Third party: ITecSys Technologies Pvt Ltd
CSP/10
ITsMine
Data Protection, Secure Data, File GPS, DLP, Breach Protection
Data protection platform
Continuously track your scattered data’s location, anywhere: on-premise, on personal devices and in the cloud – with File-GPS™ beacons, transparently embedded into all your sensitive files
Differentiators
- Traditional solutions are based on knowledge they do not - and cannot-have.
- Defining/finding sensitive data is an extremely difficult task. Technology can help but any false positives will harm employee productivity.
- Creating manual policies for each user is complex, intensive & impossible at scale.
- Current solutions do not treat the vector of attack - only treating & tracking the data.
Solution
- Always know your Data Location.
- Locates Data, Protects a compromised machine form Exfiltration of Data.
- File GPS
- Tracks the Lat Long, IP Address, etc of the stolen file and informs the administrator.
- Beyond DLP Solution.
- Realtime acknowledgement of a data loss/Data Steal.
- Breach protection
Features
360 degree control
- Transparently track scattered data’s location, anywhere, with FILE-GPS™ which constantly “calls home” & reports on a file’s whereabouts
- Unique dashboard displaying location & risk level of monitored data.
- Consistent data security controls across all data storage applications (including OneDrive, Google Drive, Dropbox, NetApp & any Windows/Linux file storage)
Malicious Behaviour Remediation
- Prevent data breaches by planting SoftwareMines™ in sensitive locations adjacent to files that need protection.
- Detect external attackers by detecting SoftwareMines™ “detonations” (unexpected access or opening of files) in critical areas.
- Automatic deployment of disposable agents on suspicious endpoints.
Employee-Centric Protection
- Integrates training campaigns educating in real-time on safe use of necessary data only.
- Dashboard with clear metrics presenting the progress of the Data Protection Awareness Campaigns in your organization.
- Integrates mechanisms to collaboratively (with consent) remove employees’ unnecessary access to data.
Architechture
Use cases
- Supporting your subcontractors and guests: Controlled sharing of sensitive data accessed by 3rd party entities – with options to monitor, time-limit and restrict data access as needed
- Moving to the Cloud: Maintain your high security standards regardless of whether your data is located in on-prem or cloud-based file systems
- Meeting your regulatory requirements: Hassle-free compliance to data protection regulations, from GDPR, CCPA, PCI to HIPPA, with access control options to sensitive data, data breach detection and clear reporting options
- Empower employees’ full productivity while controlling usage and whereabouts of your sensitive data.
Differentiators
- Traditional solutions are based on knowledge they do not - and cannot-have.
- Defining/finding sensitive data is an extremely difficult task. Technology can help but any false positives will harm employee productivity.
- Creating manual policies for each user is complex, intensive & impossible at scale.
- Current solutions do not treat the vector of attack - only treating & tracking the data.
Solution
- Always know your Data Location.
- Locates Data, Protects a compromised machine form Exfiltration of Data.
- File GPS
- Tracks the Lat Long, IP Address, etc of the stolen file and informs the administrator.
- Beyond DLP Solution.
- Realtime acknowledgement of a data loss/Data Steal.
- Breach protection
Features
360 degree control
- Transparently track scattered data’s location, anywhere, with FILE-GPS™ which constantly “calls home” & reports on a file’s whereabouts
- Unique dashboard displaying location & risk level of monitored data.
- Consistent data security controls across all data storage applications (including OneDrive, Google Drive, Dropbox, NetApp & any Windows/Linux file storage)
Malicious Behaviour Remediation
- Prevent data breaches by planting SoftwareMines™ in sensitive locations adjacent to files that need protection.
- Detect external attackers by detecting SoftwareMines™ “detonations” (unexpected access or opening of files) in critical areas.
- Automatic deployment of disposable agents on suspicious endpoints.
Employee-Centric Protection
- Integrates training campaigns educating in real-time on safe use of necessary data only.
- Dashboard with clear metrics presenting the progress of the Data Protection Awareness Campaigns in your organization.
- Integrates mechanisms to collaboratively (with consent) remove employees’ unnecessary access to data.
Scope
Architechture
Pricing / commercial model
Use cases
- Supporting your subcontractors and guests: Controlled sharing of sensitive data accessed by 3rd party entities – with options to monitor, time-limit and restrict data access as needed
- Moving to the Cloud: Maintain your high security standards regardless of whether your data is located in on-prem or cloud-based file systems
- Meeting your regulatory requirements: Hassle-free compliance to data protection regulations, from GDPR, CCPA, PCI to HIPPA, with access control options to sensitive data, data breach detection and clear reporting options
- Empower employees’ full productivity while controlling usage and whereabouts of your sensitive data.