Data movement visibility on non-corporate and Shadow IT online channels

Getting visibility on information being sent to Cloud Drives, free emails, online encrypted websites, social media etc is a challenging task. Normal software like SIEM, Firewalls and Filters, CASBs etc do not give full visibility on what actual information is being sent out. e-Safe Compliance gives full visibility with actionable reports on what data is sent to these sources

Gives visibility and control on usage of Shadow Computing

With the growing number of millennials in the workforce, use of 3rd party APPs such as free pdf convertors, WeChat, WhatsApp, cloud based free CRMs etc, to get the work done, is becoming commonplace. However, it can result in serious consequences for the company, as these APPs are beyond the control of the company’s IT staff because they don’t require admin rights to install. Further, any transaction done on these APPs is also beyond the control of the IT staff as the data remains with these APPs. e-Safe Compliance gives full visibility of the applications being used by each user. This information is displayed based on active usage of APPs and does not depend on whether the APP is installed or is just a webpage.

Gives data transfer visibility on external media USBs, SD cards and phone-sync

It is naive to think that the USB is the only means of offline data transfer. New forms of data transfer such as SD cards and phone syncs are now frequently used for this purpose.
Monitoring transfer of files to USBs
Monitoring transfer of files via Phone SYNC

User behaviuor analytics helps to identify risky and malicious behaviors – presented in simple easy to understand language

Having a high level of visibility is of no use if it produces too many reports. This results in information overload. e-Safe Compliance solves this problem by allowing users to define the various risks and their severity. This allows system admin to hone monitoring to specific circumstances. Further, the defined risk results are shown in a user behaviour analytics report. The report is produced by monitoring the user behaviour over a period of time and calculating a risk score based on the actions taken by each user. The system uses advanced analytics to combine different types of risk, puts a value to them, and produces the result in simple to understand English for the admin and the end-user

Videos for data movement visibility online channels

SAMPLE CLOUD DRIVE USE CASE VIDEOS

Monitoring transfer of files to Dropbox App
Monitoring transfer of files to Dropbox via Web
Monitoring transfer of files to OneDrive App
Monitoring transfer of files to OneDrive via Web
Monitoring transfer of files to GDrive App
Monitoring transfer of files to GDrive via Web

SAMPLE FREE EMAIL USE CASE VIDEOS

Monitoring file uploads to Yahoomail
Monitoring file uploads to Gmail
Monitoring specified information in email body e.g. Gmail

SAMPLE ENCRYPTED WEBSITES SUCH AS SOCIAL MEDIA USE CASE VIDEOS

Monitoring sharing of files on Social Media e.g. Facebook
Monitoring specified information posted on Facebook
Monitoring specified information posted on Twitter

SAMPLE ENCRYPTED FREE CHAT USE CASE VIDEOS

Monitoring transfer of files on chat service e.g. Skype
Monitoring specified information shared using Google Hangouts
Monitoring specified information shared using Facebook IM

Try Now. Its fast and easy!!!

 

You can try e-Safe Compliance using our cloud servers or have it on your premises. It only takes a few hours to install and you will immediately get endpoint visibility without any noticeable impact.
Click here to try now!!