aetos-it products and services infowatch

39
Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria www.aetos-it.co.za

Upload: christa-pretorius

Post on 07-Aug-2015

154 views

Category:

Documents


4 download

TRANSCRIPT

Block C, Castle Walk Corporate Park,

3 Kuiseb Street, Erasmuskloof,

Pretoria

www.aetos-it.co.za

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 2 of 39

BACKGROUND

1. AETOS-IT PROFILE......................................................................................................... 3

1.1 Cloud Solutions Audit of Human Capital....................................................................

1.2 Audit of Customer Relations via CRM Pipeliner and System Code via Hawkeye &

APOD...........................................................................................................................

1.3 Aetos-it Shareholders...................................................................................................

3

4

5

AGREEMENTS

2. AETOS-IT PARTNERS..................................................................................................... 6

2.1 EY.................................................................................................................................

2.2 Dimension Data............................................................................................................

2.3 Biotic Health Corporation............................................................................................

2.4 Matsei............................................................................................................................

2.5 Apace Systems………………………………………………..………………………

2.6 InfoWatch……………………………………………..………………………………

6

6

6

6

7

7

PRODUCTS

3. AETOS-INFOWATCH APPERCUT…………………………………………..………...

3.1 X-Ray for Business Applications…………………………………………………....

3.2 11 Reasons to use AETOS-INFOWATCH Appercut…………………………….…..

4. AETOS-INFOWATCH ENDPOINT SECURITY………………………..……………...

4.1 Control of employees’ access to valuable data……………………………………...

4.2 Automatic monitoring of unauthorized employee activity…………….………...

4.3 Data control during copying and storing, on premises and in the cloud……………. 4.4 Protection against data theft from lost laptops or flash drives………………………

4.5 Application Control………………………………………………………………….

4.6 Benefits for Business………………………………………………………………..

5. AETOS-INFOWATCH TRAFFIC MONITOR ENTERPRISE….…………………..…..

5.1 AETOS-INFOWATCH Traffic Monitor Enterprise protects your company from….

5.2 AETOS-INFOWATCH Traffic Monitor Technologies and Capabilities…………...

5.3 Key Benefits of AETOS-INFOWATCH Traffic Monitor…………………………..

8

9

9

11

14

14

15

17

17

22

24

26

29

37

TABLE OF CONTENTS

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 3 of 39

1. AETOS-IT PROFILE

AETOS-IT (Pty) Ltd Company Reg no: 2014/054899/07 emerged in January 2014 from the

amalgamation of several business solutions, into one company. The flagship business solution,

Hawkeye & APOD was launched in 2009 by the current owners of AETOS-IT. AETOS-IT is a

South Africa registered company whose main focus is the Audit of Technology systems, Audit of

Human capital and IT Consulting. We are the preferred supplier of Intelligent, Innovative &

Integrated Corporate Enterprise Solutions across South Africa and the rest of Africa.

1.1 Cloud Solutions Audit of Human Capital

1.1.1 Indaba Health & Wellness: Health and Behaviour Integrated Tool (HABIT)

An interactive, on line system, for behaviour modification with evidence based

monitoring. It combines Behaviour analysis with targeted e-learning and vital

statistic monitoring. It's an all-encompassing pro-active health and wellness

program for promoting health awareness. It teaches the participants precisely how

to modify their behaviour based on unique physical and behaviour tendencies. It

addresses the need for targeted health and wellness education through annual H&W

plans and personalised prevention plans. Evidence based monitoring is available

through a variety of sensing monitors of your choice and requirements. Encourages

compliance and verification of learning and progress. Can reduce insurance

underwriting costs and generate revenue for industry.

1.1.2 AETOS-IT / Profiles South Africa International

Aetos has a complete catalogue of state of the art occupational assessments that

target all phases of employment, from selection and hiring to training, self-

coaching and management of performance levels.

Profiles give Aetos-IT the market edge in areas of:

Recruitment & Selection,

Talent Management

Improving Workforce Productivity

Reducing Employee Theft & Fraud

Reducing Absenteeism

Improving Customer Service

Improving Call Centre Performance

Improving Sales Force Productivity

Reducing Voluntary Turnover

Doing more with fewer People

Manage Performance

BACKGROUND

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 4 of 39

Manage Organisational Change

Improving Morale

Improving Coaching & Monitoring

Succession Planning

Career Pathing

Helping Managers Succeed

Building High Performance Teams

Building a performance Culture

Building a Competency Model

1.2 Audit of Customer Relations via CRM Pipeliner and System Code via AETOS-

HAWKEYE & APOD

1.2.1 Client Relationship Management System Pipeliner

Aetos-It is proud to be the only distributer partner of the most innovative CRM

software solution (cloud) in South Africa. With Pipeliner CRM we introduced new

ways of looking at sales and at the sales pipeline by making it more visual and more

interactive. The interactive user interface allows sales professionals to manage their

most important data with just a few clicks of the mouse.

