SlideShare a Scribd company logo
1 of 23
SPHERESHIELD FOR
ZOOM
Compliance & Security
OVERVIEW OF AGAT
SOFTWARE
Skype Teams Webex Slack Zoom RingCentral
PLATFORMS
SPHERESHIELD MAIN CAPABILITES
DATA LOSS PREVENTION
Inspect all content passing
through Zoom Meetings
RECORDING AI
COMPLIANCE ANALYSIS
Audio & video analysis for DLP and
eDiscovery Needs
ARCHIVE & EDISCOVERY
Compliance Archive. Search and
Export Information Easily and
Fast.
ADFS
CONDITIONAL ACCESS
Grant access to only security
policy compliant devices
SPHERESHIELD MAIN CAPABILITES
( c o n t . )
Threat Protection
Anti Virus / Malware / Phishing
Scan of all content before it
reaches end user devices.
ETHICAL WALL*
Control External and Internal
Communications and
Permissions
RISK ENGINE*
Geofencing and User and Entry
Behavior Analytics (UEBA)
*Coming Soon
RECORDING AI
COMPLIANCE
ANALYSIS
RECORDING AND ANALYSIS
eDiscovery
Search
DLP Ethical Wall
Archiving
Validation
Meeting Recording
Audio Video
Files Messages
Zoom
AUDIO
TRANSCRIPT|OCR
• Transcript of all meetings audio
• Converts speech to text in 70+ languages with
automatic language detection
• Speaker enumeration: which speaker spoke which
words and when.
• OCR : Creates a “video transcript” with all recognizable
text on screen for eDiscovery and DLP purposes
MEETING
eDISCOVERY
• Advanced search by text, user, dates and more
• Integrate with existing eDiscovery systems
• Search for personal information and export user data
• See message context of DLP incidents
• Archive data on cloud or on site
• Meet GDPR and compliance requirements
• Make meeting searchable by multiple parameters:
Users, Keywords, Topics, Dates and more.
• Search Messages, Audio and Video (files coming soon)
• Get List of participants
ADVANCED AI AND NLP ANALYTICS
• Named entities (products, countries, etc.)
• Emotion detection: Extract from what's being said and
voice tonality emotions such as joy, sadness, anger, or
fear.
• Sentiments detection – positive / negative
• Automatic video scenes generation
• Labels and Keywords
DLP
INSPECTION
MAIN FEATURES
• Inspect messages, audio and video from meetings (Files coming soon)
• Create Granular policies based on External Traffic/ Users/Groups.
• Notifications to end-user and admin
• Incidents are displayed in SphereShield Admin Portal along with content
and users info. As well as links to eDiscovery
DLP Integration
• Integrates with the major DLP vendors: McAfee, Forcepoint, Symantec,
Fidelis, Google and Digital Guardian
• Send content to existing DLP vendors to meet existing policies. Incidents
will be displayed at the vendor’s incident manager
Coming Soon
• Real-Time Audio DLP – Detect policy violations in real time (only English)
• DLP for chats/channels (in near-real-time)
ACCESS AND SECURITY
• Threat protection – Anti Virus/Malware/Phishing :
Analyze messages and files* on Zoom meetings
conversations. Get notifications and alerts.
• Conditional Access – ensure that users can only log on
from a managed device – e.g Blackberry, MaaS 360,
Airwatch, Citrix
*Coming Soon
ROAD MAP
ETHICAL
WALL*
*Coming Soon
Control who can communicate with
whom
Internal communication between
different groups/users/domains
Federation with external, users/
Guests
Control specific collaboration
options
Control communication
types between users
Including:
IM’s,
file-sharing, Audio/Video/Screen-sharing
ETHICAL
WALL
SAMPLE POLICIES: INTERNAL AND EXTERNAL
MY COMPANY
MY
COMPANY
Group A
Group B Group C
IM
Audio/Video
Files
Allow Policy
…..
Limit Policy
IM
Audio/Video
Files
…..
IM
Audio/Video
Files
Block Policy
…..
Group A
Other Group
Allow Policy
IM
Audio/Video
Files
…..
IM
Audio/Video
Files
Limit Policy
…..
IM
Audio/Video
Files
Block Policy
…..
IM
Audio/Video
Files
Block Policy
…..
Federated
Company A
Federated
Company B
External Policy Using
Ethical Wall
Internal Policy
Using Ethical Wall
FEATURES
• Control communications in Zoom Meetings
• After meeting alerts – To end users and admins via
IM’s/email/logs
• Real-Time Notifications during meeting*
• Auditing and reports for training and awareness
• Works like a firewall – scans policies from top to bottom
*On Road Map
RISK ENGINE
Meet security requirements
GEO FENCING
• Set Geo Fencing rules based on groups, domains or users.
• Allow, block or monitor access from specific countries.
• Get IP of all active users
• Shows map of all active users and detect when sign in is
done from a location / IP that is blocked by geo fencing
policy. Sends message when incident is detected
OPERATION
MODES &
TOPOLOGY
CLOUD TOPOLOGY
SERVICE OFFERING
SaaS - online service
Customers don’t need to install anything.
Each customer will have dedicated servers
A customer installation solution
Customers install SphereShield in their DMZ or
Cloud (e.g. Azure, AWS)
A Free Trial is available
MORE INFO
Visit our website
Contact us
+972-525209860
https://AGATSoftware.com
sales@agatsoftware.com

