You are on page 1of 6

INDEFEND

BUSINESS
Use Cases
(Cross Platform)

Windows
End Point Monitoring/Control Activities Used cases covered by inDefend Solution

Monitoring browser activities i.e. access to Social Networking sites, Jobs & Career,
Shopping portals, personal emails etc.

Browser Activity Monitor usage or time spent on different websites/URL like Social Networking
sites, Jobs & Career, Shopping portals, personal emails etc.

Blocking browser activities i.e. access to Social Networking sites, Jobs & Career,
Shopping portals, personal emails etc.

Monitoring applications Network activities i.e. download accelerators, torrents,


Gaming applications, FTP, P2P applications etc.

Application Network Activity Selectively allow, block or bypass any kind of internet applications

Monitor usage or time spent on different applications like download accelerators,


torrents, Gaming applications, FTP, P2P applications etc.

Monitor all SMTP based emails that are sent through email clients like Outlook,
Thunderbird, Outlook express, etc.

Shadow logging of the entire content of the SMTP email along with attachments

SMTP/ Microsoft Exchange Server Email Activity Control all SMTP based emails that are sent through email clients like Outlook,
Thunderbird, Outlook express, etc.

Monitor all Gmail webmail activity along with complete shadow log of the
outbound and draft emails

Control all the outbound Gmail webmail based email activity

Confidential & Private || ©Data Resolve Technologies || All Rights Reserved


End Point Monitoring/Control Activities Used cases covered by inDefend Solution

Monitor file uploads to any domain through browser i.e file uploads to dropbox,
personal emails like yahoo etc.

Shadow log of files uploaded to any domain through browser i.e file uploads to
dropbox, personal emails like yahoo etc.
File Upload Activity
Control file uploads completely by limiting them on the basis of the file types or
the destination where they are being uploaded etc.

Control file transfer over Skype and Windows Live Messenger

Track the destination server to which the files have been uploaded through
browser.

Control removable storage device media usage

Access-based policies on each Registered USB device for different end points

Set specific policies on CD/DVD access

Enforced encryption to encrypt the data transferred to external USB storage


Device Activity devices.

Blocking of Bluetooth/MTP/Local and Network Printers

Monitoring of all files being copied from computer to USB drive

Shadow log of files transferred from endpoint to external USB storage device

Internal access restriction on USB storage devices

Search Engine Activity Monitoring and logging of the web search engine activity

Content filter based alerts for email and file upload on the basis of defined
sensitive keywords, phrases, patterns (visa card, Pan card, contact numbers, etc.)
and file type
Content Filtering
Content filter based blocking for email and file upload on the basis of defined
sensitive keywords, phrases, patterns (visa card, Pan card, contact numbers , etc.)
and file type

Google Chat Activity Google hangout chat monitoring for outbound chat messages sent from endpoint.

Graphical representation of activities via Ranking graphs and pie charts

Augmentation of analytics section to show incident counts

Advanced Reporting and Analytics Framework for all kinds of device and network
activities

Strong Analytics & Incident Reporting Graphical representation of productivity of the users.

Analytics for top trending applications and websites being accessed in the
organization

Real-time incident alert notification on dashboard

Detailed incident forensics report

Confidential & Private || ©Data Resolve Technologies || All Rights Reserved


End Point Monitoring/Control Activities Used cases covered by inDefend Solution

Periodic screenshot to monitor detailed employee activity.

Event-triggered screenshot for sensitive application activity like IM, screen share
applications etc and sensitive window title-based activity.

Work schedule based incident monitoring

Audit Logs for admin activity

User first and last activity monitoring

Stealth mode to silently monitor activities

Offline monitoring & Controlling of end user activities

Temporary Policies for uplifting the user privileges for a defined duration

Customized reports download as per admin requirement

Password-protected uninstallation

Bulk installation on end user computers using Remote Deployment

Easy extraction of analytics and logs via PDF Reports feature


Other Valued Added Features
Admin activity Monitoring and Group Based Administration

Central management of agent version upgrades via server dashboard

Data at rest scanning for files stored on endpoint will act as audit tool in
identifying sensitive documents

Tamper proof

OCR based incident alerts for sensitive information

Supervised machine learning to understand organizations state, compliance,


productivity etc.

