SlideShare a Scribd company logo
DL
P
IDEN
TITY
ACT
IVITY
INFRAST
RUCTURE
Data
at Rest
Behavioral
Keyword
Activity
File Access
Activity
System
Resource
Utilization
Web
Usage and
Activity
Application
Usage and
Activity
Application
Management
Data
in Use
Data in
Motion
Intelligent ID is an Endpoint Monitoring and Protection (EMaP) software platform that
helps to secure organizations’ business assets by continuously monitoring and alerting
management to suspect events taking place on the endpoints themselves. This includes
data loss or theft activity, compliance infractions, workplace liability issues, inefficient use of
time and resources, infrastructure concerns, insecure file access, and more.
Intelligent ID sets itself apart by providing a solution that collects more data from more
channels, all with a single lightweight, low-impact endpoint agent. While our competitors
require network appliances and additional software installations to complete their endpoint
monitoring, Intelligent ID runs independently providing ease of installation and dramatic cost
savings. In addition, while most endpoint solutions are highly specialized, providing only one
set of data; Intelligent ID provides a holistic view of all data sources on the endpoint.
INTELLIGENT ID’S VALUE:
»» Endpoint-focused to address events regardless of network connectivity
»» Consolidate existing, expensive, and ineffective tools and applications
»» Utilize behavioral, productivity, and event analytics to identify suspect activity before it 		
	 negatively impacts the organization
»» Intuitive UI and varied use cases add value for C-level staff, legal, HR, and IT departments
»» Measurable and swift return on investment (ROI)
»» Integrated compliance policy tracking, investigation tools, and visualizations provide valuable 	
	 and time-saving information instantly
KEY FEATURES OF INTELLIGENT ID:
Intelligent IDís monitoring and protection features encompass four main areas; Data Loss Prevention, Identity-Based Events, Activity
Statistics, and Infrastructure Management. Within these areas, Intelligent ID incorporates a series of monitoring and protection rules
custom-configured to the organizationsí specifications. Some examples of rule-based configurations include:
»» Monitoring for keywords or phrases being typed, copied to clipboard, or viewed inside
documents or webpages that could be viewed as a security threat or violation of
organizational policy
»» Process controls allow restricted processes to be automatically terminated 	
while required processes are kept running, providing alerts when process
tampering takes place or malicious processes are launched
»» Network and operating system monitoring for malicious activities being
conducted whether by the user, or a malware process
»» Activity statistics provide detailed metrics on websites and applications
in use as well as the files those applications access, providing data well
beyond the reach of network activity monitoring
»» Specialized Microsoft Office Suite monitoring for sensitive data access,
print control of sensitive content, and shadow copy collection of affected files
»» Microsoft Outlook Email monitoring for sensitive content contained
in body, subject, or within attached files. Optional send controls allow for
automatic blocking, required user justification, or stealth reporting
»» Monitor file access and movement from designated directories, cloud storage,
removable drives, and alert when files are copied to unsecured locations
www.IntelligentID.com
COMPANY INFORMATION:
Founded: 2009
POINT OF CONTACT:
Annie Cute,
Senior Account Executive
250 W. Old Wilson Bridge Rd.
Suite 140
Worthington, OH 43085
p. 1-888-798-7792
MANAGEMENT TEAM:
Jim Mazotas, CEO
Win Worcester, VP Dev
Executive Summary

More Related Content

What's hot

Stop the Evil, Protect the Endpoint
Stop the Evil, Protect the EndpointStop the Evil, Protect the Endpoint
Stop the Evil, Protect the Endpoint
BeyondTrust
 
Whitepaper IBM Guardium Data Activity Monitor
Whitepaper IBM Guardium Data Activity MonitorWhitepaper IBM Guardium Data Activity Monitor
Whitepaper IBM Guardium Data Activity Monitor
Camilo Fandiño Gómez
 
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Microsoft Österreich
 
ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...
ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...
ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...
ZoneFox
 
What is a cybersecurity assessment 20210813
What is a cybersecurity assessment  20210813What is a cybersecurity assessment  20210813
What is a cybersecurity assessment 20210813
Kinetic Potential
 
It security cognic_systems
It security cognic_systemsIt security cognic_systems
It security cognic_systems
Cognic Systems Pvt Ltd
 
Arbel Zinger | Microsoft Advanced Threat Analytics
Arbel Zinger | Microsoft Advanced Threat AnalyticsArbel Zinger | Microsoft Advanced Threat Analytics
Arbel Zinger | Microsoft Advanced Threat Analytics
Microsoft Österreich
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
Shahbaz Khan
 
