SlideShare a Scribd company logo
1 of 39
Download to read offline
Block C, Castle Walk Corporate Park,
3 Kuiseb Street, Erasmuskloof,
Pretoria
www.aetos-it.co.za
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 2 of 39
BACKGROUND
1. AETOS-IT PROFILE......................................................................................................... 3
1.1 Cloud Solutions Audit of Human Capital....................................................................
1.2 Audit of Customer Relations via CRM Pipeliner and System Code via Hawkeye &
APOD...........................................................................................................................
1.3 Aetos-it Shareholders...................................................................................................
3
4
5
AGREEMENTS
2. AETOS-IT PARTNERS..................................................................................................... 6
2.1 EY.................................................................................................................................
2.2 Dimension Data............................................................................................................
2.3 Biotic Health Corporation............................................................................................
2.4 Matsei............................................................................................................................
2.5 Apace Systems………………………………………………..………………………
2.6 InfoWatch……………………………………………..………………………………
6
6
6
6
7
7
PRODUCTS
3. AETOS-INFOWATCH APPERCUT…………………………………………..………...
3.1 X-Ray for Business Applications…………………………………………………....
3.2 11 Reasons to use AETOS-INFOWATCH Appercut…………………………….…..
4. AETOS-INFOWATCH ENDPOINT SECURITY………………………..……………...
4.1 Control of employees’ access to valuable data……………………………………...
4.2 Automatic monitoring of unauthorized employee activity…………….………...
4.3 Data control during copying and storing, on premises and in the cloud…………….
4.4 Protection against data theft from lost laptops or flash drives………………………
4.5 Application Control………………………………………………………………….
4.6 Benefits for Business………………………………………………………………..
5. AETOS-INFOWATCH TRAFFIC MONITOR ENTERPRISE….…………………..…..
5.1 AETOS-INFOWATCH Traffic Monitor Enterprise protects your company from….
5.2 AETOS-INFOWATCH Traffic Monitor Technologies and Capabilities…………...
5.3 Key Benefits of AETOS-INFOWATCH Traffic Monitor…………………………..
8
9
9
11
14
14
15
17
17
22
24
26
29
37
TABLE OF CONTENTS
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 3 of 39
1. AETOS-IT PROFILE
AETOS-IT (Pty) Ltd Company Reg no: 2014/054899/07 emerged in January 2014 from the
amalgamation of several business solutions, into one company. The flagship business solution,
Hawkeye & APOD was launched in 2009 by the current owners of AETOS-IT. AETOS-IT is a
South Africa registered company whose main focus is the Audit of Technology systems, Audit of
Human capital and IT Consulting. We are the preferred supplier of Intelligent, Innovative &
Integrated Corporate Enterprise Solutions across South Africa and the rest of Africa.
1.1 Cloud Solutions Audit of Human Capital
1.1.1 Indaba Health & Wellness: Health and Behaviour Integrated Tool (HABIT)
An interactive, on line system, for behaviour modification with evidence based
monitoring. It combines Behaviour analysis with targeted e-learning and vital
statistic monitoring. It's an all-encompassing pro-active health and wellness
program for promoting health awareness. It teaches the participants precisely how
to modify their behaviour based on unique physical and behaviour tendencies. It
addresses the need for targeted health and wellness education through annual H&W
plans and personalised prevention plans. Evidence based monitoring is available
through a variety of sensing monitors of your choice and requirements. Encourages
compliance and verification of learning and progress. Can reduce insurance
underwriting costs and generate revenue for industry.
1.1.2 AETOS-IT / Profiles South Africa International
Aetos has a complete catalogue of state of the art occupational assessments that
target all phases of employment, from selection and hiring to training, self-
coaching and management of performance levels.
Profiles give Aetos-IT the market edge in areas of:
 Recruitment & Selection,
 Talent Management
 Improving Workforce Productivity
 Reducing Employee Theft & Fraud
 Reducing Absenteeism
 Improving Customer Service
 Improving Call Centre Performance
 Improving Sales Force Productivity
 Reducing Voluntary Turnover
 Doing more with fewer People
 Manage Performance
BACKGROUND
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 4 of 39
 Manage Organisational Change
 Improving Morale
 Improving Coaching & Monitoring
 Succession Planning
 Career Pathing
 Helping Managers Succeed
 Building High Performance Teams
 Building a performance Culture
 Building a Competency Model
1.2 Audit of Customer Relations via CRM Pipeliner and System Code via AETOS-
HAWKEYE & APOD
1.2.1 Client Relationship Management System Pipeliner
Aetos-It is proud to be the only distributer partner of the most innovative CRM
software solution (cloud) in South Africa. With Pipeliner CRM we introduced new
ways of looking at sales and at the sales pipeline by making it more visual and more
interactive. The interactive user interface allows sales professionals to manage their
most important data with just a few clicks of the mouse.
It gives minimum risk and secure business whilst focussing on the future successes
of the company. "What Amazon is for books Pipeliner is for sales". Pipeliner allows
us to capture, monitor and promote sales activities whilst being fully visible at all
times in the cloud. It integrates all sales activities with client’s relations and allows
the company to manage its sales goals as it affects income. Monitoring can be done
on individual or group sales activities. It has a clear and colourful sales pipeline
which integrates all sales activities on a dashboard with the click of a mouse.
1.2.2 System Code Audit and analyser- AETOS-HAWKEYE & APOD
Consulting is provided for the installation, configuration, interpretation of results,
training of users, project management and program correction/remediation
services. The principals of Aetos IT have been providing consulting services for
over 20 years in the information technology sector. With expertise in large scale
systems implementations and extensive experience managing programming teams
and software implementation projects Aetos IT is well positioned to provide
consulting services associated with the advice & products we sell.
Consulting - ProductTools
This covers the setting up of the system and the setting of coding guidelines (the
rules) in consultation with the client. Pricing subject to clients requirements and
can be estimate for each landscape that the client requires scanning.
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 5 of 39
Consulting - Remedial work
This covers the placing of required skills to carry out remedial work. The cost of
consult depends on a variety of factors including the availability of the specific type
of resource required and the volume of work that is anticipated. It can take several
week or months to acquire the resources required depending on these factors.
Implementation Process
The implementation of the Aetos IT tools follows the path set out below. We
“Setup” the system by installing it for scanning, we “Scan” your code and we
“Validate and Configure”. At “Implementation” the system is up and running.
1.3 AETOS-IT Shareholders
The shareholders are:
 Mr. Andrew Jansen van Vuuren - CEO of AETOS-IT (Pty) Ltd;
 Mr. Rob Kading – IT Executive;
 Mr. Collins Khumalo – Chairperson of AETOS-IT;
 Mr. Jacob Ngakane – Professional engineer with expertise in manufacturing, mining and
development;
 Mr. Emmanuel Christofides – Business Development Executive;
 Mrs. Misti-Aletia Jonker – Corporate Executive;
 Dr. Louis Powell – Health Advisor;
 Mr. Lloyd Peter Chisholm – Financial Executive.
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 6 of 39
2. AETOS-IT PARTNERS
2.1 At EY, we are committed to building a better working world — with increased trust and
confidence in business, sustainable growth, development of talent in all its forms, and
greater collaboration. We want to build a better working world
through our own actions and by engaging with like-minded
organizations and individuals. This is our purpose — and why
we exist as an organization.
Strategic Alliance Agreement (effective 17 October 2014)
2.2 Dimension Data’s passion is to find ways to use ICT to make our clients’ business work
better. We turn your ambitions into achievements. We will position you to respond to
today's challenges, with targeted, pertinent services and IT
solutions. We ensure your business is supported by a robust
networking platform and help you optimise the performance
and availability of the unified communications and
collaboration tools that run on it – including desktop and
contact centre technologies.
Teaming Agreement (effective 27 January 2015)
2.3 Biotic Health Corporation is an impact-orientated company with the core objective of
promoting healthy lifestyles of consumers through managed health interventions. We
work with employers and communities together with the health
ecosystem to deliver tailored solutions that enhance the well-
being of individuals throughout Southern Africa. Our
interventions enable individuals to realise their full well-being
which translates into greater productivity, increased revenue,
reduced costs and increased morale in the workplace and
community.
Strategic Agreement (effective date 10 February 2015)
2.4 Matsei’s experience centres on the design, provision and effective implementation of IT
solutions into the Public Sector in general as well as specialising in solutions for both the
Military and Industry domains of the Aerospace and
Defence, Utilities, Telecommunication, Transportation,
Financial Resources and Health sectors. Matsei provide and
support a complete range of quality Enterprise -Business -
and Solution Architecture services, System Engineering,
Integration support as well as Data and Business Solution
(ERP, EAM, MRO and ECM solutions) Implementation
services.
Strategic Partner Agreement (effective 25 October 2014)
AGREEMENTS
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 7 of 39
2.5 Apace Systems set out to create an independent switch that is fast, secure, open and easy
to use, and that could be used throughout anywhere in the world with no country-specific
restrictions while abiding by each country's local regulations
and requirements. Best practices were adhered to from the
start, which makes the system flexible to each client's needs
and the requirements of their country or regulatory body.
The apace switch is a type-agnostic switch that can handle
data across any industry and format. It provides multiple
connectivity options and abides by the highest forms of
security. Built as a completely pluggable interface it can
enable specific features as and when required. Transactions
can be processed in real-time, as batch or as a hybrid where
transactions are received as batch, but passed to the backend
as real-time.
Strategic Partner Agreement (effective 17 March 2015)
2.6 InfoWatch is a group of innovative technology companies focused on developing and
providing cutting-edge comprehensive technologies and services dedicated to Data Loss
Prevention & Protection, Intellectual Property Protection,
Customer Experience and Reputation Management, as well
as Risk Management and Compliance solutions. InfoWatch
products allow clients to reduce to a minimum the risks
associated with the processing, movement and storage of
information within the corporate secure area and outside it.
InfoWatch's integrated solutions not only protect
information, but automatically collect a body of evidence
that can be used in administrative and legal proceedings in
the event of a violation of the rules governing corporate
information assets by company employees.
Strategic Partner Agreement
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 8 of 39
3. AETOS-INFOWATCH APPERCUT
AETOS-INFOWATCH APPERCUT is a solution which provides an automate verification of
business application source code for compliance with the requirements for custom software
development. It is an essential code checking tool for compliance with regulator requirements,
recommendations of the manufacturers of programming languages and platforms, and also for
vulnerabilities, code documenting, variable naming conventions, code portability. They are specific
for particular business process requirements.
AETOS-INFOWATCH Appercut has been created for companies who order customized software
development and do not require expertise in software development or code verification. The
application code and its update or module can be optionally checked within a few seconds,
after which the system automatically generates a compliance report and makes
recommendations for fixing the detected problems.
AETOS-INFOWATCH Appercut helps customers of software development verify business
applications without special expertise in software development or code auditing. Compared to
manual code analysis, Appercut’s automatic verification ensures higher speeds and better
analysis, and significantly reduces the costs for the services of third-party auditors. Unlike classic
vulnerability scanners that work at the level of data flow graphs, Appercut supports easy
configuration and adapts to the requirements of a specific application.
Appercut can detect code problems that are common to a language or platform, as well as check
for structures which are specific to a particular business context (design):
 rules for critical data flow;
