USE CASES

Data Exfiltration (Files)

Monitoring transfer of files to thumb drives


Monitoring transfer of files to Dropbox App


Monitoring transfer of files to Dropbox via Web


Monitoring transfer of files to OneDrive App


Monitoring transfer of files to OneDrive via Web


Monitoring transfer of files to GDrive App


Monitoring transfer of files to GDrive via Web


Monitoring transfer of files using phone sync software e.g. iTunes


Monitoring file uploads to Gmail


Monitoring file uploads to Yahoomail


Monitoring printing of files containing sensitive information


Monitoring transfer of files on chat service e.g. Skype


Monitoring sharing of files on Social Media e.g. Facebook


Data Exfiltration (Unstructured Text)

Monitoring specified information in email body e.g. Gmail


Monitoring specified information in email body e.g. Yahoomail


Monitoring specified information posted on Facebook


Monitoring specified information posted on Twitter


Monitoring specified information posted in Blogs


Monitoring specified information shared using Skype


Monitoring specified information shared using Google Hangouts


Monitoring specified information shared using Facebook IM


Shadow Computing

Monitoring usage of web based non-authorised application e.g. converting Docs to PDF


Monitoring usage of non-authorised desktop applications e.g. uTorrent


User Activity Monitoring

Monitoring users for time spent on websites


Monitoring users for time spent on Applications


Monitoring users for using non-company sanctioned connections