Een praktische aanpak naar GDPR met Microsoft 365
Een praktische aanpak naar GDPR met Microsoft 365Een praktische aanpak naar GDPR met Microsoft 365
Een praktische aanpak naar GDPR met Microsoft 365
Marketing Team
 
Cloud Security_ Unit 4
Cloud Security_ Unit 4Cloud Security_ Unit 4
Cloud Security_ Unit 4
Integral university, India
 
SecureWorks
SecureWorksSecureWorks
SecureWorks
jduhaime
 
Surelog Detail
Surelog DetailSurelog Detail
Surelog Detail
ANETUSA Software
 
Brochure Imperva Vormetric
Brochure Imperva VormetricBrochure Imperva Vormetric
Brochure Imperva Vormetric
Michelle Guerrero Montalvo
 
Data Security
Data SecurityData Security
Data Security
ankita_kashyap
 
Ciso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data ExposedCiso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data Exposed
Elastica Inc.
 
Chap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseChap5 2007 C I S A Review Course
Chap5 2007 C I S A Review Course
Desmond Devendran
 
information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...
Zara Nawaz
 
Software Security
Software SecuritySoftware Security
Software Security
Integral university, India
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter Most
Precisely
 
information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...
Zara Nawaz
 

What's hot (20)

Stop the Evil, Protect the Endpoint
Stop the Evil, Protect the EndpointStop the Evil, Protect the Endpoint
Stop the Evil, Protect the Endpoint
 
Whitepaper IBM Guardium Data Activity Monitor
Whitepaper IBM Guardium Data Activity MonitorWhitepaper IBM Guardium Data Activity Monitor
Whitepaper IBM Guardium Data Activity Monitor
 
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
 
ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...
ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...
ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...
 
What is a cybersecurity assessment 20210813
What is a cybersecurity assessment  20210813What is a cybersecurity assessment  20210813
What is a cybersecurity assessment 20210813
 
It security cognic_systems
It security cognic_systemsIt security cognic_systems
It security cognic_systems
 
Arbel Zinger | Microsoft Advanced Threat Analytics
Arbel Zinger | Microsoft Advanced Threat AnalyticsArbel Zinger | Microsoft Advanced Threat Analytics
Arbel Zinger | Microsoft Advanced Threat Analytics
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
 
Een praktische aanpak naar GDPR met Microsoft 365
Een praktische aanpak naar GDPR met Microsoft 365Een praktische aanpak naar GDPR met Microsoft 365
Een praktische aanpak naar GDPR met Microsoft 365
 
Cloud Security_ Unit 4
Cloud Security_ Unit 4Cloud Security_ Unit 4
Cloud Security_ Unit 4
 
SecureWorks
SecureWorksSecureWorks
SecureWorks
 
Surelog Detail
Surelog DetailSurelog Detail
Surelog Detail
 
Brochure Imperva Vormetric
Brochure Imperva VormetricBrochure Imperva Vormetric
Brochure Imperva Vormetric
 
Data Security
Data SecurityData Security
Data Security
 
Ciso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data ExposedCiso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data Exposed
 
Chap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseChap5 2007 C I S A Review Course
Chap5 2007 C I S A Review Course
 
information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...
 
Software Security
Software SecuritySoftware Security
Software Security
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter Most
 
information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...
 

Similar to Executive Summary_2016

Search Inform DLP
Search Inform DLPSearch Inform DLP
Search Inform DLP
Sergei Yavchenko
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
karlhennesey
 
Microsoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsMicrosoft Avanced Threat Analytics
Microsoft Avanced Threat Analytics
Adeo Security
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
Drew Madelung
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence System
Joseph Yosi Margalit
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
TranVu383073
 
What are the 6 Most Effective Endpoint Security Solutions?
What are the 6 Most Effective Endpoint Security Solutions?What are the 6 Most Effective Endpoint Security Solutions?
What are the 6 Most Effective Endpoint Security Solutions?
IT AMC Support Dubai - Techno Edge Systems LLC
 
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanMicrosoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
David J Rosenthal
 
Tyler Technology Expo
Tyler Technology ExpoTyler Technology Expo
Tyler Technology Expo
Tony DeGonia (LION)
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
Sridhar Karnam
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
Alan Holyoke
 
GTB Technologies Datasheet 2014
GTB Technologies Datasheet 2014GTB Technologies Datasheet 2014
GTB Technologies Datasheet 2014
Ravindran Vasu
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
Piyush Jain
 