 ways to implement specific functions;
AETOS-INFOWATCH Appercut analyzes the source code of business applications created in the
most common programming languages: ABAP/4, Java, JavaScript, PeopleScript, PL/SQL, T-SQL,
С, С++, C#, ASP, Delphi, Python, Visual Basic, Lotus Script, PHP, Ruby, etc. It uses lexical
analysis to review source code. The results of this analysis do not depend on implementation of
the general logic of the audited business application. Both an arbitrary code fragment (such
as a module, an update, or even a single line of code) and also an entire business application can
be analyzed.
PRODUCTS
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 9 of 39
3.1 X-Ray for Business Applications
AETOS-INFOWATCH Appercut is a solution complaint with a full range of efficiency and
security requirements. Its flexibility allows it to be adapted to a particular business application or a
company’s unique business processes.
AETOS-INFOWATCH Appercut is an easy-to-use, flexible solution that allows step-by-step
implementation of a code revision scenario in order to improve a company’s data security policies.
3.2 11 Reasons to use AETOS-INFOWATCH Appercut
 CHOICE
AETOS-INFOWATCH Appercut is provided as both a public cloud service and
with a standard software product license.
 RANGE OF FEATURES
It is designed to cover a wide range of efficiency and security requirements for
software development: PCI DSS and HIPPA requirements, CERT and OWASP best
practices, SDLC recommendations, and recommendations of the following platform
vendors: SAP, Oracle, Microsoft.
 EASY-TO-USE
To start the analysis process the code only needs to download the application
code (or a fragment of it) in AETOS-INFOWATCH Appercut and receive the
analysis results instantly. No special knowledge or coding skills are required to obtain
or interpret the results of code verification.
 LIGHTNING FAST ANALYSIS
It takes only a few seconds to complete code verification. No need to stop business-
critical applications to do hard and time-consuming manual code checking or external
auditing.
Contract
developers
Regulatory
Compliance
Best
Practices
Security
Recommendations
InfoWatch
Appercut
In-house
Developers
Source
Code
Compliance
Report
Custom-build
applications
Enterprise SDL
C
Applicatio
nStandard
s
Standards Specific Demands
Change
Request
InfoWatch Appercut
Knowledge Base
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 10 of 39
 PROACTIVE EFFECT
Experience has shown that using AETOS-INFOWATCH Appercut for automated
detection of backdoors prevents the majority of software developers from making any
wrong moves.
 INDEPENDENT SOLUTION
AETOS-INFOWATCH Appercut is not affiliated with business application vendors,
software customization professionals, or consulting companies, and, therefore, is free
to disclose the shortcomings of languages and platforms.
 OPEN ARCHITECTURE AND FLEXIBILITY
AETOS-INFOWATCH Appercut users can add to the database of incorrect
code patterns by adding templates that correspond to the specific business
processes of their organization.
 INTEGRATION
Command line interface allows users to integrate calls to AETOS-INFOWATCH
Appercut and embed source code analysis in any Software Development Life Cycle
procedure during its lifecycle, from coding to acceptance.
 INVESTMENT SAVINGS
AETOS-INFOWATCH Appercut cloud service offers a wide choice of rates —
from line-based to unlimited. The standard software implementation of AETOS-
INFOWATCH Appercut also offers flexible licensing, which includes Standard,
Enterprise and Enterprise-Unlimited options. Since AETOS-INFOWATCH Appercut
is licensed by the number of installation servers and not by the number of projects
analyzed (or the number of environments developed), companies of all sizes can find
an option that meets their needs.
 SUPPORT FOR MULTIPLE LANGUAGES
Code analysis is supported for the following common languages used in business
application development: ABAP/4, Java, JavaScript, PeopleScript, PL/SQL, T-SQL,
С, С++, C#, ASP, Delphi, Python, Visual Basic, Lotus Script, PHP, Ruby etc.,
as well as the proprietary scripting languages of workflow automation platforms such
as АBS, ERP, CRM, and analytical systems.
 SCALABILITY
AETOS-INFOWATCH Appercut license allows users auditing any number of
applications in all of the supported languages any number of times regardless of
whether these applications were developed in-house or by third-parties.
InfoWatch
Appercut
Custom
Code Scanner
Security
Check
Coding Testing Acceptance
Best practices
Enterprise Standards
Platform Vendor
Recommendations
Compliance, Commenting
Style, Portability
OWASP, CERT Application
Specific Vulnerabilities,
Critical Data Operations
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 11 of 39
4. AETOS-INFOWATCH ENDPOINT SECURITY
A great tool for optimizing workflows, improving employee productivity, reducing financial losses
and damage to reputation, and cutting the costs of protecting your infrastructure and information.
AETOS-INFOWATCH EndPoint Security targets the typical tasks facing small and medium
businesses. This solution is specifically designed to:
 Discover resources for improving business efficiency;
 Take over control of employee productivity;
 Guide employees in handling data that are crucial to business efficiency,
operating company equipment, reducing power costs and eliminating personal
use of company resources;
 Increase savings on personnel recruitment and training, and reduce the need
for additional equipment;
 Enable regulation compliance regarding information security and the protection
of devices used for data storage.
What are the main causes of low
business efficiency?
What type of information are lost on
flash drives?
Disarray, chaotic
workflow systems
Contracts & other
legal documents
Employees’
«idleness»
Development
plans, incl.
marketing strategy
Employee distracted
by playing games and
viewing entertainment
content
Financial data
Client/supplier
databases
Employee leaving
companies with client
databases; client
poaching
Other
40%
55%
25%
55%
55%
35%
3%
5%
2%
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 12 of 39
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 13 of 39
70%
If the data on a laptop are encrypted, the
cost of losing the device equals the price
of the laptop; if not, the loss will amount
to hundreds of thousands of Rand.
EndPoint Security allows losses to be
minimized, protecting valuable data.
40%
of employees spend their work time on
personal activities, such as, viewing
entertainment content and videos, playing
computer games etc. EndPoint Security
reduces this percentage substantially.
of employees keep highly confidential
company data (including financial
documents, client and supplier databases, and
personal information) on flash drives for easy
access during meetings, business trips,
conferences, for work remotely etc. Of
those flash drives, 60% are regularly lost or
forgotten, exposing client databases to
competitors, which causes irreparable loss for
businesses. EndPoint Security helps prevent
such consequences.
96%
of small to medium companies have to deal
with client database losses every year.
EndPoint Security is designed to eradicate
this problem.
«Idleness» 68%
The average loss suffered by small to
medium companies because of
employees’ «idleness» amounts to 10% of
their monthly income.
EndPoint Security eliminates the cost of
personnel inefficiency.
Computers running during off-work hours
is standard practice in many offices. In
30% of such cases these PCs are accessed
by third parties who copy the data to
portable media.
EndPoint Security eliminates such
incidents by switching off employees’
computers at the end of the working day on
a regular schedule, which also reduces
power costs.
of companies with less than 200 employees
are exposed to attacks which target files
stored in the cloud.
EndPoint Security provides secure remote
storage, encryption and control of access to
data in the cloud.
4 out of 5
companies lack proper defense against
malicious software that is brought into the
office by employees on flash drives and other
media.
EndPoint Security provides comprehensive
control of device connection to company PCs
and the data on those devices, safeguarding
PCs from dangerous applications.
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 14 of 39
4.1 Control of employees’ access to valuable data
Employee actively use portable media, flash
drives, tablets, smartphones and other
communication devices at work, which implies
considerable risks of valuable information being
copied and used for personal purposes. This
may cause irreparable harm for a company’s
business and reputation. A virus from an
employee’s flash drive might compromise a
company’s entire IT infrastructure, blocking the
operation of core business units for several
hours or days.
AETOS-INFOWATCH
Endpoint Security allows
increased efficiency of
workflow management and
ensures tiered access to external
devices for employees.
AETOS-INFOWATCH
EndPoint Security can manage
more than 24 types of devices
and external media!
The solution enables full control of access to devices, ports, network interfaces and
catalogues, and to cloud storage systems. It offers a variety of features to control access
rights:
 By means of black and white lists of devices;
 By device models (with exclusive access to devices according to the list of authorized
device models);
 By serial numbers of devices (with exclusive access to devices with certain serial
numbers, irrespective of user privileges);
 Through a list of authorized media and a list of authorized wireless networks (with
exclusive access to authorized Wi-Fi networks).
4.2 Automatic monitoring of unauthorized employee activity
An employee’s working day can be quite
diversified, including: playing computer
games, watching movies, or printing
documents for personal use. 70% of
companies do not track employees’
activity during work time, or the files and
data they bring in or take away with
them. This information is not registered
in any way.
AETOS-INFOWATCH EndPoint
Security supports event logs and
allows the discovery of
unauthorized handling of valuable
information by employees.
Automatic report generation enables
the discovery of bottlenecks in the
operations of office employees and
extra resources to be located to
enhance their productivity.
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 15 of 39
Event log in AETOS-INFOWATCH EndPoint Security display user activities per
employee: i.e., who performed certain operations and when (reading, copying, creating
or deleting data) using removable media, phones, Wi-Fi networks, network folders, and
cloud storage. The shadow copying feature allows to files specified in the logs directly
from the product console.
4.3 Data control during copying and storing, on premises and in the cloud
Small to medium companies
actively use the cloud to store
and exchange information, but
only a small percentage of these
companies make sure their cloud
data are protected. Over 80% of IT
specialists are not even aware of
the amount of data stored in the
cloud, let alone the nature of those
data or their value for the business
AETOS-INFOWATCH EndPoint Security
monitors all files uploaded to
Dropbox, OneDrive, Google Drive,
Yandex.Disk, or Box Sync by
employees and authorizes external
storage of files based on document
type and data format.
AETOS-INFOWATCH EndPoint
Security allows to share files over the
cloud storage, eliminating concerns
about data security
Clients can choose a separate data encryption method for each cloud provider.
Encryption keys are stored at the client’s site, not in the cloud, which ensures that
they are never exposed to outsiders. Encryption is performed transparently at file
level, so that employees are not involved in the process. This eliminates the
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 16 of 39
possibility for employees to ignore or bypass this mechanism or to distribute
unprotected confidential documents outside the company.
Encryption with AETOS-INFOWATCH EndPoint Security is:
Easy: Transparent:
Data encryption does not
interfere with employees’ work
and does not disrupt production.
Data are automatically
encrypted when recorded to
media and decrypted when
copied to hard drives
Safe: Flexible:
The loss or theft of media does
not lead to data abuse by
outsiders.
Solving various business
problems through encryption:
you can grant access to
encrypted files to all company
employees, to a group of users
(e.g., employees of a given
department) or to a single
employee.
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 17 of 39
4.4 Protection against data theft from lost laptops or flash drives
Portable media and
laptops are the
weakest link of any
corporate
infrastructure, as
they are very often
lost or forgotten by
employees
AETOS-INFOWATCH EndPoint Security offers an easy
and effortless way of protecting information through
encryption. By enabling encryption in AETOS-
INFOWATCH EndPoint Security, you can significantly
enhance the security of stored data:
– No outsiders can read the data
– The theft or loss of devices do not cause information
leaks
– All data are automatically encrypted at creation without
interference for employees, or requiring additional work
by IT personnel (transparent encryption)
The solution enables data encryption on laptops, PCs, external devices, network drives,
and in cloud storage directories.
The encryption is carried out in the background and is fully transparent to employees. The
solution employs the AES–256 OS encryption algorithm with 1,024 to 4,096-bit key
lengths.
AETOS-INFOWATCH EndPoint Security provides two ways of enabling encryption:
optional, by employees, and mandatory, by system administrators. The mobile encryption
feature of AETOS-INFOWATCH EndPoint Security allows secure off-site data
