY PRACTICESBEST CYBER SECURITY PRACTICES
BEST CYBER SECURITY PRACTICES
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5
 
Building a Smarter Workplace
Building a Smarter WorkplaceBuilding a Smarter Workplace
Building a Smarter Workplace
 
Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...
Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...
Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem Partners
 
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) AnswerContent Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application Platform
 
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise Mobility
 
Enterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-PremEnterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-Prem
 
Build a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYODBuild a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYOD
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
 

More from Prime Infoserv

Face Recognition under COVID19 crisis
Face Recognition under COVID19 crisisFace Recognition under COVID19 crisis
Face Recognition under COVID19 crisisPrime Infoserv
 
Face Chk - Face Recognition
Face Chk - Face RecognitionFace Chk - Face Recognition
Face Chk - Face RecognitionPrime Infoserv
 
Data Protection and E-contracting
Data Protection and E-contractingData Protection and E-contracting
Data Protection and E-contractingPrime Infoserv
 
Remote Workforces Secure by Barracuda
Remote Workforces Secure by BarracudaRemote Workforces Secure by Barracuda
Remote Workforces Secure by BarracudaPrime Infoserv
 
Trend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 marTrend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 marPrime Infoserv
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroPrime Infoserv
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilientPrime Infoserv
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XPrime Infoserv
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyePrime Infoserv
 
Corporate Presentation - Netmagic
Corporate Presentation - NetmagicCorporate Presentation - Netmagic
Corporate Presentation - NetmagicPrime Infoserv
 
Teamwork with Microsoft Teams
Teamwork  with Microsoft TeamsTeamwork  with Microsoft Teams
Teamwork with Microsoft TeamsPrime Infoserv
 
Windows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefitsWindows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefitsPrime Infoserv
 
Email Security – Everyone is a Target
Email Security – Everyone is a TargetEmail Security – Everyone is a Target
Email Security – Everyone is a TargetPrime Infoserv
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoPrime Infoserv
 
BCM Webinar presentation
BCM Webinar presentationBCM Webinar presentation
BCM Webinar presentationPrime Infoserv
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPrime Infoserv
 
Phishing Simulation By Shield Alliance
Phishing Simulation By Shield AlliancePhishing Simulation By Shield Alliance
Phishing Simulation By Shield AlliancePrime Infoserv
 

More from Prime Infoserv (20)

Face Recognition under COVID19 crisis
Face Recognition under COVID19 crisisFace Recognition under COVID19 crisis
Face Recognition under COVID19 crisis
 
Face Chk - Face Recognition
Face Chk - Face RecognitionFace Chk - Face Recognition
Face Chk - Face Recognition
 
Data Protection and E-contracting
Data Protection and E-contractingData Protection and E-contracting
Data Protection and E-contracting
 
Remote Workforces Secure by Barracuda
Remote Workforces Secure by BarracudaRemote Workforces Secure by Barracuda
Remote Workforces Secure by Barracuda
 
Trend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 marTrend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 mar
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
 
Corporate Presentation - Netmagic
Corporate Presentation - NetmagicCorporate Presentation - Netmagic
Corporate Presentation - Netmagic
 
Teamwork with Microsoft Teams
Teamwork  with Microsoft TeamsTeamwork  with Microsoft Teams
Teamwork with Microsoft Teams
 
Microsoft Teams-flyer
Microsoft Teams-flyerMicrosoft Teams-flyer
Microsoft Teams-flyer
 
Windows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefitsWindows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefits
 
Email Security – Everyone is a Target
Email Security – Everyone is a TargetEmail Security – Everyone is a Target
Email Security – Everyone is a Target
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
 
BCM Webinar presentation
BCM Webinar presentationBCM Webinar presentation
BCM Webinar presentation
 
FireEye Portfolio
FireEye PortfolioFireEye Portfolio
FireEye Portfolio
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
Phishing Simulation By Shield Alliance
Phishing Simulation By Shield AlliancePhishing Simulation By Shield Alliance
Phishing Simulation By Shield Alliance
 
FireEye Solutions
FireEye SolutionsFireEye Solutions
FireEye Solutions
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