Ibm security guardium
Ibm security guardiumIbm security guardium
Ibm security guardium
CMR WORLD TECH
 
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
Peter Tutty
 
Office 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseOffice 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and Use
TechSoup
 
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP SoftwareExplore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
Konverge Technologies Pvt. Ltd.
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
SPS Paris
 
Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data Leakage
Patty Buckley
 
Wc4
Wc4Wc4

Similar to Executive Summary_2016 (20)

Search Inform DLP
Search Inform DLPSearch Inform DLP
Search Inform DLP
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
 
Microsoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsMicrosoft Avanced Threat Analytics
Microsoft Avanced Threat Analytics
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence System
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 
What are the 6 Most Effective Endpoint Security Solutions?
What are the 6 Most Effective Endpoint Security Solutions?What are the 6 Most Effective Endpoint Security Solutions?
What are the 6 Most Effective Endpoint Security Solutions?
 
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanMicrosoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
 
Tyler Technology Expo
Tyler Technology ExpoTyler Technology Expo
Tyler Technology Expo
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
 
GTB Technologies Datasheet 2014
GTB Technologies Datasheet 2014GTB Technologies Datasheet 2014
GTB Technologies Datasheet 2014
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 
Ibm security guardium
Ibm security guardiumIbm security guardium
Ibm security guardium
 
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
 
Office 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseOffice 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and Use
 
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP SoftwareExplore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data Leakage
 
Wc4
Wc4Wc4
Wc4
 

Executive Summary_2016

  • 1. DL P IDEN TITY ACT IVITY INFRAST RUCTURE Data at Rest Behavioral Keyword Activity File Access Activity System Resource Utilization Web Usage and Activity Application Usage and Activity Application Management Data in Use Data in Motion Intelligent ID is an Endpoint Monitoring and Protection (EMaP) software platform that helps to secure organizations’ business assets by continuously monitoring and alerting management to suspect events taking place on the endpoints themselves. This includes data loss or theft activity, compliance infractions, workplace liability issues, inefficient use of time and resources, infrastructure concerns, insecure file access, and more. Intelligent ID sets itself apart by providing a solution that collects more data from more channels, all with a single lightweight, low-impact endpoint agent. While our competitors require network appliances and additional software installations to complete their endpoint monitoring, Intelligent ID runs independently providing ease of installation and dramatic cost savings. In addition, while most endpoint solutions are highly specialized, providing only one set of data; Intelligent ID provides a holistic view of all data sources on the endpoint. INTELLIGENT ID’S VALUE: »» Endpoint-focused to address events regardless of network connectivity »» Consolidate existing, expensive, and ineffective tools and applications »» Utilize behavioral, productivity, and event analytics to identify suspect activity before it negatively impacts the organization »» Intuitive UI and varied use cases add value for C-level staff, legal, HR, and IT departments »» Measurable and swift return on investment (ROI) »» Integrated compliance policy tracking, investigation tools, and visualizations provide valuable and time-saving information instantly KEY FEATURES OF INTELLIGENT ID: Intelligent IDís monitoring and protection features encompass four main areas; Data Loss Prevention, Identity-Based Events, Activity Statistics, and Infrastructure Management. Within these areas, Intelligent ID incorporates a series of monitoring and protection rules custom-configured to the organizationsí specifications. Some examples of rule-based configurations include: »» Monitoring for keywords or phrases being typed, copied to clipboard, or viewed inside documents or webpages that could be viewed as a security threat or violation of organizational policy »» Process controls allow restricted processes to be automatically terminated while required processes are kept running, providing alerts when process tampering takes place or malicious processes are launched »» Network and operating system monitoring for malicious activities being conducted whether by the user, or a malware process »» Activity statistics provide detailed metrics on websites and applications in use as well as the files those applications access, providing data well beyond the reach of network activity monitoring »» Specialized Microsoft Office Suite monitoring for sensitive data access, print control of sensitive content, and shadow copy collection of affected files »» Microsoft Outlook Email monitoring for sensitive content contained in body, subject, or within attached files. Optional send controls allow for automatic blocking, required user justification, or stealth reporting »» Monitor file access and movement from designated directories, cloud storage, removable drives, and alert when files are copied to unsecured locations www.IntelligentID.com COMPANY INFORMATION: Founded: 2009 POINT OF CONTACT: Annie Cute, Senior Account Executive 250 W. Old Wilson Bridge Rd. Suite 140 Worthington, OH 43085 p. 1-888-798-7792 MANAGEMENT TEAM: Jim Mazotas, CEO Win Worcester, VP Dev Executive Summary