SlideShare a Scribd company logo
inDefend-Business Integrated Data Privacy Offerings 
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 
www.dataresolve.com
Agenda Insider Threat Challenges Understanding Insider Threats and Trends What 3rd Party Assessment Reported Employee DNA – Data Privacy Standpoint What’s the approach moving forward? Data Resolve Offerings, Architecture & Differentiators About Data Resolve Customer Speaks 
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 
2
Insider Threats Reporting Challenges Are we able to monitor employee behavior before s/he leaks the information? Are we able to assess his / her productivity vis-a-via organization goals? Are we able to enforce strong BYOD controls? Are we getting integrated view of employee activities from multiple service points that doesn’t fall under DLP purview? Are training sessions/ simulations games prevented insider threats? Insider threat is impossible to counter because of the insider’s resources and access permissions? Do business takes responsibility of these challenges? Are we able to catch disgruntled or employee’s/contractors with mal-intent well before? 
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 
3
Let’s Look at What Research Says – Ineffectiveness (Cont.) 
Alarming facts: 
More than 50% of the service provider organisations revealed that insiders who do not work in IT department and consequently do not have privileged access have carried out insider incidents at their organisations. 
As per 89% of the service provider organisations, behavioural motivation to break existing norms is the primary motive that leads to insider threat. 
Audit and review is still the primary source of identification and learning about insider incidents with around 89% service provider organisations and 75% client organisations being alerted about insider incidents at service provider organisations through this method. 
Source: PWC-DSCI Study 
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 
4
Let’s Look at What Research Says – Ineffectiveness (Cont.) 
Source: PWC-DSCI Study 
5
As per 89% of the service provider organisations, behavioural motivation to break existing norms is the primary motive that leads to insider threat. 
Let’s Look at What Research Says – Ineffectiveness 
Source: PWC-DSCI Study 
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 
6
Employee DNA – Data Privacy Standpoint 
Employee Viewpoint: So many data privacy trainings, enablement in progress, now I have one DLP client as well. Don’t you trust me? Am not happy as am tied with so many security control, allow me to breathe. Every-time you ask me to enforce rights on documents that am sharing with externals partners, this is part of my job. 
CISO Viewpoint: As a CXO how do we ensure we monitor, protect this data lifecycle from a single pane of glass, I have so many tools to manage now Difficult to get an integrated view across messengers, chats, social sites, BYOD devices, web services, cloud services, rights management, mobile behaviour analysis and its increasing . .too much on the table. Who did what, how, what went out, why we couldn’t stop it; study says it takes hours to identify this from set of people monitoring alarms from DLP…is it effective? 
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 
7
Our Recommended Approach Build an integrated data privacy control framework that addresses all these challenge's proactively…. 
Approach should tie up all end – points and data movements be it mobile, handheld, end-points, irrespective of where data goes 
Reduce burden on end-users and departments when it comes to there involvement, define boundaries and react 
Empower business heads so they take there own decisions with right information 
Reduce monitoring foot-print from multiple controls to one 
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 
8
Data Resolve Offerings 
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 
9 inDefend Integrated Data Privacy Platform mitigates risks associated with information life-cycle: Platform mitigates risks associated with data movement within and outside organization boundaries Platform covers all end-points – tablets, mobiles, end-point computing devices Integrated security analytics layer provide view on the fly for data moving outside to trusted and untrusted users Provide forensics, investigation support with due-diligence Enforced employee monitoring and behaviour analysis Data Privacy Analytics platform on exiting vendor products. Centralized Cloud Delivery Model Stack covers: Data Leak Prevention Information Rights Management Mobile Workforce Management Employee Behaviour Monitoring Enforced Encryption Employee Forensics Asset Management & Monitoring
Offerings Architecture 
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 
10
Intelligence Factors 
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 
11 
The intelligence of the solution lies in the approach of automatic detection of all the sensitive events generated in the network, and presentation to the administration and top management in the following ways: 
Cyber Intelligence Sensors 
–Social network styled alerts Daily Email Reports * 
–Summary of alerts generated throughout the day Real-time SMS Alerts* 
–SMS Notification sent for the most sensitive activities happening in your network Cyber Intelligence Reports* 
–Advanced insights are provided into your organization’s activities and recommendations are given to improve processes Screenshot Monitoring* 
–Periodic screenshots of end-user’s desktop activities Cyber Seal* 
–Provide departments real-time data violation status
Differentiators Integrated client Stealth supported Less foot-print on machine (Less than 10% run-time memory utilization) Multiple OS support (Windows family, Ubuntu, Linux, Android, IOS) 
Cloud supported Encrypted communication (external storage devices with white-labelled approach + partial disk) Centralized policy roll-out Offline support Integrated architecture enforces real-time blocking across data life-cycle that is missing in disparate vendor approach Customized Reporting (This integrates with your organization business processes and a customized approach that no one delivers) Integrated dashboard for advanced analytics DLP Analytics (Reduced cost to manage data privacy operations) 
Enforced external drive encryption (external storage devices with white-labelled approach + partial disk) Enforced rights management (on the fly enforced options on edit, print, forward, up-load, wipe out, print-screen options) Employee Forensics Employee monitoring and productivity analysis Focus on Co-creation Advanced mobile workforce management module 
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 
End - Point 
Architecture 
Reporting 
Advanced Features 
12
About Us 
Incubated in IIT Kharagpur Focused on addressing data theft, data loss with security analytics from on-premise and cloud platform, product christened as “inDefend” targeted for Enterprise, SMB and End-Consumers TIE, Kolkata selected the company as best emerging IT Company from West Bengal 
70+ enterprise customers 50000+ retail product downloads Customers in 15+ industry segments 6 million+ work hours analyzed 1000+ alerts generated daily 
CEO & Founding Team Member 
Alma-Mater –IIM-Kolkata 
CTO & Founding Team Member Alma-Mater –IIT-Kharagpur 
Strategic Alliance Lead & Founding 
Team Member Alma-Mater 
–IIT-Kharagpur 
Client Relationship Lead & Founding Team Member Alma-Mater – 
IIT-Kharagpur 
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 
Leadership Team 
Our Awards 
13
Customer Speaks 
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 
14 
"Easier for IT to track and stop unprofessional activity of the users. Support is excellent.“ - IT Manager, Mid-sized ITeS company, Kolkata "Indefend is exceptional from any other product available in the globe, i have tested many security software but the features as mentioned in those software's does not meet when it comes to practical testing. Indefend meets all the features as mentioned and works perfectly. The technical support is prompt and very responsive.” - Senior IT Administrator, Mid-sized ITeS company, Kolkata "In-defend Enterprise has been the best experience I've ever had in solving issues of Data Security. Ive tried many other products but in-defend gave me the best solution. Also the constant upgrade of its features and it excellent customer support team gives me much confidence in Data Resolve Technologies and shows how competent they are in delivering their goals.“ - IT Operations Manager, Petroleum Engineering company, Nigeria 
Client Testimonials 
70+ enterprise customers 
13 countries covered 
Customers in 15+ industry segments 
6 million+ work hours analyzed 
1000+ alerts generated daily
Thank You!! 
Our Award Winning Product 
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 
Website www.dataresolve.com www.indefend.com Demo https://cloud.indefend.com/ Email marketing@dataresolve.com