It gives minimum risk and secure business whilst focussing on the future successes

of the company. "What Amazon is for books Pipeliner is for sales". Pipeliner allows

us to capture, monitor and promote sales activities whilst being fully visible at all

times in the cloud. It integrates all sales activities with client’s relations and allows

the company to manage its sales goals as it affects income. Monitoring can be done

on individual or group sales activities. It has a clear and colourful sales pipeline

which integrates all sales activities on a dashboard with the click of a mouse.

1.2.2 System Code Audit and analyser- AETOS-HAWKEYE & APOD

Consulting is provided for the installation, configuration, interpretation of results,

training of users, project management and program correction/remediation

services. The principals of Aetos IT have been providing consulting services for

over 20 years in the information technology sector. With expertise in large scale

systems implementations and extensive experience managing programming teams

and software implementation projects Aetos IT is well positioned to provide

consulting services associated with the advice & products we sell.

Consulting - Product\Tools

This covers the setting up of the system and the setting of coding guidelines (the

rules) in consultation with the client. Pricing subject to clients requirements and

can be estimate for each landscape that the client requires scanning.

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 5 of 39

Consulting - Remedial work

This covers the placing of required skills to carry out remedial work. The cost of

consult depends on a variety of factors including the availability of the specific type

of resource required and the volume of work that is anticipated. It can take several

week or months to acquire the resources required depending on these factors.

Implementation Process

The implementation of the Aetos IT tools follows the path set out below. We

“Setup” the system by installing it for scanning, we “Scan” your code and we

“Validate and Configure”. At “Implementation” the system is up and running.

1.3 AETOS-IT Shareholders

The shareholders are:

Mr. Andrew Jansen van Vuuren - CEO of AETOS-IT (Pty) Ltd;

Mr. Rob Kading – IT Executive;

Mr. Collins Khumalo – Chairperson of AETOS-IT;

Mr. Jacob Ngakane – Professional engineer with expertise in manufacturing, mining and

development;

Mr. Emmanuel Christofides – Business Development Executive;

Mrs. Misti-Aletia Jonker – Corporate Executive;

Dr. Louis Powell – Health Advisor;

Mr. Lloyd Peter Chisholm – Financial Executive.

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 6 of 39

2. AETOS-IT PARTNERS

2.1 At EY, we are committed to building a better working world — with increased trust and

confidence in business, sustainable growth, development of talent in all its forms, and

greater collaboration. We want to build a better working world

through our own actions and by engaging with like-minded

organizations and individuals. This is our purpose — and why

we exist as an organization.

Strategic Alliance Agreement (effective 17 October 2014)

2.2 Dimension Data’s passion is to find ways to use ICT to make our clients’ business work

better. We turn your ambitions into achievements. We will position you to respond to

today's challenges, with targeted, pertinent services and IT

solutions. We ensure your business is supported by a robust

networking platform and help you optimise the performance

and availability of the unified communications and

collaboration tools that run on it – including desktop and

contact centre technologies.

Teaming Agreement (effective 27 January 2015)

2.3 Biotic Health Corporation is an impact-orientated company with the core objective of

promoting healthy lifestyles of consumers through managed health interventions. We

work with employers and communities together with the health

ecosystem to deliver tailored solutions that enhance the well-

being of individuals throughout Southern Africa. Our

interventions enable individuals to realise their full well-being

which translates into greater productivity, increased revenue,

reduced costs and increased morale in the workplace and

community.

Strategic Agreement (effective date 10 February 2015)

2.4 Matsei’s experience centres on the design, provision and effective implementation of IT

solutions into the Public Sector in general as well as specialising in solutions for both the

Military and Industry domains of the Aerospace and

Defence, Utilities, Telecommunication, Transportation,

Financial Resources and Health sectors. Matsei provide and

support a complete range of quality Enterprise -Business -

and Solution Architecture services, System Engineering,

Integration support as well as Data and Business Solution

(ERP, EAM, MRO and ECM solutions) Implementation

services. Strategic Partner Agreement (effective 25 October 2014)

AGREEMENTS

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 7 of 39

2.5 Apace Systems set out to create an independent switch that is fast, secure, open and easy

to use, and that could be used throughout anywhere in the world with no country-specific

restrictions while abiding by each country's local regulations

and requirements. Best practices were adhered to from the

start, which makes the system flexible to each client's needs

and the requirements of their country or regulatory body.

The apace switch is a type-agnostic switch that can handle

data across any industry and format. It provides multiple

connectivity options and abides by the highest forms of

security. Built as a completely pluggable interface it can

enable specific features as and when required. Transactions

can be processed in real-time, as batch or as a hybrid where

transactions are received as batch, but passed to the backend

as real-time.

Strategic Partner Agreement (effective 17 March 2015)

2.6 InfoWatch is a group of innovative technology companies focused on developing and

providing cutting-edge comprehensive technologies and services dedicated to Data Loss

Prevention & Protection, Intellectual Property Protection,

Customer Experience and Reputation Management, as well

as Risk Management and Compliance solutions. InfoWatch

products allow clients to reduce to a minimum the risks

associated with the processing, movement and storage of

information within the corporate secure area and outside it.

InfoWatch's integrated solutions not only protect

information, but automatically collect a body of evidence

that can be used in administrative and legal proceedings in

the event of a violation of the rules governing corporate

information assets by company employees.

