Are you worried about information leaks on confidential data, intellectual property, sales knowhow, customer and employee’s information?

Insiders carry out most incidents of information leaks. Big data-based scenarios and pattern analytics monitor the use of inside information by executives and employees around the clock, finds abnormal symptoms, issues an early warning and control, thus preventing leaks in advance.

Benefits

Benefits only in monitoring an overuse of inside information

  • Visibility on flow of inside information

    Create, query, process various types of inside information, including personal information, sales confidentiality, property assets, and monitor their activity. Detect abnormal symptoms based on scenarios, use visualization tools to analyze correlation in the use of information intuitively.

  • Less risk in security incidents

    Identify and manage high-risk groups for data and users, detect and respond to abnormal symptoms preemptively. Risk index is pre-defined to protect inside information, also inspection is held for weak points regularly.

USE CASES

Go beyond the limits of security solution

Monitoring an overuse of personal and credit information
Monitoring an overuse of personal and credit information Collect employees’ access packets and logs to have an access to screens with customer information included, thus detecting an excess or normal range of query.
Block manufacturing tech leaks of insiders
Block manufacturing tech leaks of insiders Detect abnormal symptoms of inside information leaks caused by employees’ access to key technology or downloading.

Features

Take a closer Look

  • Storage of many types of logs

    Collect structure and unstructured data in many systems such as security solution events, portals’ logs, groupware logs, thus integrating and storing them.

  • Correlation analytics for abnormality

    Extract factors of users, information, behaviors from collected logs and analyze their correlation between heterogeneous logs, and detect a symptom of overusing inside information such as access for non-business purpose, excessive query, and etc.

  • Risk indicator management

    Define various risk indicators including the level of inside information, display of critical information exposure, threshold in the number of query and the index of count risk per division and user regularly, thus preventing security incidents related to overuse of inside information.

Let's talk

Whether you're looking for a specific business solution or just need some questions answered, we're here to help.