010-68421378
sales@cogitosoft.com
Categories
AddFlow  AmCharts JavaScript Stock Chart AmCharts 4: Charts Aspose.Total for Java Altova SchemaAgent Altova DatabaseSpy Altova MobileTogether Altova UModel  Altova MapForce Altova StyleVision Server Altova MapForce Server Altova Authentic Aspose.Total for .NET Altova RaptorXML Server ComponentOne Ultimate Chart FX for SharePoint Chart FX CodeCharge Studio ComponentOne Enterprise combit Report Server Combit List & Label 22 Controls for Visual C++ MFC Chart Pro for Visual C ++ MFC DbVisualizer version 12.1 DemoCharge DXperience Subscription .NET DevExpress Universal Subscription Essential Studio for ASP.NET MVC FusionCharts Suite XT FusionCharts for Flex  FusionExport V2.0 GrapeCity TX Text Control .NET for WPF GrapeCity Spread Studio Highcharts Gantt Highcharts 10.0 版 HelpNDoc Infragistics Ultimate  ImageKit9 ActiveX ImageKit.NET JetBrains--Fleet JetBrains-DataSpell JetBrains--DataGrip jQuery EasyUI jChart FX Plus Nevron Vision for .NET OPC DA .NET Server Toolkit  OSS ASN.1/C Oxygen XML Author  OSS 4G NAS/C, C++ Encoder Decoder Library OSS ASN.1 Tools for C with 4G S1/X2 OSS ASN.1/C# OSS ASN.1/JAVA OSS ASN.1/C++ OPC HDA .NET Server Toolkit OPC DA .Net Client Development Component PowerBuilder redgate NET Developer Bundle Report Control for Visual C++ MFC  Altova StyleVision Sencha Test Stimulsoft Reports.PHP Stimulsoft Reports.JS Stimulsoft Reports.Java Stimulsoft Reports. Ultimate Stimulsoft Reports.Wpf Stimulsoft Reports.Silverlight SPC Control Chart Tools for .Net SlickEdit Source Insight Software Verify .Net Coverage Validator Toolkit Pro for VisualC++MFC TeeChart .NET Telerik DevCraft Complete Altova XMLSpy Zend Server

Falcongaze SecureTower

SecureTower functions:

A full control of the corporate information is achieved by means of monitoring of maximum number of communication channels and data transfer protocols.


Monitoring of employees

Department managers and top managers can get a full picture of employees’ working days and adjust the distribution of tasks, terms, build effective project teams.

With the help of SecureTower software solution, top management and heads of structural units can get a detailed picture of everyday staff’ performance and adjust an appropriate tasks distribution, terms, build effective project teams.

Staff performance supervision enables reasonable distribution of workload between employees in a department, as well as between entire divisions. Convenient reporting system ensures comprehensive data, as well as transparent reports on the department performance to the higher management staff. The analysis of work processes helps to streamline company workforce.


Monitoring of work processes with the help of SecureTower, amongst all other things, allows to monitor employees’ communication with customers and partners, carry out analysis and work on mistakes. Apart from this, our solution helps to identify the most efficient and dedicated employees and promote them – so that none of achievement would be unnoticed. Our tool creates such a system of staff supervision that no contact or document will be lost.

SecureTower ensures effective company operation and saves all business correspondence. Moreover, the system tracks the time every employee spends in different software programs, websites and social networks. Based on that data, if the statistics of certain websites visits has increased either sending of notifications or locking up some websites or programs can be arranged.

To monitor employee work processes, the option of message and transferred file capture for e-mail, business communication in social networks and messengers such as Skype, Viber, Telegram is implemented.  In addition, SeucreTower tracks all documents, sent by means of internet or e-mail and monitors cloud services such as Dropbox, OneDrive and Yandex. Disk, iCloud and GoogleDrive.  Convenient search function by all the captured information enables to find a necessary document in a business communication even by incomplete data within minutes.

To detect the personnel interactions inside and outside the company, SecureTower uses a graph analyzer, which displays every employee’s communication with other people. Moreover, profiles for every employee, linked to Active Directory, are created within the graph analyzer. These profiles show employees e-mail addresses, names in messengers, accounts in social networks an on other websites.

SecureTower also registers the addresses of external abonents and creates profile for them. The system memorizes their addresses and controls their communication with other employees. It ensures quick detection of an external intruder or, for example, a recruiter, working for a competitor company. 

All data collected by SecureTower can be presented in completely settable reports with security incidents and daily activities of the staff. Automatical scheduled reporting for top management and security department employees can also be set up. 


Data leak prevention

SecureTower is a comprehensive tool for security of company information resources. Important documentation, client and partner databases, commercial secrets, intellectual property and other valuable information are under reliable protection.

A full control of the corporate information is achieved by means of monitoring of maximum number of communication channels and data transfer protocols.

The key element of building an effective system of information security management is the implementation of DLP software in corporate network. An information of critical importance for businesses shouldn’t leak outside the company and an access to it has to be restricted.

SecureTower is a comprehensive tool for security of company information resources. Important documentation, client and partner databases, commercial secrets, intellectual property and other valuable information are under reliable protection.