More Related Content

What's hot

Sphereshield for webex
Sphereshield for webexSphereshield for webex
Sphereshield for webexAGAT2
 
Virtual assistant presentation
Virtual assistant presentationVirtual assistant presentation
Virtual assistant presentationAGAT2
 
AGAT's Virtual Assistant Presentation
AGAT's Virtual Assistant PresentationAGAT's Virtual Assistant Presentation
AGAT's Virtual Assistant PresentationAGAT2
 
Sphere shield for webex presentation 3.1
Sphere shield for webex presentation 3.1Sphere shield for webex presentation 3.1
Sphere shield for webex presentation 3.1AGAT2
 
Multi domain security-management_technical_presentation
Multi domain security-management_technical_presentationMulti domain security-management_technical_presentation
Multi domain security-management_technical_presentationdavebrosnan
 
Technet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager PresentationTechnet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager Presentationjasonlan
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataPrecisely
 
Sophos synchronized security in action @Netpluz CS Event Nov 2017
Sophos synchronized security in action @Netpluz CS Event Nov 2017Sophos synchronized security in action @Netpluz CS Event Nov 2017
Sophos synchronized security in action @Netpluz CS Event Nov 2017Netpluz Asia Pte Ltd
 
Secure calling for IP telephony - webinar 2016, English
Secure calling for IP telephony - webinar 2016, EnglishSecure calling for IP telephony - webinar 2016, English
Secure calling for IP telephony - webinar 2016, EnglishAskozia
 
Sophos Security Day Belgium - The Hidden Gems of Sophos
Sophos Security Day Belgium - The Hidden Gems of SophosSophos Security Day Belgium - The Hidden Gems of Sophos
Sophos Security Day Belgium - The Hidden Gems of SophosSophos Benelux
 
2-05 Virtual Classroom Margaret Smith Cisco.ppt
2-05 Virtual Classroom Margaret Smith Cisco.ppt2-05 Virtual Classroom Margaret Smith Cisco.ppt
2-05 Virtual Classroom Margaret Smith Cisco.pptVideoguy
 
Dragnet overview
Dragnet overviewDragnet overview
Dragnet overviewdragnetNZ
 
How to be a Security Minded Admin by Chris Zullo
How to be a Security Minded Admin by Chris ZulloHow to be a Security Minded Admin by Chris Zullo
How to be a Security Minded Admin by Chris ZulloSalesforce Admins
 
On Demand Software Management
On Demand Software ManagementOn Demand Software Management
On Demand Software Managementshoofster
 
Get an overview of your network and relax with aruba clear pass and device in...
Get an overview of your network and relax with aruba clear pass and device in...Get an overview of your network and relax with aruba clear pass and device in...
Get an overview of your network and relax with aruba clear pass and device in...Xylos
 
Top 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSOTop 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSOSecureAuth
 
Palo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortPalo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortTen Sistemas e Redes
 

What's hot (19)

Sphereshield for webex
Sphereshield for webexSphereshield for webex
Sphereshield for webex
 
Virtual assistant presentation
Virtual assistant presentationVirtual assistant presentation
Virtual assistant presentation
 
