The ultimate software security experience

Government
Health
Oil & Gas
Banking & Finance
Manufacturing
Telecoms

Find and stop advanced attacks to your business.

InfoWatch Traffic Monitor is a centralized solution for preventing confidential data leaks and thus eliminating financial losses.

 
What's new in TM

What's New in TM

Improvements in the new version are aimed primarily at reducing the number of false alarms and at more efficient incident detection.

Key Features

Key Features

InfoWatch Traffic Monitor Enterprise consists of several modules that can be combined to meet a client’s needs.

Architecture

Architecture

InfoWatch Traffic Monitor Enterprise consists of several modules that can be combined to meet a client’s needs.

Integrations

Integrations

Today, companies operate in various working environments, with each business application addressing its own range of tasks and generating huge amounts of data.

InfoWatch Traffic Monitor protects your company from internal threats

The insurance company consultant sends its clients’ lawyers information on outstanding claims. He also informs a competitor about VIP- contracts indicating the size of the insurance premium and the time remaining on current contracts.

InfoWatch Traffic Monitor:
detects any clients’ personally identifiable information or any information for insurance claims and contracts sent to an external email address. The security officer or an authorized person will promptly receive information about the incident.

Technologies used:
interception of outgoing mail, template analyzer, filled forms detection, stamp detection.

A Bank loan consultant negotiates with clients for approval of a loan with “special conditions”. He also messages with the consultant of a competitor bank regarding provision of information about mortgage contracts for a bribe, in order to poach the clients later (by providing more favorable terms and conditions).

InfoWatch Traffic Monitor:
detects this conspiracy by detecting and analyzing the consultant’s personal correspondence via e-mail, instant messaging, Skype, etc. The security officer or an authorized person will promptly receive information about the incident.

Technologies used:
interception of outgoing mail, linguistic analysis.

A corporate account manager is about to resign, and so he copies contacts from the client database and suggests to his clients that they switch to a competitor (his new employer).

InfoWatch Traffic Monitor:
detects the copying of the database and any suspicious correspondence with clients, and also the employee’s intention to resign. The security officer or the authorized person will promptly receive information about the incident.

Technologies used:
detection of information copied to external media, DB uploading detection, monitoring visits to on-line job sites.

 

A tender is announced for the purchase of expensive equipment in a large company. The acquisition manager engages in correspondence with one of the suppliers, negotiating a meeting with him during out of office hours. The majority of all corrupt schemes are simply discussed openly via personal e-mail (@ gmail.com, @ outlook.com, etc.), Skype or instant messaging.

InfoWatch Traffic Monitor:
detects suspicious correspondence via e-mail, instant messaging, Skype, etc.

Technologies used:
text messaging detection, linguistic analysis.

A production engineer at the manufacturing company sends design documents, specifications, plans and calculations for a new project to a personal e-mail address.

InfoWatch Traffic Monitor:
detects any secret documents as part of the network traffic flow, even if the employee sends them as pictures, images, or photos.

Technologies used:
Traffic monitoring, OCR, linguistic analysis.

An employee of a mobile phone shop delivers scans of personal IDs to his accomplice at a bank to carry out fraudulent loan processing.

InfoWatch Traffic Monitor:
detects the sending of personally identifiable information, scanned IDs or completed forms or questionnaires. All this information will be saved in the Forensic Storage database for further investigation of the incident and to provide evidence in court.

Technologies used:
traffic monitoring, passport detection, filled forms detection.

 

A valued employee has become negligent in his work, constantly printing documents, and copying information to removable media.

InfoWatch Traffic Monitor:
detects the employee visiting job search websites, sending out his resume daily, using the company’s infrastructure for private purposes, printing confidential documents, and copying sensitive information and a customer data base onto a USB drive.

Technologies used:
copying to external media detection, DB uploading detection, monitoring visits to on-line job sites, email monitoring, monitoring of printing activity.

The manager of a trading company constantly prints out the company’s price lists, and sends out special prices for projects and tenders to third-party addresses. Competitors always indicate a slightly lower price than that stated by your company, and so constantly win tenders.

InfoWatch Traffic Monitor:
detects printing of confidential data.

Technologies used:
Monitoring document printing, traffic monitoring, linguistic analysis, filled forms detection, stamp detection.

InfoWatch Traffic Monitor Appliance

A hardware and software solution for quick deployment of InfoWatch Traffic Monitor Enterprise to monitor information flows and protect confidential information from leaks and unauthorised access.

The product is designed for medium-sized businesses and branch offices of large corporations. It integrates easily into the organization’s infrastructure without the need for additional software installation or configuration.It is supplied ready for use with the full range of features.

Quick Start DLP

Lorem ipsum

InfoWatch Traffic Monitor Appliance consists of hardware and software elements, optimized to work together for maximum effectiveness. It is a solution that enables clients to avoid the time and costs involved in selecting equipment and installing software.

The hardware element is based on Hewlett-Packard and Fujitsu Technology Solutions servers, and is optimized for operation on company networks with up to 1,000 employees. The use of a dual port network card with bypass mode means that InfoWatch Traffic Monitor can be connected in traffic copy mode, ensuring uninterrupted network operation.

Quick Start DLP

Lorem ipsum

  • Includes all the functionality of InfoWatch Traffic Monitor.
  • Designed for companies with between 400 and 1,000 employees.
  • Recommended for companies in the financial, trade, manufacturing, telecommunications and raw materials sectors.

The product is supplied fully ready to use, with the full range of features. The administrator’s web console enables quick and easy access to the following functions:
product network configuration and customization of system services monitoring;
collection of diagnostic information (system configuration, status, errors, etc.) license management;
product updates, with support mechanism enabling the settings used in the previous version to be restored;
view status of key system parameters.