Third party: ITecSys Technologies Pvt Ltd


    CSP/10

ITsMine

Data Protection, Secure Data, File GPS, DLP, Breach Protection

 

Data protection platform

Continuously track your scattered data’s location, anywhere: on-premise, on personal devices and in the cloud – with File-GPS™ beacons, transparently embedded into all your sensitive files

 

 

    ItsMine




    Third party: ITecSys Technologies Pvt Ltd


    CSP/10


Differentiators

 

  1. Traditional solutions are based on knowledge they do not - and cannot-have.
  2. Defining/finding sensitive data is an extremely difficult task. Technology can help but any false positives will harm employee productivity.
  3. Creating manual policies for each user is complex, intensive & impossible at scale.
  4. Current solutions do not treat the vector of attack - only treating & tracking the data.

 

 

Solution

 

  1. Always know your Data Location.
  2. Locates Data, Protects a compromised machine form Exfiltration of Data.
  3. File GPS
  4. Tracks the Lat Long, IP Address, etc of the stolen file and informs the administrator.
  5. Beyond DLP Solution.
  6. Realtime acknowledgement of a data loss/Data Steal.
  7. Breach protection

 

 

Features

 

360 degree control
  1. Transparently track scattered data’s location, anywhere, with FILE-GPS™ which constantly “calls home” & reports on a file’s whereabouts
  2. Unique dashboard displaying location & risk level of monitored data.
  3. Consistent data security controls across all data storage applications (including OneDrive, Google Drive, Dropbox, NetApp & any Windows/Linux file storage)
Malicious Behaviour Remediation
  1. Prevent data breaches by planting SoftwareMines™ in sensitive locations adjacent to files that need protection.
  2. Detect external attackers by detecting SoftwareMines™ “detonations” (unexpected access or opening of files) in critical areas.
  3. Automatic deployment of disposable agents on suspicious endpoints.
Employee-Centric Protection
  1. Integrates training campaigns educating in real-time on safe use of necessary data only.
  2. Dashboard with clear metrics presenting the progress of the Data Protection Awareness Campaigns in your organization.
  3. Integrates mechanisms to collaboratively (with consent) remove employees’ unnecessary access to data.
 

 

 

Architechture

Use cases

 

  1. Supporting your subcontractors and guests: Controlled sharing of sensitive data accessed by 3rd party entities – with options to monitor, time-limit and restrict data access as needed
  2. Moving to the Cloud: Maintain your high security standards regardless of whether your data is located in on-prem or cloud-based file systems
  3. Meeting your regulatory requirements: Hassle-free compliance to data protection regulations, from GDPR, CCPA, PCI to HIPPA, with access control options to sensitive data, data breach detection and clear reporting options
  4. Empower employees’ full productivity while controlling usage and whereabouts of your sensitive data.

 

 

Differentiators

 

  1. Traditional solutions are based on knowledge they do not - and cannot-have.
  2. Defining/finding sensitive data is an extremely difficult task. Technology can help but any false positives will harm employee productivity.
  3. Creating manual policies for each user is complex, intensive & impossible at scale.
  4. Current solutions do not treat the vector of attack - only treating & tracking the data.

 

 

Solution

 

  1. Always know your Data Location.
  2. Locates Data, Protects a compromised machine form Exfiltration of Data.
  3. File GPS
  4. Tracks the Lat Long, IP Address, etc of the stolen file and informs the administrator.
  5. Beyond DLP Solution.
  6. Realtime acknowledgement of a data loss/Data Steal.
  7. Breach protection

 

 

Features

 

360 degree control
  1. Transparently track scattered data’s location, anywhere, with FILE-GPS™ which constantly “calls home” & reports on a file’s whereabouts
  2. Unique dashboard displaying location & risk level of monitored data.
  3. Consistent data security controls across all data storage applications (including OneDrive, Google Drive, Dropbox, NetApp & any Windows/Linux file storage)
Malicious Behaviour Remediation
  1. Prevent data breaches by planting SoftwareMines™ in sensitive locations adjacent to files that need protection.
  2. Detect external attackers by detecting SoftwareMines™ “detonations” (unexpected access or opening of files) in critical areas.
  3. Automatic deployment of disposable agents on suspicious endpoints.
Employee-Centric Protection
  1. Integrates training campaigns educating in real-time on safe use of necessary data only.
  2. Dashboard with clear metrics presenting the progress of the Data Protection Awareness Campaigns in your organization.
  3. Integrates mechanisms to collaboratively (with consent) remove employees’ unnecessary access to data.
 

 

 

Scope

Architechture

Pricing / commercial model

Use cases

 

  1. Supporting your subcontractors and guests: Controlled sharing of sensitive data accessed by 3rd party entities – with options to monitor, time-limit and restrict data access as needed
  2. Moving to the Cloud: Maintain your high security standards regardless of whether your data is located in on-prem or cloud-based file systems
  3. Meeting your regulatory requirements: Hassle-free compliance to data protection regulations, from GDPR, CCPA, PCI to HIPPA, with access control options to sensitive data, data breach detection and clear reporting options
  4. Empower employees’ full productivity while controlling usage and whereabouts of your sensitive data.

 

 

A Technologist's Expertise Company