AGAT's Virtual Assistant Presentation
AGAT's Virtual Assistant PresentationAGAT's Virtual Assistant Presentation
AGAT's Virtual Assistant Presentation
 
Sphere shield for webex presentation 3.1
Sphere shield for webex presentation 3.1Sphere shield for webex presentation 3.1
Sphere shield for webex presentation 3.1
 
Workspace Technology
Workspace TechnologyWorkspace Technology
Workspace Technology
 
Multi domain security-management_technical_presentation
Multi domain security-management_technical_presentationMulti domain security-management_technical_presentation
Multi domain security-management_technical_presentation
 
Technet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager PresentationTechnet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager Presentation
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 
Sophos synchronized security in action @Netpluz CS Event Nov 2017
Sophos synchronized security in action @Netpluz CS Event Nov 2017Sophos synchronized security in action @Netpluz CS Event Nov 2017
Sophos synchronized security in action @Netpluz CS Event Nov 2017
 
Secure calling for IP telephony - webinar 2016, English
Secure calling for IP telephony - webinar 2016, EnglishSecure calling for IP telephony - webinar 2016, English
Secure calling for IP telephony - webinar 2016, English
 
Sophos Security Day Belgium - The Hidden Gems of Sophos
Sophos Security Day Belgium - The Hidden Gems of SophosSophos Security Day Belgium - The Hidden Gems of Sophos
Sophos Security Day Belgium - The Hidden Gems of Sophos
 
2-05 Virtual Classroom Margaret Smith Cisco.ppt
2-05 Virtual Classroom Margaret Smith Cisco.ppt2-05 Virtual Classroom Margaret Smith Cisco.ppt
2-05 Virtual Classroom Margaret Smith Cisco.ppt
 
Dragnet overview
Dragnet overviewDragnet overview
Dragnet overview
 
Flak+technologies
Flak+technologiesFlak+technologies
Flak+technologies
 
How to be a Security Minded Admin by Chris Zullo
How to be a Security Minded Admin by Chris ZulloHow to be a Security Minded Admin by Chris Zullo
How to be a Security Minded Admin by Chris Zullo
 
On Demand Software Management
On Demand Software ManagementOn Demand Software Management
On Demand Software Management
 
Get an overview of your network and relax with aruba clear pass and device in...
Get an overview of your network and relax with aruba clear pass and device in...Get an overview of your network and relax with aruba clear pass and device in...
Get an overview of your network and relax with aruba clear pass and device in...
 
Top 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSOTop 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSO
 
Palo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortPalo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-short
 

Similar to SphereShield for Zoom - Compliance and Security

SphereShield for MS Teams - Presentation
SphereShield for MS Teams - PresentationSphereShield for MS Teams - Presentation
SphereShield for MS Teams - PresentationAGATSoftware
 
Sphere shield for ms teams compressed 24 2-21
Sphere shield for ms teams compressed 24 2-21Sphere shield for ms teams compressed 24 2-21
Sphere shield for ms teams compressed 24 2-21AGAT2
 
Sphereshield for Webex - Presentation
Sphereshield for Webex - PresentationSphereshield for Webex - Presentation
Sphereshield for Webex - PresentationAGATSoftware
 
SphereShield for Webex Meeting
SphereShield for Webex MeetingSphereShield for Webex Meeting
SphereShield for Webex MeetingAGAT2
 
SphereShield For Skype - Presentation
SphereShield For Skype - PresentationSphereShield For Skype - Presentation
SphereShield For Skype - PresentationAGATSoftware
 
Software Security in the Real World w/Kelsey Hightower
Software Security in the Real World w/Kelsey HightowerSoftware Security in the Real World w/Kelsey Hightower
Software Security in the Real World w/Kelsey HightowerAnchore
 
BlackDuck Suite
BlackDuck SuiteBlackDuck Suite
BlackDuck Suitejeff cheng
 
Kyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epoKyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epoKyle Taylor
 
Employing automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptxEmploying automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptxJeffrey Lam
 
Homeland Product Booklet
Homeland Product BookletHomeland Product Booklet
Homeland Product BookletKenny Elliott
 
Offre revendeurs UC
Offre  revendeurs   UCOffre  revendeurs   UC
Offre revendeurs UCRachid ZINE
 
