SlideShare una empresa de Scribd logo
1 de 10
How inDefend helps in
WFH scenario?
www.dataresolve.com 2
COVID – Its impacts across organizations
“Recent Indian CIO Survey reveals 41% of CIOs feels
this Pandemic will slow down buying sentiments
and recovery process will start after 6 months..” As
per CIO Survey..
Organizations globally never tested its BCP at
this scale
Not ready to transition and run businesses from
home
Traditional systems not ported on cloud to
support remote worker
Adequate controls for information leak
protection not well embedded
Employee attendance and how to measure
productivity is challenged by management and
board under Work from home
Big issue how to sustain culture, manage
Pandemic stress
Manage customer expectations with limited
capacities
Best Practices that organizations going to adopt to manage this and unknown
adversaries & Pandemics:
• RPA in terms of process automation will take a front-seat in business processes
• CRMs, BOTs, AI Engagement tools, Messengers, Video Conferencing will bridge the
gap of face to face interactions
• Augmented reality coupled with Natural Language Processing along-with contextual
content will change the client engagement experience
• Adoption of cloud
• Data Privacy is key as users accessing confidential data from home
• Using 2FA, SSLs, Data backup, DLP, Employee Monitoring is part of mainstream
buying these days
www.dataresolve.com 3
What Best Practices Organisations are following to address below challenges?
www.dataresolve.com 4
With PM Modi announcing a nationwide complete lockdown for 21 days to stop the spread of
the COVID-19 pandemic, Part 2 of CIO India’s survey on ‘Business Continuity amid Coronavirus’,
conducted 23-25 March, shows that 96% of organizations have rolled out working from home, a
significant rise from 19% just two weeks before.
With this work from home state, we started getting clients with following broad concerns:
What Best Practices Organisations are following to address below challenges?
www.dataresolve.com 5
Our Offerings – inAdvanced – Insider Threat Platform with Unified Controls
Insider Threat Response System
Data Leakage Prevention
Intellectual Property Theft
Employee Behavior Monitoring
Application Monitoring/Whitelisting
Workplace Productivity
ONE Platform
Single Platform for Information Leakage Protection
and Proactive User Behavioral Profiling
Multi Form Factor
Covers numerous types of endpoint form factors
40% Lesser TCO
40% lesser cost of operation than competitors
Adaptive Deployment
Cloud or On-Premise or Hybrid Deployment
Architecture Ready
High Pluggability
API and Connector Ready Platform
High Flexibility
Highly customizable features and reporting
State-Of-The-Art Tech
Based on state-of-the-art latest technologies like
Influx DB, Node.js, Java, Angular, Golang, etc.
Scalable Microservices
Microservices based highly scalable and
distributed framework
www.dataresolve.com 6
Key Sales Drivers
www.dataresolve.com 7
How Easy is to On-board – Work from home?
Kickoff
Control Center Setup Phase
a. Server Setup on Cloud
b. Remote License Activation
c. Creation of Admin Accounts
d. Push of agents via single click
Automated Installation Phase
a. Silent Push to all endpoint agents
b. Maps to cloud server (we support all leading Cloud
instances)
Policy Formulation Phase
a. Best Practice >> 30 days learning mode
b. Ship product with based Work from home policies – Day – 1
Client Handover and Project
Signoff
a. Policy fine-tuning
b. Auto report generation is switched on
c. Customer training executed
d. Signed off and moved to general support
Quick Sign-Off
www.dataresolve.com 8
Key Use Cases for productivity management during WFH
Risk Analysis Policy System
Monitor all Email activity for employee
working from home
User behavior monitoring for remote
employees
Control data transfer through USB devices Monitor productivity of remote employees
Block and monitor usage of unauthorized
application on endpoint
Employee forensics using screenshot
monitoring
Monitor file upload activities to
unauthorized URLs
Monitor sharing of sensitive information
through various channels
Live Alerts of incidents
Restrict print screen to sensitive information
on endpoint
Block print activity to prevent leakage of
confidential information in physical form
Real-time Surveillance for employees
working from home
Monitor email activity done from
personal/BYOD device (using SEG)
Customer Reviews
VISIT OUR WEBSITE
www.dataresolve.com
OUR WORLDWIDE PRESENCE
India (Noida, Mumbai, Bangalore, Pune, Hyderabad)
UAE (Dubai)
DATA RESOLVE TECHNOLOGIES HEAD OFFICE
ABL Workspace, 3rd floor, B-6, Sector-4, Noida,
Uttar Pradesh 201301, INDIA
Phone : +91-9266603983
ABOUT DATA RESOLVE TECHNOLOGIES
Data Resolve Technologies is an IIT Kharagpur incubated company, focused
towards building futuristic products for Insider Threat Management and
Employee Monitoring for mid-sized and large enterprises. We enable CIOs/ CISOs
and business managers to monitor and predict employee behaviour and report
any anomalous intentions detected, helping them build a secure ecosystem and
increasing employee productivity.