DLP solution - InDefend in WFH Situations

  • 1. How inDefend helps in WFH scenario?
  • 2. www.dataresolve.com 2 COVID – Its impacts across organizations “Recent Indian CIO Survey reveals 41% of CIOs feels this Pandemic will slow down buying sentiments and recovery process will start after 6 months..” As per CIO Survey.. Organizations globally never tested its BCP at this scale Not ready to transition and run businesses from home Traditional systems not ported on cloud to support remote worker Adequate controls for information leak protection not well embedded Employee attendance and how to measure productivity is challenged by management and board under Work from home Big issue how to sustain culture, manage Pandemic stress Manage customer expectations with limited capacities
  • 3. Best Practices that organizations going to adopt to manage this and unknown adversaries & Pandemics: • RPA in terms of process automation will take a front-seat in business processes • CRMs, BOTs, AI Engagement tools, Messengers, Video Conferencing will bridge the gap of face to face interactions • Augmented reality coupled with Natural Language Processing along-with contextual content will change the client engagement experience • Adoption of cloud • Data Privacy is key as users accessing confidential data from home • Using 2FA, SSLs, Data backup, DLP, Employee Monitoring is part of mainstream buying these days www.dataresolve.com 3 What Best Practices Organisations are following to address below challenges?
  • 4. www.dataresolve.com 4 With PM Modi announcing a nationwide complete lockdown for 21 days to stop the spread of the COVID-19 pandemic, Part 2 of CIO India’s survey on ‘Business Continuity amid Coronavirus’, conducted 23-25 March, shows that 96% of organizations have rolled out working from home, a significant rise from 19% just two weeks before. With this work from home state, we started getting clients with following broad concerns: What Best Practices Organisations are following to address below challenges?
  • 5. www.dataresolve.com 5 Our Offerings – inAdvanced – Insider Threat Platform with Unified Controls Insider Threat Response System Data Leakage Prevention Intellectual Property Theft Employee Behavior Monitoring Application Monitoring/Whitelisting Workplace Productivity
  • 6. ONE Platform Single Platform for Information Leakage Protection and Proactive User Behavioral Profiling Multi Form Factor Covers numerous types of endpoint form factors 40% Lesser TCO 40% lesser cost of operation than competitors Adaptive Deployment Cloud or On-Premise or Hybrid Deployment Architecture Ready High Pluggability API and Connector Ready Platform High Flexibility Highly customizable features and reporting State-Of-The-Art Tech Based on state-of-the-art latest technologies like Influx DB, Node.js, Java, Angular, Golang, etc. Scalable Microservices Microservices based highly scalable and distributed framework www.dataresolve.com 6 Key Sales Drivers
  • 7. www.dataresolve.com 7 How Easy is to On-board – Work from home? Kickoff Control Center Setup Phase a. Server Setup on Cloud b. Remote License Activation c. Creation of Admin Accounts d. Push of agents via single click Automated Installation Phase a. Silent Push to all endpoint agents b. Maps to cloud server (we support all leading Cloud instances) Policy Formulation Phase a. Best Practice >> 30 days learning mode b. Ship product with based Work from home policies – Day – 1 Client Handover and Project Signoff a. Policy fine-tuning b. Auto report generation is switched on c. Customer training executed d. Signed off and moved to general support Quick Sign-Off
  • 8. www.dataresolve.com 8 Key Use Cases for productivity management during WFH Risk Analysis Policy System Monitor all Email activity for employee working from home User behavior monitoring for remote employees Control data transfer through USB devices Monitor productivity of remote employees Block and monitor usage of unauthorized application on endpoint Employee forensics using screenshot monitoring Monitor file upload activities to unauthorized URLs Monitor sharing of sensitive information through various channels Live Alerts of incidents Restrict print screen to sensitive information on endpoint Block print activity to prevent leakage of confidential information in physical form Real-time Surveillance for employees working from home Monitor email activity done from personal/BYOD device (using SEG)
  • 10. VISIT OUR WEBSITE www.dataresolve.com OUR WORLDWIDE PRESENCE India (Noida, Mumbai, Bangalore, Pune, Hyderabad) UAE (Dubai) DATA RESOLVE TECHNOLOGIES HEAD OFFICE ABL Workspace, 3rd floor, B-6, Sector-4, Noida, Uttar Pradesh 201301, INDIA Phone : +91-9266603983 ABOUT DATA RESOLVE TECHNOLOGIES Data Resolve Technologies is an IIT Kharagpur incubated company, focused towards building futuristic products for Insider Threat Management and Employee Monitoring for mid-sized and large enterprises. We enable CIOs/ CISOs and business managers to monitor and predict employee behaviour and report any anomalous intentions detected, helping them build a secure ecosystem and increasing employee productivity.