More Related Content

What's hot

It Capabilities.2009
It Capabilities.2009It Capabilities.2009
It Capabilities.2009
Diontealley
 
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
Customer Spotlight:Deploying a Data Protection Program in less than 120 DaysCustomer Spotlight:Deploying a Data Protection Program in less than 120 Days
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
Digital Guardian
 
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
DFLABS SRL
 
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear LLC
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
Troy C. Fulton
 
Automated Decision Making Comes to Age
Automated Decision Making Comes to AgeAutomated Decision Making Comes to Age
Automated Decision Making Comes to Age
Computer Aid, Inc
 
DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013
DFLABS SRL
 
P r o t e c t i n g y o u r b u s i n e s s
P r o t e c t i n g y o u r b u s i n e s sP r o t e c t i n g y o u r b u s i n e s s
P r o t e c t i n g y o u r b u s i n e s s
matele41
 
IT Asset Management by Miradore
IT Asset Management by MiradoreIT Asset Management by Miradore
IT Asset Management by Miradore
Miradore
 
It implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-briefIt implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-brief
Visal Thach
 
IT Asset Management System for UL-Software Engineering
IT Asset Management System for UL-Software EngineeringIT Asset Management System for UL-Software Engineering
IT Asset Management System for UL-Software Engineering
Shiv Koppad
 
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data CenterIDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
Sunbird DCIM
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
jpmccormack
 
An Adaptive Priority Approach for Effective Problem Resolution in ITSM
An Adaptive Priority Approach for Effective Problem Resolution in ITSMAn Adaptive Priority Approach for Effective Problem Resolution in ITSM
An Adaptive Priority Approach for Effective Problem Resolution in ITSM
Prodapt Solutions
 