processing.
4.5 Application Control
Games, movies, music, and entertainment
content… Are you sure that your employees
aren’t watching a new film at work right
now? That they are not playing games? What
tools does your company use to monitor these
problems?
Uncontrolled use of various applications by
employees reduces their productivity,
causing them to lag behind with tasks, which
eventually leads to business losses because of
inefficiency.
AETOS-INFOWATCH EndPoint
Security allows businesses to
manage the launch of applications
and control employees’ access to
applications by means of white lists
(of authorized applications) and
black lists (of blocked
applications). This feature
guarantees that no prohibited
applications or files are installed or
launched on any company PC.
The solution includes a learning mode; in this mode the product automatically tracks
applications launched from employees’ PCs and generates a list of trusted applications.
This feature can be used to create a list of trusted applications categorized by applications
developer and extension or file signature, and to setup rules for launching applications for
individual employees, workstations, etc.
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 18 of 39
Classic features of AETOS-INFOWATCH EndPoint Security are described by a simple acronym
C.A.F.E. – revealing the concept of the product as an easy and robust protective tool to assist the
development of a growing company:
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 19 of 39
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 20 of 39
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 21 of 39
 Perfect for small and medium
business
 Fits the needs of any company,
irrespective of industry or profile
 Alert to companies’ business
processes
 Available even for small budgets
 Intuitive and user-friendly
 Easy installation and setup
 No extra network load
 Inconspicuous to employees
 Compatible with any software,
programs
 A single management console
Offline client
InfoWatch
EndPoint
Security Agent
InfoWatch EndPoint Security:
Control over connections to external devices
Audit of user activity
Filtering by data type
Encryption of data written to portable
media, network folders and cloud storage
Domain Controller
Novell e Directory
Management console
Management console
for iPhone
InfoWatch
EndPoint Security
Server
SQL Server TAN
InfoWatch EndPoint
Security Agent
InfoWatch EndPoint
Security Agent
InfoWatch EndPoint
Security Agent InfoWatch Endpoint
Security
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 22 of 39
4.6 Benefits for Business
Reduction of business costs and financial losses
– AETOS-INFOWATCH EndPoint Security substantially reduces the risks
associated with data leakage: client databases copied to flash drives and
passed to competitors may well put a company out of business. The product
eliminates the risk of loss or theft of valuable information because its
encryption feature can be used for any portable media and laptops, or for data
transferred to cloud storage.
– The solution reduces bandwidth consumption: AETOS-INFOWATCH
EndPoint Security settings allow most traffic-consuming operations that
are not job-related to be eliminated.
– The solution reduces personnel costs: it incorporates very simple
installation, setup and management procedures that can be performed
without hiring a qualified administrator or IS officer.
– The solution reduces power costs: its power control feature allows PCs to
be switched on and off on a regular schedule, if employees forget to do so.
– The solution reduces the cost of additional hardware, services and
applications: AETOS-INFOWATCH EndPoint Security does not require
the purchase of any extra hardware or software, and because of its
encryption system many business features, such as document workflow
management, can be deployed in the cloud, which facilitates clear cost
reduction.
All necessary features in one product
AETOS-INFOWATCH EndPoint Security does not contain any unnecessary
functionality. All tasks concerning protection of information are integrated
in the single user-friendly interface, which covers only decisive aspects of
information security.
Business process awareness
AETOS-INFOWATCH EndPoint Security is easily adjustable to company
workflows because of its modular, multicomponent structure: by pinpointing
weak points in your business processes, you can provide targeted protection
for such areas without restricting access to assets that are needed to complete
the company’s work.
Robust and high-quality product
Only 1% of 1,000 companies that have installed AETOS-INFOWATCH
EndPoint Security require support services. Faultless operation of the
product eliminates concerns for system administrators, management and end
users.
Extreme simplicity and usability
AETOS-INFOWATCH EndPoint Security can be installed and configured
in 20 minutes, without any special qualifications or training, and it can be
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 23 of 39
managed with a few clicks. The simplicity of these procedures is facilitated
by the intuitive interface and business logic of the product.
Affordable even on a small budget
The price of AETOS-INFOWATCH EndPoint Security fits into the
operating budget of any company.
Compatibility and productivity
AETOS-INFOWATCH EndPoint Security is fully compatible with any
corporate devices, systems and applications.
AETOS-INFOWATCH EndPoint Security is a simple and efficient solution for workstation and
data protection on endpoint devices for companies of any size and in any sphere of activity.
Whether your customer is a bank or an insurance company, they will find the product very useful.
Product installation does not take long: it can be installed and configured in 15 minutes and fully
implemented within 2 days. No training of personnel is required as this is a user-friendly and
simple to configure solution. It is designed to operate automatically, without taking time away
from employees and IT staff to learn and "get used" to it. Once the rules are set, you will only
perform regular audits to check what employees have taken from the company.
It's a custom-built solution: you can flexibly configure the modules and buy only those features
that your customers need to perform their tasks. This solution will help you raise corporate security
to a new, higher level.
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 24 of 39
5. AETOS-INFOWATCH TRAFFIC MONITOR ENTERPRISE
AETOS-INFOWATCH Traffic Monitor Enterprise is a comprehensive solution for data
protection, loss prevention and monitoring the transmission of sensitive information outside a
company, as well as for the protection of the company from internal threats.
Monitoring &
Analysis data
Automatic
Classification of
Information
transmitted
Prevention &
detection of sensitive
data leakage
Secure storage of
data for analysis and
investigation
A Fresh look at Data Leakage Protection (DLP)
Holistic Approach to Traffic Analysis and Data Protection
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 25 of 39
DLP system makes a decision whether there is a data leak or not
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 26 of 39
5.1 AETOS-INFOWATCH Traffic Monitor Enterprise protects your company from:
5.1.1 Insider Activity
5.1.2 Conspiracies
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 27 of 39
5.1.3 Identifying Corrupt Schemes
5.1.4 Industrial Espionage
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 28 of 39
5.1.5 Working for Competitors
5.1.6 Theft of Personal Data
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 29 of 39
5.1.7 Poaching clients personal data
5.2 AETOS-INFOWATCH Traffic Monitor Technologies and Capabilities
5.2.1 Business Applications data analysis
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 30 of 39
A database is an essential part of any business application
that contains clients' personal information, commercial or
project documentation and other confidential
information, the uncontrolled distribution of which may
damage your business.
Data extraction from business applications is detected
through the Database Extraction Detector. This feature
instantly discovers data transfer from a database, blocks
unauthorized distribution of data, and serves as a source
of digital evidence for the investigation of an incident or
a court hearing.
5.2.2 Control the transfer of different types of data
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 31 of 39
5.2.3 Control the document flow
5.2.4 Control hard copies of documents
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 32 of 39
AETOS-INFOWATCH Traffic Monitor monitors and
intercepts print jobs on any type or model of printer and
tracks the number of printed copies.
Besides monitoring printed copies, AETOS-
INFOWATCH Traffic Monitor tracks the circulation of
scanned documents with the help of OCR (optical
character recognition) technology. It detects scanned
copies of confidential documents and controls internal as
well as outward transfer of such copies.
5.2.5 Eliminating illegal data storage
A customer places confidential files on public network
storage.
DLP system will detect the violation of the confidential
files storage policy, and will notify the information
security officer.
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 33 of 39
5.2.6 Identify disloyal Employees
In tracing the pattern of possible threats,
AETOS-INFOWATCH Traffic Monitor
relies on more aspects than traditional
DLP systems because of its built-in tools
for communication with the HR
department. The product allows the
configuration and application of special
targeted policies for monitoring personnel
included in certain 'at risk groups,'
generating reports on their activity and
applying stricter security policies.
We recommend including the following
types of employee in an 'at-risk group':
Employees on probation
Employees who have handed in their
resignation
Employees who display suspicious recent
activity
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 34 of 39
5.2.7 Control of Mobile Employees
AETOS-INFOWATCH Traffic Monitor enables:
Monitoring and analysis of all messages sent and
received by employees via corporate mail through mobile
devices on iOS, Android and other platforms.
Internal and external monitoring of information on
employee laptops:
Application agents stay active even if laptops are taken
away from company premises, submitting collected
information for analysis when the PCs reconnect to the
corporate network.
Because of its network connection control technology,
Internet access from employee laptops outside a
company's premises is only possible through the
corporate network gateway, which guarantees control
over all network traffic.
5.2.8 Monitoring access abuse
AETOS-INFOWATCH Traffic
Monitor allows the setting of different
threat levels based on user type and the
amount or categories of accessible
information. Each threat level is
associated with a corresponding
response. Thanks to the access abuse
function, an IS officer can detect both
intentional violations of policy and
negligent handling of confidential data
by employees.
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 35 of 39
5.2.9 Incident investigation and Prevention of confidential Information leaks
AETOS-INFOWATCH Traffic Monitor prevents leakage of confidential
information, protects intellectual property, investigates IS incidents related to
unauthorized employee activity, discovers collusion, and identifies the culprits and
their accomplices.
AETOS-INFOWATCH Forensic Storage is an archive which contains all
intercepted data. This enables tracking of information routes and unauthorized use
of corporate resources, and identifies the sender and receiver of information. It
serves as a trusted evidence base source for thorough analysis and investigation of
incidents related to confidential data leaks.
Prevention of information leaks is carried out through monitoring, interception, and
analysis of all company information flows, which is based on defined information
security rules and policies.
What happens to transmitted data?
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 36 of 39
AETOS-INFOWATCH technology supports document recognition and analysis
even in the case of small text fragments which can be copied into any document
and sent in informal communications or via IM systems.
AETOS-INFOWATCH Traffic Monitor enables:
 Control of data transmitted via corporate email, Internet resources, and file
sharing protocols (SMTP, HTTP, HTTPS, FTP)
 Control of instant messaging systems (ICQ, Skype, Mail.ru Agent, GTalk, etc.)
 Control of voice traffic (Skype)
 Control of device and port use on workstations
 Control of network connections of workstations
 Shadow copying of documents printed or copied to removable media
 Prevention of confidential information leakage by blocking the transmission of
data in cases of security policy breach
Possible scenarios for leaks
5.2.10 Control of Document Versions
AETOS-INFOWATCH Traffic Monitor Enterprise
enables automatic updating of the digital
fingerprint database if source documents are
changed. In this way, Object Detector always
works with the most recent reference documents
database.
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 37 of 39
5.3 Key Benefits of AETOS-INFOWATCH Traffic Monitor
5.3.1 Web Interface
5.3.2 Business Engagement
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 38 of 39
5.3.3 Information Flow Analysis
5.3.4 Performance and Resiliency
5.3.5 Building a Safe Environment
AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za
31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria
T: 082 560 9134
Page 39 of 39
5.3.6 Forensics: Detection and Investigation of Incidents
5.3.7 Quick Response to Incidents

