INFOWATCH GROUPInformation security and servicesThings happen. We make sure you are in control
Patented innovations in advanced analytics and corporate data protection that help businesses tackle cybersecurity risks
2000+ successful projects in 20 industries
Technological advancement in the Enterprise Data Loss Prevention
repeatedly recognized by Gartner
Operating in 20 countries, including Russia, CIS, Middle East
and Southeast Asia regions
Providing best‑of‑breed information security solutions for 15+ years
INFOWATCH : FACTS AND FIGURES
2
Advanced analytics and protection of corporate data
InfoWatch Traffic Monitor
InfoWatch Vision
InfoWatch Person Monitor
InfoWatch EndPoint Security
Industrial cybersecurity and protection of IIoT
InfoWatch ARMA
Active protection for web applications against all types of external attacks
InfoWatch Attack Killer
Detection of vulnerabilities in the source code of applications
InfoWatch Appercut
Consulting, Implementation and Education Centers
Experts from InfoWatch Consulting, implementation engineers
and InfoWatch Academy trainers are always available to assist
with comprehensive security audit, cyberstrategy and program
planning, remediation and employee training
INFOWATCH SOLUTIONS AND SERVICES
3
PROTECTION OF CORPORATE DATA AND INFORMATION FLOW CONTROL
InfoWatch Traffic Monitor is designed for security officers to control the information
flows and prevent unauthorized use of information.
2263 — NUMBER OF LEAKS IN 2018
20% MORE “MEGA LEAKS” THAN IN 2017*
Tasks addressed
Reduce the company’s financial, reputational, and legal risks
caused by leaks and mitigation of their results
Prevent the data loss without slowing down business processes:
the solution may restrict sending sensitive information via e‑mail,
online services, social media, copying to USB drives, etc.
Understand the context of internal communications through
classification and categorization of corporate data
Control employees’ operations in business apps, preventing retrieval
of confidential data in digital or printed form
Collect evidence for incidents investigation
4
Benefits
High performance when supporting organizations with 300,000
employees or more
Ready-to-use industry solutions based on the specifics of business
processes in financial organizations, telecommunications
and insurance companies, public agencies, energy companies, etc.
Forensic Storage — unlike competitors, Traffic Monitor keeps all
the workflow and data movements within a company, not just
incidents. It means that even if an incident was missed, an
administrator can still look back and provide investigation.
Modular structure: users pay only for the features
they need
*According to InfoWatch Analytics Center, 2019Mega leaks refer to the breach of over 10 mln records
5
DATA-FLOW ANALYSIS
InfoWatch Vision is a visual analytics tool that boosts the efficiency and expands the uses of InfoWatch Traffic Monitor DLP system.
>$600K — AVERAGE COST PER INSIDER INCIDENT
$3.8M — AVERAGE ANNUALIZED COST OF EMPLOYEE OR CONTRACTOR NEGLIGENCE*
Tasks addressed
Generate instant reports by any point of view
and quickly switch between graph types while
maintaining the focus of your search to verify
hypotheses and gauge your information
security in real time
Keep and enrich digital profiles
and communication graphs
Uncover anomalies in data flows, staff
interactions and communications
*According to Ponemon Institute, 2018
6
Be in control of the “gray zone”:
Check whether your information security policies are consistent
with your business processes
Search for connections between seemingly unrelated facts
and recreate the chain of events
Pinpoint clandestine scenarios and suspicious patterns
Benefits
7
EMPLOYEE MONITORING
InfoWatch Person Monitor is a system for continuous monitoring of regular and privileged
users to identify inefficient and dangerous activity.
63% OF DATA LEAKS ARE CAUSED BY EMPLOYEES AND CONTRACTORS
ALMOST 90% OF DATA LEAKS ARE INTENTIONAL*
Tasks addressed
Track each wrongdoer’s action in the course of an incident
Call malicious workers to account by providing compelling evidence
for incident investigations
Monitor and control actions of privileged users
*According to InfoWatch Analytics Center, 2019
8
Benefits
Simple graphical reports with comprehensive
information about the actions
of specific employees
Legitimately obtained evidence helps not to leave
a violator unpunished
Mitigates reputational and financial risks by recognizing collusions
and disloyal employees
9
INFORMATION TECHNOLOGY
INFRASTRUCTURE INTEGRIT Y
InfoWatch EndPoint Security is a continuous monitoring and protection system allowing the corporate data
remain encrypted and keep company’s information technology infrastructure healthy.