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
 
Tachyon_Flyer
Tachyon_FlyerTachyon_Flyer
Tachyon_Flyer
 
AccessPaaS by SafePaaS
AccessPaaS by SafePaaSAccessPaaS by SafePaaS
AccessPaaS by SafePaaS
 
AccessPaaS (SafePaaS)
AccessPaaS (SafePaaS)AccessPaaS (SafePaaS)
AccessPaaS (SafePaaS)
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
 
Primend praktiline konverents - Pilveteenuste ja BYOD haldus
Primend praktiline konverents - Pilveteenuste ja BYOD haldusPrimend praktiline konverents - Pilveteenuste ja BYOD haldus
Primend praktiline konverents - Pilveteenuste ja BYOD haldus
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
The impact of consumerization
The impact of consumerizationThe impact of consumerization
The impact of consumerization
 
A Primer on iOS Management and What's Changing
A Primer on iOS Management and What's ChangingA Primer on iOS Management and What's Changing
A Primer on iOS Management and What's Changing
 
The 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementThe 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity Management
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility Strategy
 
Ekran System - Employee Activity Monitoring Tool
Ekran System - Employee Activity Monitoring ToolEkran System - Employee Activity Monitoring Tool
Ekran System - Employee Activity Monitoring Tool
 
The Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementThe Future of Enterprise Identity Management
The Future of Enterprise Identity Management
 
Webinar - How to choose the Right Compliance Management Software for your Org...
Webinar - How to choose the Right Compliance Management Software for your Org...Webinar - How to choose the Right Compliance Management Software for your Org...
Webinar - How to choose the Right Compliance Management Software for your Org...
 
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014
 
Secure Mobility from GGR Communications
Secure Mobility from GGR CommunicationsSecure Mobility from GGR Communications
Secure Mobility from GGR Communications
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013
 

Similar a DLP solution - InDefend in WFH Situations

Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5
Steve Markey
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013
Arrow ECS UK
 
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) AnswerContent Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Zia Consulting
 
Enterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-PremEnterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-Prem
Dipesh Mukerji
 

Similar a DLP solution - InDefend in WFH Situations (20)

The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organization
 
Transforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsTransforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending Apps
 
BEST CYBER SECURITY PRACTICES
BEST CYBER SECURITY PRACTICESBEST CYBER SECURITY PRACTICES
BEST CYBER SECURITY PRACTICES
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5
 
Building a Smarter Workplace
Building a Smarter WorkplaceBuilding a Smarter Workplace
Building a Smarter Workplace
 
Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...
Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...
Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem Partners
 
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) AnswerContent Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application Platform
 
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise Mobility
 
Enterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-PremEnterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-Prem
 
Build a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYODBuild a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYOD
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
 

Más de Prime Infoserv

Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
Prime Infoserv
 

Más de Prime Infoserv (20)

Face Recognition under COVID19 crisis
Face Recognition under COVID19 crisisFace Recognition under COVID19 crisis
Face Recognition under COVID19 crisis
 
Face Chk - Face Recognition
Face Chk - Face RecognitionFace Chk - Face Recognition
Face Chk - Face Recognition
 
Data Protection and E-contracting
Data Protection and E-contractingData Protection and E-contracting
Data Protection and E-contracting
 
Remote Workforces Secure by Barracuda
Remote Workforces Secure by BarracudaRemote Workforces Secure by Barracuda
Remote Workforces Secure by Barracuda
 
Trend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 marTrend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 mar
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
 
Corporate Presentation - Netmagic
Corporate Presentation - NetmagicCorporate Presentation - Netmagic
Corporate Presentation - Netmagic
 
Teamwork with Microsoft Teams
Teamwork  with Microsoft TeamsTeamwork  with Microsoft Teams
Teamwork with Microsoft Teams
 
Microsoft Teams-flyer
Microsoft Teams-flyerMicrosoft Teams-flyer
Microsoft Teams-flyer
 
Windows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefitsWindows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefits
 
Email Security – Everyone is a Target
Email Security – Everyone is a TargetEmail Security – Everyone is a Target
Email Security – Everyone is a Target
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
 
BCM Webinar presentation
BCM Webinar presentationBCM Webinar presentation
BCM Webinar presentation
 
FireEye Portfolio
FireEye PortfolioFireEye Portfolio
FireEye Portfolio
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
Phishing Simulation By Shield Alliance
Phishing Simulation By Shield AlliancePhishing Simulation By Shield Alliance
Phishing Simulation By Shield Alliance
 
FireEye Solutions
FireEye SolutionsFireEye Solutions
FireEye Solutions
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