More Related Content

What's hot

Tcs annual report_2013-2014
Tcs annual report_2013-2014Tcs annual report_2013-2014
Tcs annual report_2013-2014Mitashi
 
Liquid Workforce - Tech Vision 2016 Trend 2
Liquid Workforce - Tech Vision 2016 Trend 2Liquid Workforce - Tech Vision 2016 Trend 2
Liquid Workforce - Tech Vision 2016 Trend 2accenture
 
Design thinking in pensions: Putting people at the heart of design
Design thinking in pensions: Putting people at the heart of designDesign thinking in pensions: Putting people at the heart of design
Design thinking in pensions: Putting people at the heart of designaccenture
 
Accenture Workforce of the Future: Humanizing Work through Digital
Accenture Workforce of the Future: Humanizing Work through DigitalAccenture Workforce of the Future: Humanizing Work through Digital
Accenture Workforce of the Future: Humanizing Work through Digitalaccenture
 
Serverless Computing
Serverless ComputingServerless Computing
Serverless Computingaccenture
 
Reimagining the World of Work in Public Service
Reimagining the World of Work in Public ServiceReimagining the World of Work in Public Service
Reimagining the World of Work in Public Serviceaccenture
 
ATOS - Siemens IT solutions and Services pod novou značkou
ATOS - Siemens IT solutions and Services pod novou značkouATOS - Siemens IT solutions and Services pod novou značkou
ATOS - Siemens IT solutions and Services pod novou značkouASBIS SK
 
The Human+ Worker in Public Service | Accenture
The Human+ Worker in Public Service | AccentureThe Human+ Worker in Public Service | Accenture
The Human+ Worker in Public Service | Accentureaccenture
 
2017 Corporate Citizenship Report
2017 Corporate Citizenship Report2017 Corporate Citizenship Report
2017 Corporate Citizenship Reportaccenture
 
Platform Economy - Tech Vision 2016 Trend 3
Platform Economy - Tech Vision 2016 Trend 3Platform Economy - Tech Vision 2016 Trend 3
Platform Economy - Tech Vision 2016 Trend 3accenture
 
Accenture BPO brochure
Accenture BPO brochureAccenture BPO brochure
Accenture BPO brochureLawrence K
 
Strategic Workforce Planning Finally Gets Strategic
Strategic Workforce Planning Finally Gets StrategicStrategic Workforce Planning Finally Gets Strategic
Strategic Workforce Planning Finally Gets StrategicAccenture Insurance
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Teamaccenture
 
Operation: Next Summit Takeaways
Operation: Next Summit TakeawaysOperation: Next Summit Takeaways
Operation: Next Summit Takeawaysaccenture
 
Toshiba Opinion Piece A4 2pp
Toshiba Opinion Piece A4 2ppToshiba Opinion Piece A4 2pp
Toshiba Opinion Piece A4 2ppJesse Westgate
 
Conversational AI in Higher Education
Conversational AI in Higher EducationConversational AI in Higher Education
Conversational AI in Higher Educationaccenture
 

What's hot (20)

Tcs annual report_2013-2014
Tcs annual report_2013-2014Tcs annual report_2013-2014
Tcs annual report_2013-2014
 
Liquid Workforce - Tech Vision 2016 Trend 2
Liquid Workforce - Tech Vision 2016 Trend 2Liquid Workforce - Tech Vision 2016 Trend 2
Liquid Workforce - Tech Vision 2016 Trend 2
 
Design thinking in pensions: Putting people at the heart of design
Design thinking in pensions: Putting people at the heart of designDesign thinking in pensions: Putting people at the heart of design
Design thinking in pensions: Putting people at the heart of design
 
Accenture Workforce of the Future: Humanizing Work through Digital
Accenture Workforce of the Future: Humanizing Work through DigitalAccenture Workforce of the Future: Humanizing Work through Digital
Accenture Workforce of the Future: Humanizing Work through Digital
 
Serverless Computing
Serverless ComputingServerless Computing
Serverless Computing
 
Reimagining the World of Work in Public Service
Reimagining the World of Work in Public ServiceReimagining the World of Work in Public Service
Reimagining the World of Work in Public Service
 
ATOS - Siemens IT solutions and Services pod novou značkou
ATOS - Siemens IT solutions and Services pod novou značkouATOS - Siemens IT solutions and Services pod novou značkou
ATOS - Siemens IT solutions and Services pod novou značkou
 
The Human+ Worker in Public Service | Accenture
The Human+ Worker in Public Service | AccentureThe Human+ Worker in Public Service | Accenture
The Human+ Worker in Public Service | Accenture
 
2017 Corporate Citizenship Report
2017 Corporate Citizenship Report2017 Corporate Citizenship Report
2017 Corporate Citizenship Report
 
Platform Economy - Tech Vision 2016 Trend 3
Platform Economy - Tech Vision 2016 Trend 3Platform Economy - Tech Vision 2016 Trend 3
Platform Economy - Tech Vision 2016 Trend 3
 
Accenture BPO brochure
Accenture BPO brochureAccenture BPO brochure
Accenture BPO brochure
 
Strategic Workforce Planning Finally Gets Strategic
Strategic Workforce Planning Finally Gets StrategicStrategic Workforce Planning Finally Gets Strategic
Strategic Workforce Planning Finally Gets Strategic
 
Brochure_Healthcare
Brochure_HealthcareBrochure_Healthcare
Brochure_Healthcare
 
Accenture Robotics Platform
Accenture Robotics PlatformAccenture Robotics Platform
Accenture Robotics Platform
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Team
 
BMC eBook
BMC eBookBMC eBook
BMC eBook
 
Hyperautomation
HyperautomationHyperautomation
Hyperautomation
 
Operation: Next Summit Takeaways
Operation: Next Summit TakeawaysOperation: Next Summit Takeaways
Operation: Next Summit Takeaways
 
Toshiba Opinion Piece A4 2pp
Toshiba Opinion Piece A4 2ppToshiba Opinion Piece A4 2pp
Toshiba Opinion Piece A4 2pp
 
Conversational AI in Higher Education
Conversational AI in Higher EducationConversational AI in Higher Education
Conversational AI in Higher Education
 

Viewers also liked

Transparent and Conducting TiO2 : Nb Thin Films Prepared by Spray Pyrolysis T...
Transparent and Conducting TiO2 : Nb Thin Films Prepared by Spray Pyrolysis T...Transparent and Conducting TiO2 : Nb Thin Films Prepared by Spray Pyrolysis T...
Transparent and Conducting TiO2 : Nb Thin Films Prepared by Spray Pyrolysis T...arj_online
 
Webinar: Er MasterPass fremtidens mobile betalingsmåte?
Webinar: Er MasterPass fremtidens mobile betalingsmåte?Webinar: Er MasterPass fremtidens mobile betalingsmåte?
Webinar: Er MasterPass fremtidens mobile betalingsmåte?Patrik Müller
 
Güzelyurt 2014
Güzelyurt 2014Güzelyurt 2014
Güzelyurt 2014myrilla
 
Kết quả điều trị carcinôm dạ dày tế bào nhẫn
Kết quả điều trị carcinôm dạ dày tế bào nhẫnKết quả điều trị carcinôm dạ dày tế bào nhẫn
Kết quả điều trị carcinôm dạ dày tế bào nhẫnthdcanadavietnam
 
nơi nào dịch vụ giúp việc gia đình chất lượng cao tại hcm
nơi nào dịch vụ giúp việc gia đình chất lượng cao tại hcmnơi nào dịch vụ giúp việc gia đình chất lượng cao tại hcm
nơi nào dịch vụ giúp việc gia đình chất lượng cao tại hcmkerry771
 
Tefl20140708 11key
Tefl20140708 11keyTefl20140708 11key
Tefl20140708 11keyyouwatari
 
Environnement des appareil d'appui en elastomère fretté aaef recueil des règl...
Environnement des appareil d'appui en elastomère fretté aaef recueil des règl...Environnement des appareil d'appui en elastomère fretté aaef recueil des règl...
Environnement des appareil d'appui en elastomère fretté aaef recueil des règl...agmbogba
 
Descontaminación hídrica principales ciudades Colombia
Descontaminación hídrica principales ciudades ColombiaDescontaminación hídrica principales ciudades Colombia
Descontaminación hídrica principales ciudades Colombiajkclavijo
 
материалы семинара
материалы семинараматериалы семинара
материалы семинара19019
 
Aprendizajes esperados en geometría
Aprendizajes esperados en geometríaAprendizajes esperados en geometría
Aprendizajes esperados en geometríablankizpasaran
 
통증과 재활치료 심사
통증과 재활치료 심사통증과 재활치료 심사
통증과 재활치료 심사기세 남
 
Lesson 4 does wealth equal wellbeing
Lesson 4  does wealth equal wellbeingLesson 4  does wealth equal wellbeing
Lesson 4 does wealth equal wellbeingcoburgpsych
 
nơi nào dịch vụ giúp việc gia đình có kinh nghiệm ở hcm
nơi nào dịch vụ giúp việc gia đình có kinh nghiệm ở hcmnơi nào dịch vụ giúp việc gia đình có kinh nghiệm ở hcm
nơi nào dịch vụ giúp việc gia đình có kinh nghiệm ở hcmwarren406
 

Viewers also liked (18)

Transparent and Conducting TiO2 : Nb Thin Films Prepared by Spray Pyrolysis T...
Transparent and Conducting TiO2 : Nb Thin Films Prepared by Spray Pyrolysis T...Transparent and Conducting TiO2 : Nb Thin Films Prepared by Spray Pyrolysis T...
Transparent and Conducting TiO2 : Nb Thin Films Prepared by Spray Pyrolysis T...
 
