SlideShare a Scribd company logo
1 of 13
Why and how should you
protect your business critical
Data ?
By Data Resolve Technologies




     inDefend Business
     Data Security and monitoring of computers against data theft




                                  www.dataresolve.com
What is business confidential data ?
• Any document of which most of them are in digital format
  including:-
   –   Your customer data in spreadsheets
   –   Business Plans
   –   Contract agreement and partnership documents
   –   Sales and marketing documents
   –   Employee information
   –   Financial documents, projections, budgets etc
   –   IPR including software designs, source codes, semantics, algorithm etc
   –   potentially patentable and business making ideas
   –   Business strategy




                                www.dataresolve.com
Your business data is exposed like never before
•   Usually business confidential data stays un-protected in the business network
    which can be easily accessed by employees in absence of security policies
•   Business data can be easily sent outside the business network using un monitored
    media like
     –   emails via SMTP clients or web based email services
     –   file uploads via web Browsers, FTP and Chat
     –   USB drives, SD-Cards, Smart Phones, CD-DVD access
     –   Internet applications including Browsers, IM Clients, VoIP allow easy sharing and copying of data

•   Latest malwares, Trojans & spyware can steal data and are not detected on the
    system even by any latest tool
•   Unmonitored mobile laptop contains critical business information and data
•   Internet data cards are used to bypass your business firewall everyday without
    being noticed on the gateway
•   Your lost pen drive may become a massive source of data loss and breach


                                            www.dataresolve.com
How to secure your business data without
               losing productivity?
•   Build and implement policies to monitor and control
     –   Emails, Email Attachments
     –   File Uploads on web
     –   USB Storage Devices and CD-DVD activities
     –   Files Copied on USB Storage Devices
     –   Any application which connects to internet

•   Only allow encrypted pen drives and other removable storage devices in the
    network
•   Make sure any laptop going outside the network is secured for any kind of data
    breach attempts
•   Always have BIOS passwords enabled on desktops and laptops
•   Employee mobile devices like tablets and cell-phone should only be allowed to
    copy any business data as per the data security guideline of the company
•   Make regular checks on data security policies and build period endpoint security
    reports
                                           www.dataresolve.com
How we can help ?
•   By controlling and monitoring
     –   Outgoing email attachments and File Uploads
     –   USB and CD-DVD activities
     –   Browsing activities
     –   File transfer over IM/Messaging Clients like Skype
     –   Data copied on personal devices
•   By shadow logging of crucial & suspicious data transfer
     – Shadow Log Email, Email Attachments and File Uploads
•   By blocking internet data cards and allowing selectively
•   By enforcing policies on laptops and desktops both inside and outside your
    network
•   By enforcing the use of only encrypted storage devices
•   By blocking employees to copy information on their personal devices
•   Intelligent analytics and reporting
•   And by allowing you to build comprehensive security policies at par the
    international standard
                                        www.dataresolve.com
Offline Policies and Monitoring
•   Protection is active even if the computer is taken offline from the network
•   In case of roaming laptops, policies are stored locally and always active
•   Network Policies are automatically applied if a laptop connects to unknown Wi-
    Fi/LAN Network or uses a USB dongle for Internet
•   USB Storage Devices and CD/DVDs are always monitored and controlled
•   Device and Internet Usage Statistics are recorded locally and synchronized once
    the computer connects back to the organization’s network
Benefits of having inDefend as your data
                     security suite
 Bring more business by ensuring secure customer data – extremely important for overseas
  clients through our secure seal on your website and documents
 Complete control and reporting of email, web and USB device usage of employees against
  data breach
 Track and control usage of personal emails against data breach
 Increase productivity of employees by restricting access to un-productive websites like social
  networking, gaming and chat sites.
 Keep track of job searches, internal freelancing, espionage and un-authorized information
  sharing by employees
 Minimize chances of malware and spyware spreading inside the network though un
  authorized applications
 Increase availability of internet bandwidth by blocking unwanted chats, voice messengers,
  video streaming, LAN gaming and other malicious applications
 Prevent compromise of sensitive data through accidental loss of USB Drives
 Selectively allow internet data cards and employee owned devices
 Maintain an international security standard on use of your business data
                                       www.dataresolve.com
Why should you choose inDefend ?
• Award winning product – Accolade of Excellence by Zee
  Business
• Built on a scalable architecture, easy to deploy in both small
  and large networks with multiple locations
• Media coverage at multiple sources including Times of India,
  Zee TV etc
• Growing customer base in KPO, BPO, Real Estate, Software
  and Manufacturing firms
• Easy engagement model with free & lite versions for small
  companies