IT Asset management presentation
IT Asset management presentationIT Asset management presentation
IT Asset management presentation
Ashita Mehra
 
MSP Sales Tactics | How to Create Effective Marketing Messages
MSP Sales Tactics | How to Create Effective Marketing MessagesMSP Sales Tactics | How to Create Effective Marketing Messages
MSP Sales Tactics | How to Create Effective Marketing Messages
David Castro
 
Trillium Software Building the Business Case for Data Quality
Trillium Software Building the Business Case for Data QualityTrillium Software Building the Business Case for Data Quality
Trillium Software Building the Business Case for Data Quality
Trillium Software
 
20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan
Sharath Kumar
 
IT ASSET MANAGEMENT
IT ASSET MANAGEMENTIT ASSET MANAGEMENT
IT ASSET MANAGEMENT
Habeeb Abdul Kader
 
Og Disparate It Mgmt Tool Impact Report
Og Disparate It Mgmt Tool Impact ReportOg Disparate It Mgmt Tool Impact Report
Og Disparate It Mgmt Tool Impact Report
GuardEra Access Solutions, Inc.
 

What's hot (20)

It Capabilities.2009
It Capabilities.2009It Capabilities.2009
It Capabilities.2009
 
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
Customer Spotlight:Deploying a Data Protection Program in less than 120 DaysCustomer Spotlight:Deploying a Data Protection Program in less than 120 Days
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
 
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
 
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and Trends
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
 
Automated Decision Making Comes to Age
Automated Decision Making Comes to AgeAutomated Decision Making Comes to Age
Automated Decision Making Comes to Age
 
DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013
 
P r o t e c t i n g y o u r b u s i n e s s
P r o t e c t i n g y o u r b u s i n e s sP r o t e c t i n g y o u r b u s i n e s s
P r o t e c t i n g y o u r b u s i n e s s
 
IT Asset Management by Miradore
IT Asset Management by MiradoreIT Asset Management by Miradore
IT Asset Management by Miradore
 
It implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-briefIt implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-brief
 
IT Asset Management System for UL-Software Engineering
IT Asset Management System for UL-Software EngineeringIT Asset Management System for UL-Software Engineering
IT Asset Management System for UL-Software Engineering
 
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data CenterIDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
An Adaptive Priority Approach for Effective Problem Resolution in ITSM
An Adaptive Priority Approach for Effective Problem Resolution in ITSMAn Adaptive Priority Approach for Effective Problem Resolution in ITSM
An Adaptive Priority Approach for Effective Problem Resolution in ITSM
 
IT Asset management presentation
IT Asset management presentationIT Asset management presentation
IT Asset management presentation
 
MSP Sales Tactics | How to Create Effective Marketing Messages
MSP Sales Tactics | How to Create Effective Marketing MessagesMSP Sales Tactics | How to Create Effective Marketing Messages
MSP Sales Tactics | How to Create Effective Marketing Messages
 
Trillium Software Building the Business Case for Data Quality
Trillium Software Building the Business Case for Data QualityTrillium Software Building the Business Case for Data Quality
Trillium Software Building the Business Case for Data Quality
 
20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan
 
IT ASSET MANAGEMENT
IT ASSET MANAGEMENTIT ASSET MANAGEMENT
IT ASSET MANAGEMENT
 
Og Disparate It Mgmt Tool Impact Report
Og Disparate It Mgmt Tool Impact ReportOg Disparate It Mgmt Tool Impact Report
Og Disparate It Mgmt Tool Impact Report
 

Similar to InDefend-Integrated Data Privacy Offerings

Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
Priyanka Aash
 
Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10
Core Security Technologies
 
Enterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftEnterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoft
Appsian
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
MapR Technologies
 
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
infoLock Technologies
 
Secure Iowa Oct 2016
Secure Iowa Oct 2016Secure Iowa Oct 2016
Secure Iowa Oct 2016
Larry Slobodzian
 
Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution
Priyanka Aash
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
Reza Kopaee
 
Chris Reed Sigma PDF
Chris Reed Sigma PDFChris Reed Sigma PDF
Chris Reed Sigma PDF
Christopher Reed
 
Eng Solutions - Capability Statement-Latest
Eng Solutions - Capability Statement-LatestEng Solutions - Capability Statement-Latest
Eng Solutions - Capability Statement-Latest
Hank Eng, CISSP, CISA, CISM
 
InsiderAttack_p3.ppt
InsiderAttack_p3.pptInsiderAttack_p3.ppt
InsiderAttack_p3.ppt
VaishnavGhadge1
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
IBM Security
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analytics
CA Technologies
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
Jessica Santamaria
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
Jessica Santamaria
 
Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...
Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...
Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...
Stratio
 
Data protection services lifecycle approach to critical information protection
Data protection services  lifecycle approach to critical information protectionData protection services  lifecycle approach to critical information protection
Data protection services lifecycle approach to critical information protection
Aujas Networks Pvt. Ltd.
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!
Net at Work
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
Global Business Events - the Heart of your Network.
 