Webinar: Er MasterPass fremtidens mobile betalingsmåte?
Webinar: Er MasterPass fremtidens mobile betalingsmåte?Webinar: Er MasterPass fremtidens mobile betalingsmåte?
Webinar: Er MasterPass fremtidens mobile betalingsmåte?
 
Picasso
PicassoPicasso
Picasso
 
Güzelyurt 2014
Güzelyurt 2014Güzelyurt 2014
Güzelyurt 2014
 
Sàn gỗ công nghiệp
Sàn gỗ công nghiệpSàn gỗ công nghiệp
Sàn gỗ công nghiệp
 
Kết quả điều trị carcinôm dạ dày tế bào nhẫn
Kết quả điều trị carcinôm dạ dày tế bào nhẫnKết quả điều trị carcinôm dạ dày tế bào nhẫn
Kết quả điều trị carcinôm dạ dày tế bào nhẫn
 
Lâmpadas fluorescentes!
Lâmpadas fluorescentes!Lâmpadas fluorescentes!
Lâmpadas fluorescentes!
 
nơi nào dịch vụ giúp việc gia đình chất lượng cao tại hcm
nơi nào dịch vụ giúp việc gia đình chất lượng cao tại hcmnơi nào dịch vụ giúp việc gia đình chất lượng cao tại hcm
nơi nào dịch vụ giúp việc gia đình chất lượng cao tại hcm
 
Tefl20140708 11key
Tefl20140708 11keyTefl20140708 11key
Tefl20140708 11key
 
Environnement des appareil d'appui en elastomère fretté aaef recueil des règl...
Environnement des appareil d'appui en elastomère fretté aaef recueil des règl...Environnement des appareil d'appui en elastomère fretté aaef recueil des règl...
Environnement des appareil d'appui en elastomère fretté aaef recueil des règl...
 
Descontaminación hídrica principales ciudades Colombia
Descontaminación hídrica principales ciudades ColombiaDescontaminación hídrica principales ciudades Colombia
Descontaminación hídrica principales ciudades Colombia
 
материалы семинара
материалы семинараматериалы семинара
материалы семинара
 
Aprendizajes esperados en geometría
Aprendizajes esperados en geometríaAprendizajes esperados en geometría
Aprendizajes esperados en geometría
 
สมุดเล่มเล็ก
สมุดเล่มเล็กสมุดเล่มเล็ก
สมุดเล่มเล็ก
 
통증과 재활치료 심사
통증과 재활치료 심사통증과 재활치료 심사
통증과 재활치료 심사
 
Lesson 4 does wealth equal wellbeing
Lesson 4  does wealth equal wellbeingLesson 4  does wealth equal wellbeing
Lesson 4 does wealth equal wellbeing
 
nơi nào dịch vụ giúp việc gia đình có kinh nghiệm ở hcm
nơi nào dịch vụ giúp việc gia đình có kinh nghiệm ở hcmnơi nào dịch vụ giúp việc gia đình có kinh nghiệm ở hcm
nơi nào dịch vụ giúp việc gia đình có kinh nghiệm ở hcm
 
Kistérségi lük
Kistérségi lükKistérségi lük
Kistérségi lük
 

Similar to AETOS-IT PRODUCTS AND SERVICES INFOWATCH

Ovum RAS Slides
Ovum RAS SlidesOvum RAS Slides
Ovum RAS Slidesscubamjp
 
eLearning and Talent Management solutions for banks
eLearning and Talent Management solutions for bankseLearning and Talent Management solutions for banks
eLearning and Talent Management solutions for banksAthens Technology Center
 
Introduction To Butler Group's Premier Information Support & Advisory Service
Introduction To Butler Group's Premier Information Support & Advisory ServiceIntroduction To Butler Group's Premier Information Support & Advisory Service
Introduction To Butler Group's Premier Information Support & Advisory Serviceastart
 
Ultimo safety management brochure
Ultimo safety management brochureUltimo safety management brochure
Ultimo safety management brochureThomas Reames
 
T-Bytes Consulting & IT Services
T-Bytes Consulting & IT ServicesT-Bytes Consulting & IT Services
T-Bytes Consulting & IT ServicesEGBG Services
 
SmartBPO (en)
SmartBPO (en)SmartBPO (en)
SmartBPO (en)SmartBPO
 
IT Department Roadmap | National Management Olympiad Season 4
IT Department Roadmap | National Management Olympiad Season 4IT Department Roadmap | National Management Olympiad Season 4
IT Department Roadmap | National Management Olympiad Season 4National Management Olympiad
 
Imeptech : Group brochure
Imeptech : Group brochureImeptech : Group brochure
Imeptech : Group brochureSatya Patri
 
Actiollent Credential
Actiollent CredentialActiollent Credential
Actiollent CredentialActiollent
 
Capabilities Overview 20100414 V1
Capabilities Overview 20100414 V1Capabilities Overview 20100414 V1
Capabilities Overview 20100414 V1nbcoenen
 
Athens Technology Center - Corporate profile
Athens Technology Center - Corporate profileAthens Technology Center - Corporate profile
Athens Technology Center - Corporate profileAthens Technology Center
 
Operation, Technology and Management PlanNameMehdi Fara.docx
Operation, Technology and Management PlanNameMehdi Fara.docxOperation, Technology and Management PlanNameMehdi Fara.docx
Operation, Technology and Management PlanNameMehdi Fara.docxcherishwinsland
 
The Product Dev Conundrum: To Build or Buy in a Digital World?
The Product Dev Conundrum: To Build or Buy in a Digital World?The Product Dev Conundrum: To Build or Buy in a Digital World?
The Product Dev Conundrum: To Build or Buy in a Digital World?Aggregage
 
Netxactics Enterprise Portfolio
Netxactics Enterprise PortfolioNetxactics Enterprise Portfolio
Netxactics Enterprise PortfolioMichee Ngonga
 
With the evolution of technology, a comprehensive mobility strategy is impera...
With the evolution of technology, a comprehensive mobility strategy is impera...With the evolution of technology, a comprehensive mobility strategy is impera...
With the evolution of technology, a comprehensive mobility strategy is impera...EES Africa (Pty) Ltd
 

Similar to AETOS-IT PRODUCTS AND SERVICES INFOWATCH (20)

Ovum RAS Slides
Ovum RAS SlidesOvum RAS Slides
Ovum RAS Slides
 
eLearning and Talent Management solutions for banks
eLearning and Talent Management solutions for bankseLearning and Talent Management solutions for banks
eLearning and Talent Management solutions for banks
 
Company Introduction
Company IntroductionCompany Introduction
Company Introduction
 
Introduction To Butler Group's Premier Information Support & Advisory Service
Introduction To Butler Group's Premier Information Support & Advisory ServiceIntroduction To Butler Group's Premier Information Support & Advisory Service
Introduction To Butler Group's Premier Information Support & Advisory Service
 
Ultimo safety management brochure
Ultimo safety management brochureUltimo safety management brochure
Ultimo safety management brochure
 
Bigradap Digital Profile
Bigradap Digital ProfileBigradap Digital Profile
Bigradap Digital Profile
 
T-Bytes Consulting & IT Services
T-Bytes Consulting & IT ServicesT-Bytes Consulting & IT Services
T-Bytes Consulting & IT Services
 
SmartBPO (en)
SmartBPO (en)SmartBPO (en)
SmartBPO (en)
 
IT Department Roadmap | National Management Olympiad Season 4
IT Department Roadmap | National Management Olympiad Season 4IT Department Roadmap | National Management Olympiad Season 4
IT Department Roadmap | National Management Olympiad Season 4
 
Imeptech : Group brochure
Imeptech : Group brochureImeptech : Group brochure
Imeptech : Group brochure
 
Actiollent Credential
Actiollent CredentialActiollent Credential
Actiollent Credential
 
Capabilities Overview 20100414 V1
Capabilities Overview 20100414 V1Capabilities Overview 20100414 V1
Capabilities Overview 20100414 V1
 
Athens Technology Center - Corporate profile
Athens Technology Center - Corporate profileAthens Technology Center - Corporate profile
Athens Technology Center - Corporate profile
 
Ingenious 2.0 Broucher
Ingenious 2.0 BroucherIngenious 2.0 Broucher
Ingenious 2.0 Broucher
 
TECON Company Profile
TECON Company ProfileTECON Company Profile
TECON Company Profile
 
Operation, Technology and Management PlanNameMehdi Fara.docx
Operation, Technology and Management PlanNameMehdi Fara.docxOperation, Technology and Management PlanNameMehdi Fara.docx
Operation, Technology and Management PlanNameMehdi Fara.docx
 
Project report on cctv
Project report on cctvProject report on cctv
Project report on cctv
 
The Product Dev Conundrum: To Build or Buy in a Digital World?
The Product Dev Conundrum: To Build or Buy in a Digital World?The Product Dev Conundrum: To Build or Buy in a Digital World?
The Product Dev Conundrum: To Build or Buy in a Digital World?
 
Netxactics Enterprise Portfolio
Netxactics Enterprise PortfolioNetxactics Enterprise Portfolio
Netxactics Enterprise Portfolio
 
With the evolution of technology, a comprehensive mobility strategy is impera...
With the evolution of technology, a comprehensive mobility strategy is impera...With the evolution of technology, a comprehensive mobility strategy is impera...
With the evolution of technology, a comprehensive mobility strategy is impera...
 