SecureTower provides control of maximum number of communication channels, whether it pertains to e-mail, messengers, social networks, cloud storages, USB, etc. – and thus minimizes economic and reputational risks. SecureTower ensures not only investigation of incidents without delay, but also their timely prevention.
Having blocked transfer of data in the particular format or launch of undesirable processes, SecureTower won’t allow leakage of critical business information.

SecureTower both makes the processes of high-quality data loss protection management and work of security departments employees easier. The solving of issues without DLP (for example, categorization of information assets) would take much more time and human resources. With the implementation of DLP software the process of solving these issues is getting simpler and of better quality.

SecureTower uses two types of data interception – server interception and agent interception. In the first case the tool analyzes server traffic, in the second case data is intercepted directly on a work computer. The second way of interception enables to expand the number of channels intercepted including the majority of messengers and internet-traffic under the HTTPS protocol. Depending on the customer’s needs, the ways of interception can be combined or only some modules of the system can be applied.

The system analyzes all the data received and identifies incidents that would be addressed by the company units responsible for security issues. The analysis is based on the previously set security rules which can be various and of any complexity. For instance, the system can notify when a large number of files is sent by the employees of the same department to print. It also can lock up the sending of document which contains confidential data from database by e-mail. All notifications about incidents are sent to the officer responsible who decides the matter.

SecureTower implementation takes up only a few hours and its installation and configuration is conducted using one console and no expensive consultancy or additional hardware is required. Falcongaze team is always here to support you and assist in providing proper system performance. 


Archive of Business Communication

SecureTower helps to avoid losses of important information – all transferred and received data are saved. Even if they are deleted from a particular workstation, they will be available and restored, if necessary.

SecureTower builds an inextricable system of operation with all data, both at the present moment and in the past.
Retrospective incident investigation? The information about all security violations is also available at any time, which allows to restore the chronology of events which led to data leakage or other violations.

Features
1.E-mail

SecureTower provides control of all messages of most popular mailbox servers, according to POP3, SMTP and IMAP protocols, as well as capture and lock-up of messages using MAPI protocol.

The system checks the compliance with the security policies for messages, sent by means of Microsoft Exchange Server, Lotus Notes, Postfix, Sendmai, etc. Besides, the system supports capture of messages from external mail services in free mail services, such as Gmail, Mail.ru or Yandex.Mail.

2.Messengers

Employees of modern companies prefer to carry out business communication, using messengers and social networks, rather than by e-mail, with increasing frequency. To control these channels, the option of message and transferred file capture for practically all popular messengers is implemented in SecureTower. The DLP system can control instant messaging protocols OSCAR (ICQ/AIM), MMP (Mail.Ru Agent), XMPP (Jabber) (Miranda, Google Talk, QIP Infium, PSI), YIM (Yahoo! Messenger), SIP, as well as capture text and voice messages and files in Skype, Viber, MS Lync and Telegram.

3.Social networks

Apart from messengers, employees more and more frequently use social networks such as Vkontakte, Facebook, Odnoklassniki, etc., for business communication. The DLP system controls communication of the staff in blogs, online chats, forums, etc.

4.Web activity

SecureTower allows to build a complete picture of the employee web activity throughout the working day. The DLP system helps to get information about the websites, visited by the employee, the time spent on these websites or any messages sent.

 

5.Cloud storage

Employees can use cloud storages as part of the working process, but security incidents are also possible. SecureTower tracks all files, downloaded by the user into the Internet through a browser, besides, file capture in desktop applications for such cloud services as Dropbox, OneDrive and Yandex.Drive is also possible.

6.Applications

The DLP system tracks the applications, used by the employees throughout the working day. On the basis of the results, obtained by this option, you can check what applications were used by the employee more frequently and what period of time was devoted to the labour activities. Besides, the system can lock up particular applications, determined by the administrator. 

7.Personnel control

One of the main factors, pre-determining choice of the DLP system, is a possibility to control the staff activities. In view of this, an option of working time control which allows to see the actual time spent on fulfillment of any task by the employee is implemented in SecureTower.

Moreover, you can get the broad picture of the employee’s working day by means of the keylogger, audio and video monitoring and desktop screenshots.

8.Workstation control

SecureTower provides control and prevention of file transfer to external media. The system performs automatic scanning of the documents, sent for printing or USB drive, for confidential information, and in case of detection of this information, notifies the administrator and allows to take preventive measures to remediate the incident.

Besides, SecureTower tracks connection and disconnection of devices from the workstations, controls information copying and carries out the computer access audit.

9.Workstation indexing

To ensure checks for presence or absence of confidential documents on the workstation, SecureTower is provided with quick search on all computers in the local network, which includes the manual mode. The search is possible both by names and file attributes.

10.Personnel interactions

To detect the personnel interactions, SecureTower uses a graph analyzer, in which profiles, automatically linked to ActiveDirectory, are created for every employee, and displays the employee’s communication with other people. This profile shows the employee e-mail addresses, names in messengers, accounts in social networks and on other websites.

To detect outside ill-wishers, SecureTower registers the addresses of the external abonents and also creates profiles for them. It ensures quick detection of an external intruder or, for example, a recruiter, working for a competitor company. 

11.Reports

Completely settable reports on security incidents and daily activities of the staff are available for security department employees and managers of structural units. You can also set up automatical scheduled reporting and report sending to e-mails.

 

Quick Navigation;

© Copyright 2000-2023  COGITO SOFTWARE CO.,LTD. All rights reserved