Microsoft Lync Online Overview - from Atidan - 200 level Presentation
Microsoft Lync Online Overview - from Atidan - 200 level PresentationMicrosoft Lync Online Overview - from Atidan - 200 level Presentation
Microsoft Lync Online Overview - from Atidan - 200 level PresentationDavid J Rosenthal
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...MongoDB
 
Implementing Security on a Large Multi-Tenant Cluster the Right Way
Implementing Security on a Large Multi-Tenant Cluster the Right WayImplementing Security on a Large Multi-Tenant Cluster the Right Way
Implementing Security on a Large Multi-Tenant Cluster the Right WayDataWorks Summit
 
Emma Aubert | Information Protection
Emma Aubert | Information ProtectionEmma Aubert | Information Protection
Emma Aubert | Information ProtectionMicrosoft Österreich
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solutionmatthew.maisel
 

Similar to SphereShield for Zoom - Compliance and Security (20)

SphereShield for MS Teams - Presentation
SphereShield for MS Teams - PresentationSphereShield for MS Teams - Presentation
SphereShield for MS Teams - Presentation
 
Sphere shield for ms teams compressed 24 2-21
Sphere shield for ms teams compressed 24 2-21Sphere shield for ms teams compressed 24 2-21
Sphere shield for ms teams compressed 24 2-21
 
Sphereshield for Webex - Presentation
Sphereshield for Webex - PresentationSphereshield for Webex - Presentation
Sphereshield for Webex - Presentation
 
SphereShield for Webex Meeting
SphereShield for Webex MeetingSphereShield for Webex Meeting
SphereShield for Webex Meeting
 
SphereShield For Skype - Presentation
SphereShield For Skype - PresentationSphereShield For Skype - Presentation
SphereShield For Skype - Presentation
 
Software Security in the Real World w/Kelsey Hightower
Software Security in the Real World w/Kelsey HightowerSoftware Security in the Real World w/Kelsey Hightower
Software Security in the Real World w/Kelsey Hightower
 
BlackDuck Suite
BlackDuck SuiteBlackDuck Suite
BlackDuck Suite
 
DLP and MDM Datasheet
DLP and MDM DatasheetDLP and MDM Datasheet
DLP and MDM Datasheet
 
Core Values Decision Sept
Core Values Decision SeptCore Values Decision Sept
Core Values Decision Sept
 
IT security solutions
IT security solutionsIT security solutions
IT security solutions
 
Kyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epoKyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epo
 
Employing automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptxEmploying automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptx
 
Homeland Product Booklet
Homeland Product BookletHomeland Product Booklet
Homeland Product Booklet
 
Offre revendeurs UC
Offre  revendeurs   UCOffre  revendeurs   UC
Offre revendeurs UC
 
Microsoft Lync Online Overview - from Atidan - 200 level Presentation
Microsoft Lync Online Overview - from Atidan - 200 level PresentationMicrosoft Lync Online Overview - from Atidan - 200 level Presentation
Microsoft Lync Online Overview - from Atidan - 200 level Presentation
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
 
Implementing Security on a Large Multi-Tenant Cluster the Right Way
Implementing Security on a Large Multi-Tenant Cluster the Right WayImplementing Security on a Large Multi-Tenant Cluster the Right Way
Implementing Security on a Large Multi-Tenant Cluster the Right Way
 
Emma Aubert | Information Protection
Emma Aubert | Information ProtectionEmma Aubert | Information Protection
Emma Aubert | Information Protection
 
Cisco SecureX.pdf
Cisco SecureX.pdfCisco SecureX.pdf
Cisco SecureX.pdf
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
 

Recently uploaded

Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 

Recently uploaded (20)

Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 

SphereShield for Zoom - Compliance and Security

  • 2. OVERVIEW OF AGAT SOFTWARE Skype Teams Webex Slack Zoom RingCentral PLATFORMS
  • 3. SPHERESHIELD MAIN CAPABILITES DATA LOSS PREVENTION Inspect all content passing through Zoom Meetings RECORDING AI COMPLIANCE ANALYSIS Audio & video analysis for DLP and eDiscovery Needs ARCHIVE & EDISCOVERY Compliance Archive. Search and Export Information Easily and Fast. ADFS CONDITIONAL ACCESS Grant access to only security policy compliant devices
  • 4. SPHERESHIELD MAIN CAPABILITES ( c o n t . ) Threat Protection Anti Virus / Malware / Phishing Scan of all content before it reaches end user devices. ETHICAL WALL* Control External and Internal Communications and Permissions RISK ENGINE* Geofencing and User and Entry Behavior Analytics (UEBA) *Coming Soon
  • 6. RECORDING AND ANALYSIS eDiscovery Search DLP Ethical Wall Archiving Validation Meeting Recording Audio Video Files Messages Zoom
  • 7. AUDIO TRANSCRIPT|OCR • Transcript of all meetings audio • Converts speech to text in 70+ languages with automatic language detection • Speaker enumeration: which speaker spoke which words and when. • OCR : Creates a “video transcript” with all recognizable text on screen for eDiscovery and DLP purposes
  • 8. MEETING eDISCOVERY • Advanced search by text, user, dates and more • Integrate with existing eDiscovery systems • Search for personal information and export user data • See message context of DLP incidents • Archive data on cloud or on site • Meet GDPR and compliance requirements • Make meeting searchable by multiple parameters: Users, Keywords, Topics, Dates and more. • Search Messages, Audio and Video (files coming soon) • Get List of participants
  • 9. ADVANCED AI AND NLP ANALYTICS • Named entities (products, countries, etc.) • Emotion detection: Extract from what's being said and voice tonality emotions such as joy, sadness, anger, or fear. • Sentiments detection – positive / negative • Automatic video scenes generation • Labels and Keywords
  • 11. MAIN FEATURES • Inspect messages, audio and video from meetings (Files coming soon) • Create Granular policies based on External Traffic/ Users/Groups. • Notifications to end-user and admin • Incidents are displayed in SphereShield Admin Portal along with content and users info. As well as links to eDiscovery DLP Integration • Integrates with the major DLP vendors: McAfee, Forcepoint, Symantec, Fidelis, Google and Digital Guardian • Send content to existing DLP vendors to meet existing policies. Incidents will be displayed at the vendor’s incident manager Coming Soon • Real-Time Audio DLP – Detect policy violations in real time (only English) • DLP for chats/channels (in near-real-time)
  • 12. ACCESS AND SECURITY • Threat protection – Anti Virus/Malware/Phishing : Analyze messages and files* on Zoom meetings conversations. Get notifications and alerts. • Conditional Access – ensure that users can only log on from a managed device – e.g Blackberry, MaaS 360, Airwatch, Citrix *Coming Soon
  • 15. Control who can communicate with whom Internal communication between different groups/users/domains Federation with external, users/ Guests Control specific collaboration options Control communication types between users Including: IM’s, file-sharing, Audio/Video/Screen-sharing ETHICAL WALL
  • 16. SAMPLE POLICIES: INTERNAL AND EXTERNAL MY COMPANY MY COMPANY Group A Group B Group C IM Audio/Video Files Allow Policy ….. Limit Policy IM Audio/Video Files ….. IM Audio/Video Files Block Policy ….. Group A Other Group Allow Policy IM Audio/Video Files ….. IM Audio/Video Files Limit Policy ….. IM Audio/Video Files Block Policy ….. IM Audio/Video Files Block Policy ….. Federated Company A Federated Company B External Policy Using Ethical Wall Internal Policy Using Ethical Wall
  • 17. FEATURES • Control communications in Zoom Meetings • After meeting alerts – To end users and admins via IM’s/email/logs • Real-Time Notifications during meeting* • Auditing and reports for training and awareness • Works like a firewall – scans policies from top to bottom *On Road Map
  • 19. GEO FENCING • Set Geo Fencing rules based on groups, domains or users. • Allow, block or monitor access from specific countries. • Get IP of all active users • Shows map of all active users and detect when sign in is done from a location / IP that is blocked by geo fencing policy. Sends message when incident is detected
  • 22. SERVICE OFFERING SaaS - online service Customers don’t need to install anything. Each customer will have dedicated servers A customer installation solution Customers install SphereShield in their DMZ or Cloud (e.g. Azure, AWS) A Free Trial is available
  • 23. MORE INFO Visit our website Contact us +972-525209860 https://AGATSoftware.com sales@agatsoftware.com