                          www.dataresolve.com
How to start ?
• Install the free version of our product which can be directly
  downloaded from www.dataresolve.com
• View online demo of the application at
   – Free version http://lite.indefend .com
   – Commercial version http://business.indefend.com
• Contact us for an online demo or meeting
• Email us at sales@dataresolve.com or
  call us at +91 84201 94203




                               www.dataresolve.com
How inDefend works ?
   Users                             User try to access the data using
                                     various removal media devices




                                                                           Access to transfer, sharing
                                                                           or copy of information is
      Critical data being sent                                             checked against policies to
      outside using an application                                         allow or deny
      and emails



                                                                         inDefend Protection


Activities logged to the server
and an email alert is sent to
the administrator in case of                          Critical
any malicious activity
                                                      Business Data


                                            www.dataresolve.com
Deployment Diagram for multi city offices
Next Step ?
You can contact us by phone or email to help us schedule a trial installation
and/or detailed product walkthrough for you.


• Email: sales@dataresolve.com
• Phone: +91-84201-94203
• Website: www.dataresolve.com




                               www.dataresolve.com
About Data Resolve
Data Resolve Technologies founded in the year 2008 offers endpoint security products for
blocking and monitoring the use of internet, portable media devices, email, VoIP, chat etc.
to protect your data and privacy from unauthorized access, share and copy

Promoters of the company are experts in their own specific fields of information security
and the company is advised by some of the well known names in the industry including Mr.
Kaustav Ghosh, Mr. Steffen Naumann and Mr. Jens Geitmann.

More details about the company, products, customers, promoters, management, advisors
etc. can be found at www.dataresolve.com
Contact Us

If you would like to speak to us on phone or want to set up a meeting we are available on
the following:-
Data Resolve Technologies Private Ltd      Phone: +91-33-4061-1242/1241
3rd Floor, J2, Jain Link Building,         Email: sales@dataresolve.com
Block EP & GP, Sector – V
Salt Lake City, Kolkata, INDIA
www.dataresolve.com

More Related Content

Recently uploaded

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Recently uploaded (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

