SearchInform DLP:

Protecting business from data leakages

SearchInform IMController

CHALLENGE

Social media (Facebook, VKontakte, LinkedIn) as well as instant messaging applications have transformed into a full-fledged tool for business communications. But how to prevent sensitive data leaks through these channels and identify a malicious insider?

SOLUTION

The IMController module captures communications effected via popular IM clients:

  • Google Hangouts
  • XMPP (Jabber)
  • ICQ
  • Windows Live (MSN)
  • Mail.ru Agent

IMController captures employee messages in chats of popular social media:

  • Facebook
  • LinkedIn
  • my.mail.ru
  • VKontakte

IMController monitors text and voice messages, as well as files sent via Microsoft Lync and Viber Desktop. The software shadow-copies the messages and files to a database so that you can reconstruct the dialogs by using the full-text search engine: stemming search, search with synonyms, and similar-content search.

KEY FEATURES

  • Employee communications under control. IMController allows you to track leaks of sensitive data as well as control how negotiations are conducted and whether employees use their work time rationally.
  • Extended search capabilities. IMController lets you run full-text search using stemming and synonym rows. You can also perform a phrase search taking into account the distance between the queried words.
  • Patented similar-content search. A text fragment is used as a search query. The system analyzes the captured data and displays the found messages in the order of relevance with the percentage of similarity indicated.
  • Correspondence history. Lets you view the correspondence of an employee with a given contact effected through various channels, including social network chats.  The history displays messages sent to the given contact and received from the contact in chronological order.
  • Scalability. The system can be scaled up to process huge volumes of data and traffic.

searchinform_client_2

TRY FOR FREE
Suscríbase para recibir las novedades y conocer las tendencias del sector. Recibirá consejos sobre como afrontar las fugas de los datos y a los ciberdelincuentes.