DLP solution - InDefend in WFH Situations

  • 1. How inDefend helps in WFH scenario?
  • 2. www.dataresolve.com 2 COVID – Its impacts across organizations “Recent Indian CIO Survey reveals 41% of CIOs feels this Pandemic will slow down buying sentiments and recovery process will start after 6 months..” As per CIO Survey.. Organizations globally never tested its BCP at this scale Not ready to transition and run businesses from home Traditional systems not ported on cloud to support remote worker Adequate controls for information leak protection not well embedded Employee attendance and how to measure productivity is challenged by management and board under Work from home Big issue how to sustain culture, manage Pandemic stress Manage customer expectations with limited capacities
  • 3. Best Practices that organizations going to adopt to manage this and unknown adversaries & Pandemics: • RPA in terms of process automation will take a front-seat in business processes • CRMs, BOTs, AI Engagement tools, Messengers, Video Conferencing will bridge the gap of face to face interactions • Augmented reality coupled with Natural Language Processing along-with contextual content will change the client engagement experience • Adoption of cloud • Data Privacy is key as users accessing confidential data from home • Using 2FA, SSLs, Data backup, DLP, Employee Monitoring is part of mainstream buying these days www.dataresolve.com 3 What Best Practices Organisations are following to address below challenges?
  • 4. www.dataresolve.com 4 With PM Modi announcing a nationwide complete lockdown for 21 days to stop the spread of the COVID-19 pandemic, Part 2 of CIO India’s survey on ‘Business Continuity amid Coronavirus’, conducted 23-25 March, shows that 96% of organizations have rolled out working from home, a significant rise from 19% just two weeks before. With this work from home state, we started getting clients with following broad concerns: What Best Practices Organisations are following to address below challenges?
  • 5. www.dataresolve.com 5 Our Offerings – inAdvanced – Insider Threat Platform with Unified Controls Insider Threat Response System Data Leakage Prevention Intellectual Property Theft Employee Behavior Monitoring Application Monitoring/Whitelisting Workplace Productivity
  • 6. ONE Platform Single Platform for Information Leakage Protection and Proactive User Behavioral Profiling Multi Form Factor Covers numerous types of endpoint form factors 40% Lesser TCO 40% lesser cost of operation than competitors Adaptive Deployment Cloud or On-Premise or Hybrid Deployment Architecture Ready High Pluggability API and Connector Ready Platform High Flexibility Highly customizable features and reporting State-Of-The-Art Tech Based on state-of-the-art latest technologies like Influx DB, Node.js, Java, Angular, Golang, etc. Scalable Microservices Microservices based highly scalable and distributed framework www.dataresolve.com 6 Key Sales Drivers
  • 7. www.dataresolve.com 7 How Easy is to On-board – Work from home? Kickoff Control Center Setup Phase a. Server Setup on Cloud b. Remote License Activation c. Creation of Admin Accounts d. Push of agents via single click Automated Installation Phase a. Silent Push to all endpoint agents b. Maps to cloud server (we support all leading Cloud instances) Policy Formulation Phase a. Best Practice >> 30 days learning mode b. Ship product with based Work from home policies – Day – 1 Client Handover and Project Signoff a. Policy fine-tuning b. Auto report generation is switched on c. Customer training executed d. Signed off and moved to general support Quick Sign-Off
  • 8. www.dataresolve.com 8 Key Use Cases for productivity management during WFH Risk Analysis Policy System Monitor all Email activity for employee working from home User behavior monitoring for remote employees Control data transfer through USB devices Monitor productivity of remote employees Block and monitor usage of unauthorized application on endpoint Employee forensics using screenshot monitoring Monitor file upload activities to unauthorized URLs Monitor sharing of sensitive information through various channels Live Alerts of incidents Restrict print screen to sensitive information on endpoint Block print activity to prevent leakage of confidential information in physical form Real-time Surveillance for employees working from home Monitor email activity done from personal/BYOD device (using SEG)
  • 10. VISIT OUR WEBSITE www.dataresolve.com OUR WORLDWIDE PRESENCE India (Noida, Mumbai, Bangalore, Pune, Hyderabad) UAE (Dubai) DATA RESOLVE TECHNOLOGIES HEAD OFFICE ABL Workspace, 3rd floor, B-6, Sector-4, Noida, Uttar Pradesh 201301, INDIA Phone : +91-9266603983 ABOUT DATA RESOLVE TECHNOLOGIES Data Resolve Technologies is an IIT Kharagpur incubated company, focused towards building futuristic products for Insider Threat Management and Employee Monitoring for mid-sized and large enterprises. We enable CIOs/ CISOs and business managers to monitor and predict employee behaviour and report any anomalous intentions detected, helping them build a secure ecosystem and increasing employee productivity.