AETOS-IT PRODUCTS AND SERVICES INFOWATCH

  • 1. Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria www.aetos-it.co.za
  • 2. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 2 of 39 BACKGROUND 1. AETOS-IT PROFILE......................................................................................................... 3 1.1 Cloud Solutions Audit of Human Capital.................................................................... 1.2 Audit of Customer Relations via CRM Pipeliner and System Code via Hawkeye & APOD........................................................................................................................... 1.3 Aetos-it Shareholders................................................................................................... 3 4 5 AGREEMENTS 2. AETOS-IT PARTNERS..................................................................................................... 6 2.1 EY................................................................................................................................. 2.2 Dimension Data............................................................................................................ 2.3 Biotic Health Corporation............................................................................................ 2.4 Matsei............................................................................................................................ 2.5 Apace Systems………………………………………………..……………………… 2.6 InfoWatch……………………………………………..……………………………… 6 6 6 6 7 7 PRODUCTS 3. AETOS-INFOWATCH APPERCUT…………………………………………..………... 3.1 X-Ray for Business Applications………………………………………………….... 3.2 11 Reasons to use AETOS-INFOWATCH Appercut…………………………….….. 4. AETOS-INFOWATCH ENDPOINT SECURITY………………………..……………... 4.1 Control of employees’ access to valuable data……………………………………... 4.2 Automatic monitoring of unauthorized employee activity…………….………... 4.3 Data control during copying and storing, on premises and in the cloud……………. 4.4 Protection against data theft from lost laptops or flash drives……………………… 4.5 Application Control…………………………………………………………………. 4.6 Benefits for Business……………………………………………………………….. 5. AETOS-INFOWATCH TRAFFIC MONITOR ENTERPRISE….…………………..….. 5.1 AETOS-INFOWATCH Traffic Monitor Enterprise protects your company from…. 5.2 AETOS-INFOWATCH Traffic Monitor Technologies and Capabilities…………... 5.3 Key Benefits of AETOS-INFOWATCH Traffic Monitor………………………….. 8 9 9 11 14 14 15 17 17 22 24 26 29 37 TABLE OF CONTENTS
  • 3. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 3 of 39 1. AETOS-IT PROFILE AETOS-IT (Pty) Ltd Company Reg no: 2014/054899/07 emerged in January 2014 from the amalgamation of several business solutions, into one company. The flagship business solution, Hawkeye & APOD was launched in 2009 by the current owners of AETOS-IT. AETOS-IT is a South Africa registered company whose main focus is the Audit of Technology systems, Audit of Human capital and IT Consulting. We are the preferred supplier of Intelligent, Innovative & Integrated Corporate Enterprise Solutions across South Africa and the rest of Africa. 1.1 Cloud Solutions Audit of Human Capital 1.1.1 Indaba Health & Wellness: Health and Behaviour Integrated Tool (HABIT) An interactive, on line system, for behaviour modification with evidence based monitoring. It combines Behaviour analysis with targeted e-learning and vital statistic monitoring. It's an all-encompassing pro-active health and wellness program for promoting health awareness. It teaches the participants precisely how to modify their behaviour based on unique physical and behaviour tendencies. It addresses the need for targeted health and wellness education through annual H&W plans and personalised prevention plans. Evidence based monitoring is available through a variety of sensing monitors of your choice and requirements. Encourages compliance and verification of learning and progress. Can reduce insurance underwriting costs and generate revenue for industry. 1.1.2 AETOS-IT / Profiles South Africa International Aetos has a complete catalogue of state of the art occupational assessments that target all phases of employment, from selection and hiring to training, self- coaching and management of performance levels. Profiles give Aetos-IT the market edge in areas of:  Recruitment & Selection,  Talent Management  Improving Workforce Productivity  Reducing Employee Theft & Fraud  Reducing Absenteeism  Improving Customer Service  Improving Call Centre Performance  Improving Sales Force Productivity  Reducing Voluntary Turnover  Doing more with fewer People  Manage Performance BACKGROUND
  • 4. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 4 of 39  Manage Organisational Change  Improving Morale  Improving Coaching & Monitoring  Succession Planning  Career Pathing  Helping Managers Succeed  Building High Performance Teams  Building a performance Culture  Building a Competency Model 1.2 Audit of Customer Relations via CRM Pipeliner and System Code via AETOS- HAWKEYE & APOD 1.2.1 Client Relationship Management System Pipeliner Aetos-It is proud to be the only distributer partner of the most innovative CRM software solution (cloud) in South Africa. With Pipeliner CRM we introduced new ways of looking at sales and at the sales pipeline by making it more visual and more interactive. The interactive user interface allows sales professionals to manage their most important data with just a few clicks of the mouse. It gives minimum risk and secure business whilst focussing on the future successes of the company. "What Amazon is for books Pipeliner is for sales". Pipeliner allows us to capture, monitor and promote sales activities whilst being fully visible at all times in the cloud. It integrates all sales activities with client’s relations and allows the company to manage its sales goals as it affects income. Monitoring can be done on individual or group sales activities. It has a clear and colourful sales pipeline which integrates all sales activities on a dashboard with the click of a mouse. 1.2.2 System Code Audit and analyser- AETOS-HAWKEYE & APOD Consulting is provided for the installation, configuration, interpretation of results, training of users, project management and program correction/remediation services. The principals of Aetos IT have been providing consulting services for over 20 years in the information technology sector. With expertise in large scale systems implementations and extensive experience managing programming teams and software implementation projects Aetos IT is well positioned to provide consulting services associated with the advice & products we sell. Consulting - ProductTools This covers the setting up of the system and the setting of coding guidelines (the rules) in consultation with the client. Pricing subject to clients requirements and can be estimate for each landscape that the client requires scanning.
  • 5. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 5 of 39 Consulting - Remedial work This covers the placing of required skills to carry out remedial work. The cost of consult depends on a variety of factors including the availability of the specific type of resource required and the volume of work that is anticipated. It can take several week or months to acquire the resources required depending on these factors. Implementation Process The implementation of the Aetos IT tools follows the path set out below. We “Setup” the system by installing it for scanning, we “Scan” your code and we “Validate and Configure”. At “Implementation” the system is up and running. 1.3 AETOS-IT Shareholders The shareholders are:  Mr. Andrew Jansen van Vuuren - CEO of AETOS-IT (Pty) Ltd;  Mr. Rob Kading – IT Executive;  Mr. Collins Khumalo – Chairperson of AETOS-IT;  Mr. Jacob Ngakane – Professional engineer with expertise in manufacturing, mining and development;  Mr. Emmanuel Christofides – Business Development Executive;  Mrs. Misti-Aletia Jonker – Corporate Executive;  Dr. Louis Powell – Health Advisor;  Mr. Lloyd Peter Chisholm – Financial Executive.
  • 6. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 6 of 39 2. AETOS-IT PARTNERS 2.1 At EY, we are committed to building a better working world — with increased trust and confidence in business, sustainable growth, development of talent in all its forms, and greater collaboration. We want to build a better working world through our own actions and by engaging with like-minded organizations and individuals. This is our purpose — and why we exist as an organization. Strategic Alliance Agreement (effective 17 October 2014) 2.2 Dimension Data’s passion is to find ways to use ICT to make our clients’ business work better. We turn your ambitions into achievements. We will position you to respond to today's challenges, with targeted, pertinent services and IT solutions. We ensure your business is supported by a robust networking platform and help you optimise the performance and availability of the unified communications and collaboration tools that run on it – including desktop and contact centre technologies. Teaming Agreement (effective 27 January 2015) 2.3 Biotic Health Corporation is an impact-orientated company with the core objective of promoting healthy lifestyles of consumers through managed health interventions. We work with employers and communities together with the health ecosystem to deliver tailored solutions that enhance the well- being of individuals throughout Southern Africa. Our interventions enable individuals to realise their full well-being which translates into greater productivity, increased revenue, reduced costs and increased morale in the workplace and community. Strategic Agreement (effective date 10 February 2015) 2.4 Matsei’s experience centres on the design, provision and effective implementation of IT solutions into the Public Sector in general as well as specialising in solutions for both the Military and Industry domains of the Aerospace and Defence, Utilities, Telecommunication, Transportation, Financial Resources and Health sectors. Matsei provide and support a complete range of quality Enterprise -Business - and Solution Architecture services, System Engineering, Integration support as well as Data and Business Solution (ERP, EAM, MRO and ECM solutions) Implementation services. Strategic Partner Agreement (effective 25 October 2014) AGREEMENTS
  • 7. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 7 of 39 2.5 Apace Systems set out to create an independent switch that is fast, secure, open and easy to use, and that could be used throughout anywhere in the world with no country-specific restrictions while abiding by each country's local regulations and requirements. Best practices were adhered to from the start, which makes the system flexible to each client's needs and the requirements of their country or regulatory body. The apace switch is a type-agnostic switch that can handle data across any industry and format. It provides multiple connectivity options and abides by the highest forms of security. Built as a completely pluggable interface it can enable specific features as and when required. Transactions can be processed in real-time, as batch or as a hybrid where transactions are received as batch, but passed to the backend as real-time. Strategic Partner Agreement (effective 17 March 2015) 2.6 InfoWatch is a group of innovative technology companies focused on developing and providing cutting-edge comprehensive technologies and services dedicated to Data Loss Prevention & Protection, Intellectual Property Protection, Customer Experience and Reputation Management, as well as Risk Management and Compliance solutions. InfoWatch products allow clients to reduce to a minimum the risks associated with the processing, movement and storage of information within the corporate secure area and outside it. InfoWatch's integrated solutions not only protect information, but automatically collect a body of evidence that can be used in administrative and legal proceedings in the event of a violation of the rules governing corporate information assets by company employees. Strategic Partner Agreement
  • 8. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 8 of 39 3. AETOS-INFOWATCH APPERCUT AETOS-INFOWATCH APPERCUT is a solution which provides an automate verification of business application source code for compliance with the requirements for custom software development. It is an essential code checking tool for compliance with regulator requirements, recommendations of the manufacturers of programming languages and platforms, and also for vulnerabilities, code documenting, variable naming conventions, code portability. They are specific for particular business process requirements. AETOS-INFOWATCH Appercut has been created for companies who order customized software development and do not require expertise in software development or code verification. The application code and its update or module can be optionally checked within a few seconds, after which the system automatically generates a compliance report and makes recommendations for fixing the detected problems. AETOS-INFOWATCH Appercut helps customers of software development verify business applications without special expertise in software development or code auditing. Compared to manual code analysis, Appercut’s automatic verification ensures higher speeds and better analysis, and significantly reduces the costs for the services of third-party auditors. Unlike classic vulnerability scanners that work at the level of data flow graphs, Appercut supports easy configuration and adapts to the requirements of a specific application. Appercut can detect code problems that are common to a language or platform, as well as check for structures which are specific to a particular business context (design):  rules for critical data flow;  ways to implement specific functions; AETOS-INFOWATCH Appercut analyzes the source code of business applications created in the most common programming languages: ABAP/4, Java, JavaScript, PeopleScript, PL/SQL, T-SQL, С, С++, C#, ASP, Delphi, Python, Visual Basic, Lotus Script, PHP, Ruby, etc. It uses lexical analysis to review source code. The results of this analysis do not depend on implementation of the general logic of the audited business application. Both an arbitrary code fragment (such as a module, an update, or even a single line of code) and also an entire business application can be analyzed. PRODUCTS
