SearchInform DLP:

Protecting business from data leakages

SearchInform HTTPController

CHALLENGE

Websites, social media, forums, and blogs have rapidly gained popularity and help find information, recruit staff, find potential business partners, and so on. However, these new ways of communication make your business more vulnerable to security threats. Employees may use social networks, web blogs, and chats for illegitimate activity breaching the corporate security policies and negatively affecting the company's performance.

Sensitive data from your corporate network can be exfiltrated via various Internet resources. Communication over HTTP might involve an infinite number of websites, but all of the following are similar in what they use – web forms:

  • Web-based email clients, which you can access with your browser
  • Web blogs
  • Internet forums
  • Feedback forms
  • Web chats
  • Social networks (Facebook, LinkedIn, and others)
  • Web-based IM-clients (ICQ, MSN)

SOLUTION

SearchInform HTTPController is the program that captures messages (Post/Get queries) sent via web-based message boards, blogs, chats, web-mail services or browser IM-clients. The full-text search feature enables you to control your employee activities and monitor their communications during work time.

KEY FEATURES

  • Lets you control your employee productivity as well as employee online communications which is especially important given the growing popularity of social media.
  • Provides extended search capabilities. SearchInform Client allows you to use its sophisticated search engine to run full-text search in captured data.
  • Indexes and stores contents of all captured messages. A back-up copy of messages helps form the evidence base for investigating security violations in the company.
  • Provides a client-server architecture with flexible rights differentiation which makes the product a highly-suitable solution for the corporate sector.

searchinform_client_3

TRY FOR FREE
Suscríbase para recibir las novedades y conocer las tendencias del sector. Recibirá consejos sobre como afrontar las fugas de los datos y a los ciberdelincuentes.