6 MILLION SECURIT Y PINS OF VERIZON CUSTOMERS WERE INADVERTENTLY
MADE PUBLIC ON A CLOUD SERVER
198 MILLION RECORDS ON AMERICAN VOTERS WERE FOUND STORED ON AN OPEN CLOUD
SERVER OWNED BY A DATA ANALY TICS FIRM*
*According to UpGuard
10
Tasks addressed
Protect the IT infrastructure by managing access to critical information
and preventing data transfer outside the security perimeter
Prevent loss of confidential information by encrypting all data
Track the license usage to save money on, if the licensed software
is hardly ever used or not used at all
Benefits
Encryption of files on devices and in the cloud: prevents loss
of confidential data and decreases financial risks
Monitoring the integrity of the IT infrastructure: limits the unauthorized use of software and the use
of company assets for personal gain
Reduced expenses: you see the big picture of how
the company’s IT assets are used, and save
on purchasing software and hardware,
and on inefficient staff
11
PROTECTION OF WEB
APPLICATIONS
InfoWatch Attack Killer is a unique solution for continuous proactive protection of web resources
against hacker attacks.
90% OF WEB SITES ARE EXPOSED TO CYBERAT TACKS WITH MODERATE
OR HIGH VULNERABILIT Y RISKS
Tasks addressed
Continuous availability of resources: automatically detect
and prevent massive and combined DDoS attacks
Data integrity and confidentiality: prevent hacker attacks targeting
web applications and identify vulnerabilities in the web infrastructure
Secure application updates: automate program source code quality
control to ensure compliance with requirements for safe software
development
12
Custom Code Scanner (CCS)
Identifying source code errors in line with the secure
programming requirements of PCI DSS, OWASP,
and platform vendors
Supporting all the most popular programming languages
(Java, PHP, JavaScript, C#, etc.)
Benefits
Simple solution: end‑to‑end integration of various security tools
into a single interface makes the system convenient to operate
and facilitates user training
Efficient protection: artificial intelligence of the core
and use of machine learning in operations of InfoWatch
Attack Killer’s functional components reduce the probability
of successful attacks almost to zero
Secured life cycle of the application: a special source code
scanner ensures security of the whole business application
development and use cycle
Web Application Firewall (WAF)
Bringing together app vulnerability detection and active
protection against hacking
Self‑learning algorithms automatically adapting to changes
in web resources
No need for manual re‑configuration after each update
Identifying multi‑step attacks based on a variety
of security events
Anti-DDoS
Automatic protection immediately responds to dangerous
anomalies
Protecting even extremely high‑load web projects against
DDoS attacks of any intensity
Isolating parasitic traffic at the filtering node level, so that
the site gets cleared traffic
13
SOURCE CODE ANALYSIS
InfoWatch Appercut is an automated business application source code control system
to ensure compliance with requirements for safe software development.
90% OF COMPANIES FINE-TUNE THEIR BUSINESS APPS EITHER WITH THEIR FTE
PROGRAMMERS OR OUTSOURCED TEAMS
75% OF NEW AT TACKS OCCUR AT BUSINESS APPS L AYER , BUT THE MARKET
OFFERS SOLUTIONS TO ADDRESS INSECURE CODETHREATS
10× CODE ERROR CORRECTION IS 10 TIMES LESS EXPENSIVE AT THE SOFT WARE
DEVELOPMENT STAGE THAN WHEN ACCEPTING A FINISHED PRODUCT*
*According to Gartner Research
14
Tasks addressed
Control the quality of the code and find vulnerabilities as early
as at the programming stage
Automatically create reports about identified vulnerabilities and generate
tasks for programmers
Ensure safe deployment and update of software
Benefits
Business-process continuity: eliminates labor‑intensive
and time‑consuming manual code control or external auditing
Adaptability: integrable into any stage of software
development lifecycle between programming
and acceptance by the customer
Scalability: supports over 20 programming languages
Embedded standards: InfoWatch Appercut database
contains requirements of PCI DSS standards,
CERT, OWASP and CWE best practices, SDLC
recommendations, as well as recom
15
INDUSTRIAL CYBERSECURIT Y AND PROTECTION OF IIOT
InfoWatch ARMA Industrial Firewall is a specialized software and hardware appliance designed to protect the industrial control systems and adapted to use in technological networks.
