InfoWatch Traffic Monitor Benefits
InfoWatch Traffic Monitor is a centralized solution for preventing confidential data leaks and thus eliminating financial losses.
Part number:
Supplier:
InfoWatchDescription
High performance even when supporting organizations with 300 000 employees or more
Ready-to-use industry solutions based on the nature of business processes in financial organizations, telecommunications and insurance companies, public agencies, energy companies, etc.
Ease of use: can be used by HR and legal departments, marketing professionals, managers, etc.
Precise identification of intruders and calling them to account
Modular architecture: you pay for the features you need
Tasks addressed
Reduce the company’s financial and reputational risks caused by leaks and mitigate the results of such leaks
Prevent data leaks without interrupting business processes by preventing data from being sent via email, web services or social media, from being copied to USB flash drives, etc.
Control employee operations in business apps, preventing retrieval of confidential data in digital or printed form
Collect evidence for incidents investigation
Network perimeter protection: InfoWatch Traffic Monitor
Hardware
Server: HP DL360 G7
CPU: Intel Xeon x86 3GHz, 2 CPU with 4 cores
RAM 8 GB
HD 300GB
Software
Red Hat Enterprise Linux Server R6 x64
MSVSphere 6.4 Server
Ready-to-use industry solutions based on the nature of business processes in financial organizations, telecommunications and insurance companies, public agencies, energy companies, etc.
Ease of use: can be used by HR and legal departments, marketing professionals, managers, etc.
Precise identification of intruders and calling them to account
Modular architecture: you pay for the features you need
Tasks addressed
Reduce the company’s financial and reputational risks caused by leaks and mitigate the results of such leaks
Prevent data leaks without interrupting business processes by preventing data from being sent via email, web services or social media, from being copied to USB flash drives, etc.
Control employee operations in business apps, preventing retrieval of confidential data in digital or printed form
Collect evidence for incidents investigation
Network perimeter protection: InfoWatch Traffic Monitor
Hardware
Server: HP DL360 G7
CPU: Intel Xeon x86 3GHz, 2 CPU with 4 cores
RAM 8 GB
HD 300GB
Software
Red Hat Enterprise Linux Server R6 x64
MSVSphere 6.4 Server