Dlp Methodology
Dlp MethodologyDlp Methodology
Dlp Methodology
tbeckwith
 

Similar to InDefend-Integrated Data Privacy Offerings (20)

Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10
 
Enterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftEnterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoft
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
 
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
 
Secure Iowa Oct 2016
Secure Iowa Oct 2016Secure Iowa Oct 2016
Secure Iowa Oct 2016
 
Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Chris Reed Sigma PDF
Chris Reed Sigma PDFChris Reed Sigma PDF
Chris Reed Sigma PDF
 
Eng Solutions - Capability Statement-Latest
Eng Solutions - Capability Statement-LatestEng Solutions - Capability Statement-Latest
Eng Solutions - Capability Statement-Latest
 
InsiderAttack_p3.ppt
InsiderAttack_p3.pptInsiderAttack_p3.ppt
InsiderAttack_p3.ppt
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analytics
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
 
Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...
Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...
Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...
 
Data protection services lifecycle approach to critical information protection
Data protection services  lifecycle approach to critical information protectionData protection services  lifecycle approach to critical information protection
Data protection services lifecycle approach to critical information protection
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
Dlp Methodology
Dlp MethodologyDlp Methodology
Dlp Methodology
 

Recently uploaded

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 

Recently uploaded (20)

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 

InDefend-Integrated Data Privacy Offerings

  • 1. inDefend-Business Integrated Data Privacy Offerings Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM www.dataresolve.com
  • 2. Agenda Insider Threat Challenges Understanding Insider Threats and Trends What 3rd Party Assessment Reported Employee DNA – Data Privacy Standpoint What’s the approach moving forward? Data Resolve Offerings, Architecture & Differentiators About Data Resolve Customer Speaks Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 2
  • 3. Insider Threats Reporting Challenges Are we able to monitor employee behavior before s/he leaks the information? Are we able to assess his / her productivity vis-a-via organization goals? Are we able to enforce strong BYOD controls? Are we getting integrated view of employee activities from multiple service points that doesn’t fall under DLP purview? Are training sessions/ simulations games prevented insider threats? Insider threat is impossible to counter because of the insider’s resources and access permissions? Do business takes responsibility of these challenges? Are we able to catch disgruntled or employee’s/contractors with mal-intent well before? Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 3
  • 4. Let’s Look at What Research Says – Ineffectiveness (Cont.) Alarming facts: More than 50% of the service provider organisations revealed that insiders who do not work in IT department and consequently do not have privileged access have carried out insider incidents at their organisations. As per 89% of the service provider organisations, behavioural motivation to break existing norms is the primary motive that leads to insider threat. Audit and review is still the primary source of identification and learning about insider incidents with around 89% service provider organisations and 75% client organisations being alerted about insider incidents at service provider organisations through this method. Source: PWC-DSCI Study Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 4
  • 5. Let’s Look at What Research Says – Ineffectiveness (Cont.) Source: PWC-DSCI Study 5
  • 6. As per 89% of the service provider organisations, behavioural motivation to break existing norms is the primary motive that leads to insider threat. Let’s Look at What Research Says – Ineffectiveness Source: PWC-DSCI Study Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 6
  • 7. Employee DNA – Data Privacy Standpoint Employee Viewpoint: So many data privacy trainings, enablement in progress, now I have one DLP client as well. Don’t you trust me? Am not happy as am tied with so many security control, allow me to breathe. Every-time you ask me to enforce rights on documents that am sharing with externals partners, this is part of my job. CISO Viewpoint: As a CXO how do we ensure we monitor, protect this data lifecycle from a single pane of glass, I have so many tools to manage now Difficult to get an integrated view across messengers, chats, social sites, BYOD devices, web services, cloud services, rights management, mobile behaviour analysis and its increasing . .too much on the table. Who did what, how, what went out, why we couldn’t stop it; study says it takes hours to identify this from set of people monitoring alarms from DLP…is it effective? Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 7
  • 8. Our Recommended Approach Build an integrated data privacy control framework that addresses all these challenge's proactively…. Approach should tie up all end – points and data movements be it mobile, handheld, end-points, irrespective of where data goes Reduce burden on end-users and departments when it comes to there involvement, define boundaries and react Empower business heads so they take there own decisions with right information Reduce monitoring foot-print from multiple controls to one Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 8