  • 9. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 9 of 39 3.1 X-Ray for Business Applications AETOS-INFOWATCH Appercut is a solution complaint with a full range of efficiency and security requirements. Its flexibility allows it to be adapted to a particular business application or a company’s unique business processes. AETOS-INFOWATCH Appercut is an easy-to-use, flexible solution that allows step-by-step implementation of a code revision scenario in order to improve a company’s data security policies. 3.2 11 Reasons to use AETOS-INFOWATCH Appercut  CHOICE AETOS-INFOWATCH Appercut is provided as both a public cloud service and with a standard software product license.  RANGE OF FEATURES It is designed to cover a wide range of efficiency and security requirements for software development: PCI DSS and HIPPA requirements, CERT and OWASP best practices, SDLC recommendations, and recommendations of the following platform vendors: SAP, Oracle, Microsoft.  EASY-TO-USE To start the analysis process the code only needs to download the application code (or a fragment of it) in AETOS-INFOWATCH Appercut and receive the analysis results instantly. No special knowledge or coding skills are required to obtain or interpret the results of code verification.  LIGHTNING FAST ANALYSIS It takes only a few seconds to complete code verification. No need to stop business- critical applications to do hard and time-consuming manual code checking or external auditing. Contract developers Regulatory Compliance Best Practices Security Recommendations InfoWatch Appercut In-house Developers Source Code Compliance Report Custom-build applications Enterprise SDL C Applicatio nStandard s Standards Specific Demands Change Request InfoWatch Appercut Knowledge Base
  • 10. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 10 of 39  PROACTIVE EFFECT Experience has shown that using AETOS-INFOWATCH Appercut for automated detection of backdoors prevents the majority of software developers from making any wrong moves.  INDEPENDENT SOLUTION AETOS-INFOWATCH Appercut is not affiliated with business application vendors, software customization professionals, or consulting companies, and, therefore, is free to disclose the shortcomings of languages and platforms.  OPEN ARCHITECTURE AND FLEXIBILITY AETOS-INFOWATCH Appercut users can add to the database of incorrect code patterns by adding templates that correspond to the specific business processes of their organization.  INTEGRATION Command line interface allows users to integrate calls to AETOS-INFOWATCH Appercut and embed source code analysis in any Software Development Life Cycle procedure during its lifecycle, from coding to acceptance.  INVESTMENT SAVINGS AETOS-INFOWATCH Appercut cloud service offers a wide choice of rates — from line-based to unlimited. The standard software implementation of AETOS- INFOWATCH Appercut also offers flexible licensing, which includes Standard, Enterprise and Enterprise-Unlimited options. Since AETOS-INFOWATCH Appercut is licensed by the number of installation servers and not by the number of projects analyzed (or the number of environments developed), companies of all sizes can find an option that meets their needs.  SUPPORT FOR MULTIPLE LANGUAGES Code analysis is supported for the following common languages used in business application development: ABAP/4, Java, JavaScript, PeopleScript, PL/SQL, T-SQL, С, С++, C#, ASP, Delphi, Python, Visual Basic, Lotus Script, PHP, Ruby etc., as well as the proprietary scripting languages of workflow automation platforms such as АBS, ERP, CRM, and analytical systems.  SCALABILITY AETOS-INFOWATCH Appercut license allows users auditing any number of applications in all of the supported languages any number of times regardless of whether these applications were developed in-house or by third-parties. InfoWatch Appercut Custom Code Scanner Security Check Coding Testing Acceptance Best practices Enterprise Standards Platform Vendor Recommendations Compliance, Commenting Style, Portability OWASP, CERT Application Specific Vulnerabilities, Critical Data Operations
  • 11. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 11 of 39 4. AETOS-INFOWATCH ENDPOINT SECURITY A great tool for optimizing workflows, improving employee productivity, reducing financial losses and damage to reputation, and cutting the costs of protecting your infrastructure and information. AETOS-INFOWATCH EndPoint Security targets the typical tasks facing small and medium businesses. This solution is specifically designed to:  Discover resources for improving business efficiency;  Take over control of employee productivity;  Guide employees in handling data that are crucial to business efficiency, operating company equipment, reducing power costs and eliminating personal use of company resources;  Increase savings on personnel recruitment and training, and reduce the need for additional equipment;  Enable regulation compliance regarding information security and the protection of devices used for data storage. What are the main causes of low business efficiency? What type of information are lost on flash drives? Disarray, chaotic workflow systems Contracts & other legal documents Employees’ «idleness» Development plans, incl. marketing strategy Employee distracted by playing games and viewing entertainment content Financial data Client/supplier databases Employee leaving companies with client databases; client poaching Other 40% 55% 25% 55% 55% 35% 3% 5% 2%
  • 12. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 12 of 39
  • 13. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 13 of 39 70% If the data on a laptop are encrypted, the cost of losing the device equals the price of the laptop; if not, the loss will amount to hundreds of thousands of Rand. EndPoint Security allows losses to be minimized, protecting valuable data. 40% of employees spend their work time on personal activities, such as, viewing entertainment content and videos, playing computer games etc. EndPoint Security reduces this percentage substantially. of employees keep highly confidential company data (including financial documents, client and supplier databases, and personal information) on flash drives for easy access during meetings, business trips, conferences, for work remotely etc. Of those flash drives, 60% are regularly lost or forgotten, exposing client databases to competitors, which causes irreparable loss for businesses. EndPoint Security helps prevent such consequences. 96% of small to medium companies have to deal with client database losses every year. EndPoint Security is designed to eradicate this problem. «Idleness» 68% The average loss suffered by small to medium companies because of employees’ «idleness» amounts to 10% of their monthly income. EndPoint Security eliminates the cost of personnel inefficiency. Computers running during off-work hours is standard practice in many offices. In 30% of such cases these PCs are accessed by third parties who copy the data to portable media. EndPoint Security eliminates such incidents by switching off employees’ computers at the end of the working day on a regular schedule, which also reduces power costs. of companies with less than 200 employees are exposed to attacks which target files stored in the cloud. EndPoint Security provides secure remote storage, encryption and control of access to data in the cloud. 4 out of 5 companies lack proper defense against malicious software that is brought into the office by employees on flash drives and other media. EndPoint Security provides comprehensive control of device connection to company PCs and the data on those devices, safeguarding PCs from dangerous applications.
  • 14. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 14 of 39 4.1 Control of employees’ access to valuable data Employee actively use portable media, flash drives, tablets, smartphones and other communication devices at work, which implies considerable risks of valuable information being copied and used for personal purposes. This may cause irreparable harm for a company’s business and reputation. A virus from an employee’s flash drive might compromise a company’s entire IT infrastructure, blocking the operation of core business units for several hours or days. AETOS-INFOWATCH Endpoint Security allows increased efficiency of workflow management and ensures tiered access to external devices for employees. AETOS-INFOWATCH EndPoint Security can manage more than 24 types of devices and external media! The solution enables full control of access to devices, ports, network interfaces and catalogues, and to cloud storage systems. It offers a variety of features to control access rights:  By means of black and white lists of devices;  By device models (with exclusive access to devices according to the list of authorized device models);  By serial numbers of devices (with exclusive access to devices with certain serial numbers, irrespective of user privileges);  Through a list of authorized media and a list of authorized wireless networks (with exclusive access to authorized Wi-Fi networks). 4.2 Automatic monitoring of unauthorized employee activity An employee’s working day can be quite diversified, including: playing computer games, watching movies, or printing documents for personal use. 70% of companies do not track employees’ activity during work time, or the files and data they bring in or take away with them. This information is not registered in any way. AETOS-INFOWATCH EndPoint Security supports event logs and allows the discovery of unauthorized handling of valuable information by employees. Automatic report generation enables the discovery of bottlenecks in the operations of office employees and extra resources to be located to enhance their productivity.
  • 15. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 15 of 39 Event log in AETOS-INFOWATCH EndPoint Security display user activities per employee: i.e., who performed certain operations and when (reading, copying, creating or deleting data) using removable media, phones, Wi-Fi networks, network folders, and cloud storage. The shadow copying feature allows to files specified in the logs directly from the product console. 4.3 Data control during copying and storing, on premises and in the cloud Small to medium companies actively use the cloud to store and exchange information, but only a small percentage of these companies make sure their cloud data are protected. Over 80% of IT specialists are not even aware of the amount of data stored in the cloud, let alone the nature of those data or their value for the business AETOS-INFOWATCH EndPoint Security monitors all files uploaded to Dropbox, OneDrive, Google Drive, Yandex.Disk, or Box Sync by employees and authorizes external storage of files based on document type and data format. AETOS-INFOWATCH EndPoint Security allows to share files over the cloud storage, eliminating concerns about data security Clients can choose a separate data encryption method for each cloud provider. Encryption keys are stored at the client’s site, not in the cloud, which ensures that they are never exposed to outsiders. Encryption is performed transparently at file level, so that employees are not involved in the process. This eliminates the
  • 16. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 16 of 39 possibility for employees to ignore or bypass this mechanism or to distribute unprotected confidential documents outside the company. Encryption with AETOS-INFOWATCH EndPoint Security is: Easy: Transparent: Data encryption does not interfere with employees’ work and does not disrupt production. Data are automatically encrypted when recorded to media and decrypted when copied to hard drives Safe: Flexible: The loss or theft of media does not lead to data abuse by outsiders. Solving various business problems through encryption: you can grant access to encrypted files to all company employees, to a group of users (e.g., employees of a given department) or to a single employee.
  • 17. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 17 of 39 4.4 Protection against data theft from lost laptops or flash drives Portable media and laptops are the weakest link of any corporate infrastructure, as they are very often lost or forgotten by employees AETOS-INFOWATCH EndPoint Security offers an easy and effortless way of protecting information through encryption. By enabling encryption in AETOS- INFOWATCH EndPoint Security, you can significantly enhance the security of stored data: – No outsiders can read the data – The theft or loss of devices do not cause information leaks – All data are automatically encrypted at creation without interference for employees, or requiring additional work by IT personnel (transparent encryption) The solution enables data encryption on laptops, PCs, external devices, network drives, and in cloud storage directories. The encryption is carried out in the background and is fully transparent to employees. The solution employs the AES–256 OS encryption algorithm with 1,024 to 4,096-bit key lengths. AETOS-INFOWATCH EndPoint Security provides two ways of enabling encryption: optional, by employees, and mandatory, by system administrators. The mobile encryption feature of AETOS-INFOWATCH EndPoint Security allows secure off-site data processing. 4.5 Application Control Games, movies, music, and entertainment content… Are you sure that your employees aren’t watching a new film at work right now? That they are not playing games? What tools does your company use to monitor these problems? Uncontrolled use of various applications by employees reduces their productivity, causing them to lag behind with tasks, which eventually leads to business losses because of inefficiency. AETOS-INFOWATCH EndPoint Security allows businesses to manage the launch of applications and control employees’ access to applications by means of white lists (of authorized applications) and black lists (of blocked applications). This feature guarantees that no prohibited applications or files are installed or launched on any company PC. The solution includes a learning mode; in this mode the product automatically tracks applications launched from employees’ PCs and generates a list of trusted applications. This feature can be used to create a list of trusted applications categorized by applications developer and extension or file signature, and to setup rules for launching applications for individual employees, workstations, etc.