UBA module helps identify current state of organization to create tailor made
policies for DLP

Custom user notification at the endpoint

Transfer of policies between master slave architecture

Confidential & Private || ©Data Resolve Technologies || All Rights Reserved


Linux

End Point Monitoring/Control Activities Used cases covered by inDefend Solution

Monitoring browser activities i.e. access to Social Networking sites, Jobs & Career,
Browser Activity
Shopping portals, personal emails etc.

Monitoring applications Network activities i.e. download accelerators, torrents ,


Application Network Activity
Gaming applications, FTP, P2P applications etc.

Control removable s torage device media usage

Access-based policies on each Registered USB device for different end points

Set specific policies on CD/DVD access

Enforced encryption to encrypt the data trans ferred to external USB storage devices
Device Activity
Blocking of MTP/Local and Network Printers

Monitoring of all files being copied from computer to USB drive

Internal access restriction on USB s torage devices

Graphical representation of activities via Ranking graphs and pie charts

Augmentation of analytics section to show incident counts

Advanced Reporting and Analytics Framework for all kinds of device and network
activities
Strong Analytics & Incident Reporting Analytics for top trending applications and websites being accessed in the
organization

Real-time incident alert notification on dashboard

Detailed incident forensics report

Periodic screenshot to moni tor detailed employee activity

Audit Logs for admin activity

Stealth mode to silently monitor activities

Offline monitoring & Controlling of end user activities

Customized reports download as peradmin requirement


Other Valued Added Features Password-protected uninstallation

Admin activity Monitoring and Group Based Administration

Easy extraction of analytics and logs via PDF Reports feature

Work schedule based incident monitoring

Temporary Policies for uplifting the user privileges for a defined duration

Admin activity Monitoring and Group Based Administration

Data at rest scanning for files stored on endpoint will act as audit tool in identifying
sensitive documents

Supervised machine learning to understand organizations state, compliance,


productivity etc.

UBA module helps identify current state of organization to create tailor made policies
for DLP

Transfer of policies between master slave architecture

Confidential & Private || ©Data Resolve Technologies || All Rights Reserved


MAC
End Point Monitoring/Control Activities Used cases covered by inDefend Solution

Monitoring browser activities i.e. access to Social Networking sites, Jobs & Career,
Browser Activity
Shopping portals, personal emails etc.

Monitoring applications Network activities i.e. download accelerators, torrents ,


Application Network Activity
Gaming applications, FTP, P2P applications etc.

Control removable s torage device media usage

Access-based policies on each Registered USB device for different end points

Set specific policies on CD/DVD access


Device Activity
Enforced encryption to encrypt the data trans ferred to external USB storage devices

Blocking of MTP/Local and Network Printers

Monitoring of all files being copied from computer to USB drive

Internal access restriction on USB s torage devices

Blocking Bluetooth activity

Graphical representation of activities via Ranking graphs and pie charts

Augmentation of analytics section to show incident counts

Advanced Reporting and Analytics Framework for all kinds of device and network
activities
Strong Analytics & Incident Reporting
Analytics for top trending applications and websites being accessed in the
organization

Real-time incident alert notification on dashboard

Detailed incident forensics report

Periodic screenshot to moni tor detailed employee activity

Audit Logs for admin activity

Stealth mode to silently monitor activities

Offline monitoring & Controlling of end user activities

Customized reports download as peradmin requirement

Other Valued Added Features Password-protected uninstallation

Admin activity Monitoring and Group Based Administration

Easy extraction of analytics and logs via PDF Reports feature

Work schedule based incident monitoring

Temporary Policies for uplifting the user privileges for a defined duration

Admin activity Monitoring and Group Based Administration

Confidential & Private || ©Data Resolve Technologies || All Rights Reserved


End Point Monitoring/Control Activities Used cases covered by inDefend Solution

Easy extraction of analytics and logs via PDF Reports feature

Work schedule based incident monitoring


Other Valued Added Features
Temporary Policies for uplifting the user privileges for a defined duration

Admin activity Monitoring and Group Based Administration

Use Cases- SEG


> Shadow logging of mail and attachments
> Content Filtering (Monitoring)
> Information about sender & recipients
> Time stamp of e-mail transaction

Use Cases- SPG


> Monitoring of all print requests submitted to the secure printer gateway along with details of the file being printed
> Shadow logging of documents submitted for printing

Confidential & Private || ©Data Resolve Technologies || All Rights Reserved

You might also like