inDefend business data security with productivity

  • 1. Why and how should you protect your business critical Data ? By Data Resolve Technologies inDefend Business Data Security and monitoring of computers against data theft www.dataresolve.com
  • 2. What is business confidential data ? • Any document of which most of them are in digital format including:- – Your customer data in spreadsheets – Business Plans – Contract agreement and partnership documents – Sales and marketing documents – Employee information – Financial documents, projections, budgets etc – IPR including software designs, source codes, semantics, algorithm etc – potentially patentable and business making ideas – Business strategy www.dataresolve.com
  • 3. Your business data is exposed like never before • Usually business confidential data stays un-protected in the business network which can be easily accessed by employees in absence of security policies • Business data can be easily sent outside the business network using un monitored media like – emails via SMTP clients or web based email services – file uploads via web Browsers, FTP and Chat – USB drives, SD-Cards, Smart Phones, CD-DVD access – Internet applications including Browsers, IM Clients, VoIP allow easy sharing and copying of data • Latest malwares, Trojans & spyware can steal data and are not detected on the system even by any latest tool • Unmonitored mobile laptop contains critical business information and data • Internet data cards are used to bypass your business firewall everyday without being noticed on the gateway • Your lost pen drive may become a massive source of data loss and breach www.dataresolve.com
  • 4. How to secure your business data without losing productivity? • Build and implement policies to monitor and control – Emails, Email Attachments – File Uploads on web – USB Storage Devices and CD-DVD activities – Files Copied on USB Storage Devices – Any application which connects to internet • Only allow encrypted pen drives and other removable storage devices in the network • Make sure any laptop going outside the network is secured for any kind of data breach attempts • Always have BIOS passwords enabled on desktops and laptops • Employee mobile devices like tablets and cell-phone should only be allowed to copy any business data as per the data security guideline of the company • Make regular checks on data security policies and build period endpoint security reports www.dataresolve.com
  • 5. How we can help ? • By controlling and monitoring – Outgoing email attachments and File Uploads – USB and CD-DVD activities – Browsing activities – File transfer over IM/Messaging Clients like Skype – Data copied on personal devices • By shadow logging of crucial & suspicious data transfer – Shadow Log Email, Email Attachments and File Uploads • By blocking internet data cards and allowing selectively • By enforcing policies on laptops and desktops both inside and outside your network • By enforcing the use of only encrypted storage devices • By blocking employees to copy information on their personal devices • Intelligent analytics and reporting • And by allowing you to build comprehensive security policies at par the international standard www.dataresolve.com
  • 6. Offline Policies and Monitoring • Protection is active even if the computer is taken offline from the network • In case of roaming laptops, policies are stored locally and always active • Network Policies are automatically applied if a laptop connects to unknown Wi- Fi/LAN Network or uses a USB dongle for Internet • USB Storage Devices and CD/DVDs are always monitored and controlled • Device and Internet Usage Statistics are recorded locally and synchronized once the computer connects back to the organization’s network
  • 7. Benefits of having inDefend as your data security suite  Bring more business by ensuring secure customer data – extremely important for overseas clients through our secure seal on your website and documents  Complete control and reporting of email, web and USB device usage of employees against data breach  Track and control usage of personal emails against data breach  Increase productivity of employees by restricting access to un-productive websites like social networking, gaming and chat sites.  Keep track of job searches, internal freelancing, espionage and un-authorized information sharing by employees  Minimize chances of malware and spyware spreading inside the network though un authorized applications  Increase availability of internet bandwidth by blocking unwanted chats, voice messengers, video streaming, LAN gaming and other malicious applications  Prevent compromise of sensitive data through accidental loss of USB Drives  Selectively allow internet data cards and employee owned devices  Maintain an international security standard on use of your business data www.dataresolve.com
  • 8. Why should you choose inDefend ? • Award winning product – Accolade of Excellence by Zee Business • Built on a scalable architecture, easy to deploy in both small and large networks with multiple locations • Media coverage at multiple sources including Times of India, Zee TV etc • Growing customer base in KPO, BPO, Real Estate, Software and Manufacturing firms • Easy engagement model with free & lite versions for small companies www.dataresolve.com
  • 9. How to start ? • Install the free version of our product which can be directly downloaded from www.dataresolve.com • View online demo of the application at – Free version http://lite.indefend .com – Commercial version http://business.indefend.com • Contact us for an online demo or meeting • Email us at sales@dataresolve.com or call us at +91 84201 94203 www.dataresolve.com
  • 10. How inDefend works ? Users User try to access the data using various removal media devices Access to transfer, sharing or copy of information is Critical data being sent checked against policies to outside using an application allow or deny and emails inDefend Protection Activities logged to the server and an email alert is sent to the administrator in case of Critical any malicious activity Business Data www.dataresolve.com
  • 11. Deployment Diagram for multi city offices
  • 12. Next Step ? You can contact us by phone or email to help us schedule a trial installation and/or detailed product walkthrough for you. • Email: sales@dataresolve.com • Phone: +91-84201-94203 • Website: www.dataresolve.com www.dataresolve.com
  • 13. About Data Resolve Data Resolve Technologies founded in the year 2008 offers endpoint security products for blocking and monitoring the use of internet, portable media devices, email, VoIP, chat etc. to protect your data and privacy from unauthorized access, share and copy Promoters of the company are experts in their own specific fields of information security and the company is advised by some of the well known names in the industry including Mr. Kaustav Ghosh, Mr. Steffen Naumann and Mr. Jens Geitmann. More details about the company, products, customers, promoters, management, advisors etc. can be found at www.dataresolve.com Contact Us If you would like to speak to us on phone or want to set up a meeting we are available on the following:- Data Resolve Technologies Private Ltd Phone: +91-33-4061-1242/1241 3rd Floor, J2, Jain Link Building, Email: sales@dataresolve.com Block EP & GP, Sector – V Salt Lake City, Kolkata, INDIA www.dataresolve.com