  • 9. Data Resolve Offerings Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 9 inDefend Integrated Data Privacy Platform mitigates risks associated with information life-cycle: Platform mitigates risks associated with data movement within and outside organization boundaries Platform covers all end-points – tablets, mobiles, end-point computing devices Integrated security analytics layer provide view on the fly for data moving outside to trusted and untrusted users Provide forensics, investigation support with due-diligence Enforced employee monitoring and behaviour analysis Data Privacy Analytics platform on exiting vendor products. Centralized Cloud Delivery Model Stack covers: Data Leak Prevention Information Rights Management Mobile Workforce Management Employee Behaviour Monitoring Enforced Encryption Employee Forensics Asset Management & Monitoring
  • 10. Offerings Architecture Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 10
  • 11. Intelligence Factors Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 11 The intelligence of the solution lies in the approach of automatic detection of all the sensitive events generated in the network, and presentation to the administration and top management in the following ways: Cyber Intelligence Sensors –Social network styled alerts Daily Email Reports * –Summary of alerts generated throughout the day Real-time SMS Alerts* –SMS Notification sent for the most sensitive activities happening in your network Cyber Intelligence Reports* –Advanced insights are provided into your organization’s activities and recommendations are given to improve processes Screenshot Monitoring* –Periodic screenshots of end-user’s desktop activities Cyber Seal* –Provide departments real-time data violation status
  • 12. Differentiators Integrated client Stealth supported Less foot-print on machine (Less than 10% run-time memory utilization) Multiple OS support (Windows family, Ubuntu, Linux, Android, IOS) Cloud supported Encrypted communication (external storage devices with white-labelled approach + partial disk) Centralized policy roll-out Offline support Integrated architecture enforces real-time blocking across data life-cycle that is missing in disparate vendor approach Customized Reporting (This integrates with your organization business processes and a customized approach that no one delivers) Integrated dashboard for advanced analytics DLP Analytics (Reduced cost to manage data privacy operations) Enforced external drive encryption (external storage devices with white-labelled approach + partial disk) Enforced rights management (on the fly enforced options on edit, print, forward, up-load, wipe out, print-screen options) Employee Forensics Employee monitoring and productivity analysis Focus on Co-creation Advanced mobile workforce management module Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM End - Point Architecture Reporting Advanced Features 12
  • 13. About Us Incubated in IIT Kharagpur Focused on addressing data theft, data loss with security analytics from on-premise and cloud platform, product christened as “inDefend” targeted for Enterprise, SMB and End-Consumers TIE, Kolkata selected the company as best emerging IT Company from West Bengal 70+ enterprise customers 50000+ retail product downloads Customers in 15+ industry segments 6 million+ work hours analyzed 1000+ alerts generated daily CEO & Founding Team Member Alma-Mater –IIM-Kolkata CTO & Founding Team Member Alma-Mater –IIT-Kharagpur Strategic Alliance Lead & Founding Team Member Alma-Mater –IIT-Kharagpur Client Relationship Lead & Founding Team Member Alma-Mater – IIT-Kharagpur Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM Leadership Team Our Awards 13
  • 14. Customer Speaks Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 14 "Easier for IT to track and stop unprofessional activity of the users. Support is excellent.“ - IT Manager, Mid-sized ITeS company, Kolkata "Indefend is exceptional from any other product available in the globe, i have tested many security software but the features as mentioned in those software's does not meet when it comes to practical testing. Indefend meets all the features as mentioned and works perfectly. The technical support is prompt and very responsive.” - Senior IT Administrator, Mid-sized ITeS company, Kolkata "In-defend Enterprise has been the best experience I've ever had in solving issues of Data Security. Ive tried many other products but in-defend gave me the best solution. Also the constant upgrade of its features and it excellent customer support team gives me much confidence in Data Resolve Technologies and shows how competent they are in delivering their goals.“ - IT Operations Manager, Petroleum Engineering company, Nigeria Client Testimonials 70+ enterprise customers 13 countries covered Customers in 15+ industry segments 6 million+ work hours analyzed 1000+ alerts generated daily
  • 15. Thank You!! Our Award Winning Product Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM Website www.dataresolve.com www.indefend.com Demo https://cloud.indefend.com/ Email marketing@dataresolve.com