Information security . Risks management . Optimization of workflows
Monitoring of employees
With the help of SecureTower software solution, top management and heads of structural units can get a detailed picture of everyday staff’ performance and adjust an appropriate tasks distribution, terms, build effective project teams.
Staff performance supervision enables reasonable distribution of workload between employees in a department, as well as between entire divisions. Convenient reporting system ensures comprehensive data, as well as transparent reports on the department performance to the higher management staff. The analysis of work processes helps to streamline company workforce.
Monitoring of work processes with the help of SecureTower, amongst all other things, allows to monitor employees’ communication with customers and partners, carry out analysis and work on mistakes. Apart from this, our solution helps to identify the most efficient and dedicated employees and promote them – so that none of achievement would be unnoticed. Our tool creates such a system of staff supervision that no contact or document will be lost.
SecureTower ensures effective company operation and saves all business correspondence. Moreover, the system tracks the time every employee spends in different software programs, websites and social networks. Based on that data, if the statistics of certain websites visits has increased either sending of notifications or locking up some websites or programs can be arranged.
To monitor employee work processes, the option of message and transferred file capture for e-mail, business communication in social networks and messengers such as Skype, Viber, Telegram is implemented. In addition, SeucreTower tracks all documents, sent by means of internet or e-mail and monitors cloud services such as Dropbox, OneDrive and Yandex.Disk, iCloud and Google Drive. Convenient search function by all the captured information enables to find a necessary document in a business communication even by incomplete data within minutes.
To detect the personnel interactions inside and outside the company, SecureTower uses a graph analyzer, which displays every employee’s communication with other people. Moreover, profiles for every employee, linked to Active Directory, are created within the graph analyzer. These profiles show employees e-mail addresses, names in messengers, accounts in social networks an on other websites.
SecureTower also registers the addresses of external abonents and creates profile for them. The system memorizes their addresses and controls their communication with other employees. It ensures quick detection of an external intruder or, for example, a recruiter, working for a competitor company.
All data collected by SecureTower can be presented in completely settable reports with security incidents and daily activities of the staff. Automatical scheduled reporting for top management and security department employees can also be set up.
Data Leak Prevention
A full control of the corporate information is achieved by means of monitoring of maximum number of communication channels and data transfer protocols.
The key element of building an effective system of enterprise data protection is the implementation of DLP software in corporate network. An information of critical importance for businesses shouldn’t leak outside the company and an access to it has to be restricted.
SecureTower is a comprehensive tool for security of company information resources. Important documentation, client and partner databases, commercial secrets, intellectual property and other valuable information are under reliable protection.
SecureTower provides control of maximum number of communication channels, whether it pertains to e-mail, messengers, social networks, cloud storages, USB, etc. – and thus minimizes economic and reputational risks. SecureTower ensures not only investigation of incidents without delay, but also their timely prevention.
Having blocked transfer of data in the particular format or launch of undesirable processes, SecureTower won’t allow leakage of critical business information.
SecureTower both makes the processes of high-quality data leak protection management and work of security departments employees easier. The solving of issues without DLP (for example, categorization of information assets) would take much more time and human resources. With the implementation of DLP software the process of solving these issues is getting simpler and of better quality.
SecureTower uses two types of data interception – server interception and agent interception. In the first case the tool analyzes server traffic, in the second case data is intercepted directly on a work computer. The second way of interception enables to expand the number of channels intercepted including the majority of messengers and internet-traffic under the HTTPS protocol. Depending on the customer’s needs, the ways of interception can be combined or only some modules of the system can be applied.
The system analyzes all the data received and identifies incidents that would be addressed by the company units responsible for security issues. The analysis is based on the previously set security rules which can be various and of any complexity. For instance, the system can notify when a large number of files is sent by the employees of the same department to print. It also can lock up the sending of document which contains confidential data from database by e-mail. All notifications about incidents are sent to the officer responsible who decides the matter.
SecureTower implementation takes up only a few hours and its installation and configuration is conducted using one console and no expensive consultancy or additional hardware is required. Falcongaze team is always here to support you and assist in providing proper system performance.
Archive of Business Communication
SecureTower helps to avoid losses of important information – all transferred and received data are saved. Even if they are deleted from a particular workstation, they will be available and restored, if necessary.
SecureTower builds an inextricable system of operation with all data, both at the present moment and in the past.
Retrospective incident investigation? The information about all security violations is also available at any time, which allows to restore the chronology of events which led to data leakage or other violations.