50% INCREASE IN THE NUMBER OF IDENTIFIED SCADA SYSTEM VULNERABILITIES IN H1 2018*
48% OF INDUSTRIAL ENTERPRISES WERE AT TACKED IN 2018**
Tasks addressed
Isolated environment and secure infrastructure
creation
Advanced Persistent Threat (APT) detection
and protection
Intrusions and technological process
anomalies identification
16
Benefits
A single dashboard that enables you to control
the level of information security in technological
networks
Works not only in the monitoring mode, but also
prevents attacks on SCADA and PLC
High Availability: Active / Passive cluster, Bypass mode
*According to TrendMicro, compared to H1 2017**According to Kaspersky Lab
17
INFORMATION SECURIT Y CONSULTING SERVICES
InfoWatch Consulting services are aimed to help organizations excel at building
a robust information security strategy. InfoWatch conducts information security
audit in the company, develops and implements corporate data protection processes, and builds
a strategy for the improvement of information security in the organization.
ONLY 22% OF ORGANIZATIONS MEASURE THE EFFICIENCY
OF THE IMPLEMENTED INFORMATION SECURIT Y TOOLS
Services included
Classification and categorization of corporate data
Development of the sensitive data processing lifecycle, as well
as ensuring its legitimacy
Adjustment of DLP system settings based on audit results, as well
as building an incident detection and response process
Formulation of key metrics of system performance and methods
of measuring them
18
Development of the concept of improving protection against data leaks
in accordance with the overall business strategy of the organization
Benefits
High efficiency of the data loss prevention system at the very start
thanks to fine‑tuning during a proof‑of‑concept project
Full transparency of information flows in the organization
Legitimacy of the use of data loss prevention system
Robustness due to the alignment of processes in a single
system for ensuring information security
Measurability of the information security quality
High-performance team with 15 years of hands‑on
experience in the market and understanding
of the specifics of the development
and implementation of security systems
*According to Crowd Research Partners
19
InfoWatch Academy offers corporate education programs to the private sector companies
and government organizations on cybersecurity.
What we offer
Academic programs and workshops to develop skills in information security
InfoWatch DLP product training
Development of educational materials
Cybersecurity training labs equipped with InfoWatch
software
Primary audience
Managers and government: to get knowledge of digital technology
to lead change to the future
Professionals: to develop comprehensive digital skills for quick
adoption at the workplace
Students: to get skills which are in high demand within the labor market,
hands‑on experience
CYBERSECURIT Y SKILLS DEVELOPMENT AND TRAINING
20
ALL-IN-ONE SOLUTION
Takes into consideration business and industry specifics, provides fine‑tuned policies
and content filtering databases
Protects critical information, know‑how and latest inventions, financial data
Detects disloyal employees, plots, fraud, and corruption schemes
Decreases reputation risks caused by possible data leaks to social networks
Prevents cyber attacks on websites and critical infrastructure of the company
SHORT LIST OF CUSTOMERS
FINANCE AND BANKING ENERGY AND POWER
TELECOMMUNICATIONS GOVERNMENT
Federal Tax Service of Russia
Federal Customs Service of Russia
The Moscow Arbitration Court
Russian Ministry of Emergency
SituationsMANUFACTURING
22
CONTACT US
HeadquartersVereyskaya Plaza III, Vereyskaya str. 29, bld. 33
121357, Moscow, Russia
+7 495 22 900 22, +7 499 37 251 74
InfoWatch GulfUnit 364, DMCC Business Centre, Level 1
Jewellery & Gemplex 3, Dubai, UAE
InfoWatch SDN BHDLevel 33, Ilham Tower, No. 8, Jalan Binjai
50450 Kuala Lumpur, Malaysia
+603 2117 5177, +603 2117 5178
infowatch.com
Top Related