A solution for security check and on-site audit
Supervision of External Personnel (case of information leakage detection)
Stage 1 Preparation |
- Apply SecuIN Agent to employees - Require the external employee to install SecuIN Agent when accessing the internal network |
---|---|
Stage 2 Monitoring |
- Copy data from USB storage media - Monitor creation of files with specific extension such as xls - Monitor creation of high-volume file |
Stage 3 Risk Detection |
- Identify malpractice - Notify to the security manager (security console alarm, E-Mail transmission, SMS transmission) |
Stage 4 Analysis/Investigation |
- Analyze and investigate in details the malpractice using online forensic tools(Qator Enterprise) |
Stage 5 Securing Evidence |
- Secure log of malpractice - Secure evidence data through online forensic analysis (screen capture of malpractice, securing list of saved file, disk imaging, etc.) |
Company K has detected information leakage through constant monitoring and supervision of the in-house work details of external personnel connected to the internal network