  • 18. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 18 of 39 Classic features of AETOS-INFOWATCH EndPoint Security are described by a simple acronym C.A.F.E. – revealing the concept of the product as an easy and robust protective tool to assist the development of a growing company:
  • 19. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 19 of 39
  • 20. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 20 of 39
  • 21. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 21 of 39  Perfect for small and medium business  Fits the needs of any company, irrespective of industry or profile  Alert to companies’ business processes  Available even for small budgets  Intuitive and user-friendly  Easy installation and setup  No extra network load  Inconspicuous to employees  Compatible with any software, programs  A single management console Offline client InfoWatch EndPoint Security Agent InfoWatch EndPoint Security: Control over connections to external devices Audit of user activity Filtering by data type Encryption of data written to portable media, network folders and cloud storage Domain Controller Novell e Directory Management console Management console for iPhone InfoWatch EndPoint Security Server SQL Server TAN InfoWatch EndPoint Security Agent InfoWatch EndPoint Security Agent InfoWatch EndPoint Security Agent InfoWatch Endpoint Security
  • 22. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 22 of 39 4.6 Benefits for Business Reduction of business costs and financial losses – AETOS-INFOWATCH EndPoint Security substantially reduces the risks associated with data leakage: client databases copied to flash drives and passed to competitors may well put a company out of business. The product eliminates the risk of loss or theft of valuable information because its encryption feature can be used for any portable media and laptops, or for data transferred to cloud storage. – The solution reduces bandwidth consumption: AETOS-INFOWATCH EndPoint Security settings allow most traffic-consuming operations that are not job-related to be eliminated. – The solution reduces personnel costs: it incorporates very simple installation, setup and management procedures that can be performed without hiring a qualified administrator or IS officer. – The solution reduces power costs: its power control feature allows PCs to be switched on and off on a regular schedule, if employees forget to do so. – The solution reduces the cost of additional hardware, services and applications: AETOS-INFOWATCH EndPoint Security does not require the purchase of any extra hardware or software, and because of its encryption system many business features, such as document workflow management, can be deployed in the cloud, which facilitates clear cost reduction. All necessary features in one product AETOS-INFOWATCH EndPoint Security does not contain any unnecessary functionality. All tasks concerning protection of information are integrated in the single user-friendly interface, which covers only decisive aspects of information security. Business process awareness AETOS-INFOWATCH EndPoint Security is easily adjustable to company workflows because of its modular, multicomponent structure: by pinpointing weak points in your business processes, you can provide targeted protection for such areas without restricting access to assets that are needed to complete the company’s work. Robust and high-quality product Only 1% of 1,000 companies that have installed AETOS-INFOWATCH EndPoint Security require support services. Faultless operation of the product eliminates concerns for system administrators, management and end users. Extreme simplicity and usability AETOS-INFOWATCH EndPoint Security can be installed and configured in 20 minutes, without any special qualifications or training, and it can be
  • 23. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 23 of 39 managed with a few clicks. The simplicity of these procedures is facilitated by the intuitive interface and business logic of the product. Affordable even on a small budget The price of AETOS-INFOWATCH EndPoint Security fits into the operating budget of any company. Compatibility and productivity AETOS-INFOWATCH EndPoint Security is fully compatible with any corporate devices, systems and applications. AETOS-INFOWATCH EndPoint Security is a simple and efficient solution for workstation and data protection on endpoint devices for companies of any size and in any sphere of activity. Whether your customer is a bank or an insurance company, they will find the product very useful. Product installation does not take long: it can be installed and configured in 15 minutes and fully implemented within 2 days. No training of personnel is required as this is a user-friendly and simple to configure solution. It is designed to operate automatically, without taking time away from employees and IT staff to learn and "get used" to it. Once the rules are set, you will only perform regular audits to check what employees have taken from the company. It's a custom-built solution: you can flexibly configure the modules and buy only those features that your customers need to perform their tasks. This solution will help you raise corporate security to a new, higher level.
  • 24. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 24 of 39 5. AETOS-INFOWATCH TRAFFIC MONITOR ENTERPRISE AETOS-INFOWATCH Traffic Monitor Enterprise is a comprehensive solution for data protection, loss prevention and monitoring the transmission of sensitive information outside a company, as well as for the protection of the company from internal threats. Monitoring & Analysis data Automatic Classification of Information transmitted Prevention & detection of sensitive data leakage Secure storage of data for analysis and investigation A Fresh look at Data Leakage Protection (DLP) Holistic Approach to Traffic Analysis and Data Protection
  • 25. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 25 of 39 DLP system makes a decision whether there is a data leak or not
  • 26. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 26 of 39 5.1 AETOS-INFOWATCH Traffic Monitor Enterprise protects your company from: 5.1.1 Insider Activity 5.1.2 Conspiracies
  • 27. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 27 of 39 5.1.3 Identifying Corrupt Schemes 5.1.4 Industrial Espionage
  • 28. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 28 of 39 5.1.5 Working for Competitors 5.1.6 Theft of Personal Data
  • 29. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 29 of 39 5.1.7 Poaching clients personal data 5.2 AETOS-INFOWATCH Traffic Monitor Technologies and Capabilities 5.2.1 Business Applications data analysis
  • 30. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 30 of 39 A database is an essential part of any business application that contains clients' personal information, commercial or project documentation and other confidential information, the uncontrolled distribution of which may damage your business. Data extraction from business applications is detected through the Database Extraction Detector. This feature instantly discovers data transfer from a database, blocks unauthorized distribution of data, and serves as a source of digital evidence for the investigation of an incident or a court hearing. 5.2.2 Control the transfer of different types of data
  • 31. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 31 of 39 5.2.3 Control the document flow 5.2.4 Control hard copies of documents
  • 32. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 32 of 39 AETOS-INFOWATCH Traffic Monitor monitors and intercepts print jobs on any type or model of printer and tracks the number of printed copies. Besides monitoring printed copies, AETOS- INFOWATCH Traffic Monitor tracks the circulation of scanned documents with the help of OCR (optical character recognition) technology. It detects scanned copies of confidential documents and controls internal as well as outward transfer of such copies. 5.2.5 Eliminating illegal data storage A customer places confidential files on public network storage. DLP system will detect the violation of the confidential files storage policy, and will notify the information security officer.
  • 33. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 33 of 39 5.2.6 Identify disloyal Employees In tracing the pattern of possible threats, AETOS-INFOWATCH Traffic Monitor relies on more aspects than traditional DLP systems because of its built-in tools for communication with the HR department. The product allows the configuration and application of special targeted policies for monitoring personnel included in certain 'at risk groups,' generating reports on their activity and applying stricter security policies. We recommend including the following types of employee in an 'at-risk group': Employees on probation Employees who have handed in their resignation Employees who display suspicious recent activity
  • 34. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 34 of 39 5.2.7 Control of Mobile Employees AETOS-INFOWATCH Traffic Monitor enables: Monitoring and analysis of all messages sent and received by employees via corporate mail through mobile devices on iOS, Android and other platforms. Internal and external monitoring of information on employee laptops: Application agents stay active even if laptops are taken away from company premises, submitting collected information for analysis when the PCs reconnect to the corporate network. Because of its network connection control technology, Internet access from employee laptops outside a company's premises is only possible through the corporate network gateway, which guarantees control over all network traffic. 5.2.8 Monitoring access abuse AETOS-INFOWATCH Traffic Monitor allows the setting of different threat levels based on user type and the amount or categories of accessible information. Each threat level is associated with a corresponding response. Thanks to the access abuse function, an IS officer can detect both intentional violations of policy and negligent handling of confidential data by employees.
  • 35. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 35 of 39 5.2.9 Incident investigation and Prevention of confidential Information leaks AETOS-INFOWATCH Traffic Monitor prevents leakage of confidential information, protects intellectual property, investigates IS incidents related to unauthorized employee activity, discovers collusion, and identifies the culprits and their accomplices. AETOS-INFOWATCH Forensic Storage is an archive which contains all intercepted data. This enables tracking of information routes and unauthorized use of corporate resources, and identifies the sender and receiver of information. It serves as a trusted evidence base source for thorough analysis and investigation of incidents related to confidential data leaks. Prevention of information leaks is carried out through monitoring, interception, and analysis of all company information flows, which is based on defined information security rules and policies. What happens to transmitted data?
  • 36. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 36 of 39 AETOS-INFOWATCH technology supports document recognition and analysis even in the case of small text fragments which can be copied into any document and sent in informal communications or via IM systems. AETOS-INFOWATCH Traffic Monitor enables:  Control of data transmitted via corporate email, Internet resources, and file sharing protocols (SMTP, HTTP, HTTPS, FTP)  Control of instant messaging systems (ICQ, Skype, Mail.ru Agent, GTalk, etc.)  Control of voice traffic (Skype)  Control of device and port use on workstations  Control of network connections of workstations  Shadow copying of documents printed or copied to removable media  Prevention of confidential information leakage by blocking the transmission of data in cases of security policy breach Possible scenarios for leaks 5.2.10 Control of Document Versions AETOS-INFOWATCH Traffic Monitor Enterprise enables automatic updating of the digital fingerprint database if source documents are changed. In this way, Object Detector always works with the most recent reference documents database.
  • 37. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 37 of 39 5.3 Key Benefits of AETOS-INFOWATCH Traffic Monitor 5.3.1 Web Interface 5.3.2 Business Engagement
  • 38. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 38 of 39 5.3.3 Information Flow Analysis 5.3.4 Performance and Resiliency 5.3.5 Building a Safe Environment
  • 39. AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za 31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria T: 082 560 9134 Page 39 of 39 5.3.6 Forensics: Detection and Investigation of Incidents 5.3.7 Quick Response to Incidents