Strategic Partner Agreement

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 8 of 39

3. AETOS-INFOWATCH APPERCUT

AETOS-INFOWATCH APPERCUT is a solution which provides an automate verification of

business application source code for compliance with the requirements for custom software

development. It is an essential code checking tool for compliance with regulator requirements,

recommendations of the manufacturers of programming languages and platforms, and also for

vulnerabilities, code documenting, variable naming conventions, code portability. They are specific

for particular business process requirements.

AETOS-INFOWATCH Appercut has been created for companies who order customized software

development and do not require expertise in software development or code verification. The

application code and its update or module can be optionally checked within a few seconds,

after which the system automatically generates a compliance report and makes

recommendations for fixing the detected problems.

AETOS-INFOWATCH Appercut helps customers of software development verify business

applications without special expertise in software development or code auditing. Compared to

manual code analysis, Appercut’s automatic verification ensures higher speeds and better

analysis, and significantly reduces the costs for the services of third-party auditors. Unlike classic

vulnerability scanners that work at the level of data flow graphs, Appercut supports easy

configuration and adapts to the requirements of a specific application.

Appercut can detect code problems that are common to a language or platform, as well as check

for structures which are specific to a particular business context (design):

rules for critical data flow;

ways to implement specific functions;

AETOS-INFOWATCH Appercut analyzes the source code of business applications created in the

most common programming languages: ABAP/4, Java, JavaScript, PeopleScript, PL/SQL, T-SQL,

С, С++, C#, ASP, Delphi, Python, Visual Basic, Lotus Script, PHP, Ruby, etc. It uses lexical

analysis to review source code. The results of this analysis do not depend on implementation of

the general logic of the audited business application. Both an arbitrary code fragment (such

as a module, an update, or even a single line of code) and also an entire business application can

be analyzed.

PRODUCTS

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 9 of 39

3.1 X-Ray for Business Applications

AETOS-INFOWATCH Appercut is a solution complaint with a full range of efficiency and

security requirements. Its flexibility allows it to be adapted to a particular business application or a

company’s unique business processes.

AETOS-INFOWATCH Appercut is an easy-to-use, flexible solution that allows step-by-step

implementation of a code revision scenario in order to improve a company’s data security policies.

3.2 11 Reasons to use AETOS-INFOWATCH Appercut

CHOICE

AETOS-INFOWATCH Appercut is provided as both a public cloud service and

with a standard software product license.

RANGE OF FEATURES It is designed to cover a wide range of efficiency and security requirements for

software development: PCI DSS and HIPPA requirements, CERT and OWASP best

practices, SDLC recommendations, and recommendations of the following platform

vendors: SAP, Oracle, Microsoft.

EASY-TO-USE To start the analysis process the code only needs to download the application

code (or a fragment of it) in AETOS-INFOWATCH Appercut and receive the

analysis results instantly. No special knowledge or coding skills are required to obtain

or interpret the results of code verification.

LIGHTNING FAST ANALYSIS It takes only a few seconds to complete code verification. No need to stop business-

critical applications to do hard and time-consuming manual code checking or external

auditing.

Contract developers

Regulatory Compliance

Best Practices

Security Recommendations

InfoWatch Appercut

In-house Developers

Source Code

Compliance Report

Custom-build applications

Enterprise SDLC

Application Standard

s Standards Specific Demands

Change Request

InfoWatch Appercut Knowledge Base

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 10 of 39

PROACTIVE EFFECT Experience has shown that using AETOS-INFOWATCH Appercut for automated

detection of backdoors prevents the majority of software developers from making any

wrong moves.

INDEPENDENT SOLUTION AETOS-INFOWATCH Appercut is not affiliated with business application vendors,

software customization professionals, or consulting companies, and, therefore, is free

to disclose the shortcomings of languages and platforms.

OPEN ARCHITECTURE AND FLEXIBILITY AETOS-INFOWATCH Appercut users can add to the database of incorrect

code patterns by adding templates that correspond to the specific business

processes of their organization.

INTEGRATION Command line interface allows users to integrate calls to AETOS-INFOWATCH

Appercut and embed source code analysis in any Software Development Life Cycle

procedure during its lifecycle, from coding to acceptance.

INVESTMENT SAVINGS AETOS-INFOWATCH Appercut cloud service offers a wide choice of rates —

from line-based to unlimited. The standard software implementation of AETOS-

INFOWATCH Appercut also offers flexible licensing, which includes Standard,

Enterprise and Enterprise-Unlimited options. Since AETOS-INFOWATCH Appercut

is licensed by the number of installation servers and not by the number of projects

analyzed (or the number of environments developed), companies of all sizes can find

an option that meets their needs.

SUPPORT FOR MULTIPLE LANGUAGES Code analysis is supported for the following common languages used in business

application development: ABAP/4, Java, JavaScript, PeopleScript, PL/SQL, T-SQL,

С, С++, C#, ASP, Delphi, Python, Visual Basic, Lotus Script, PHP, Ruby etc.,

as well as the proprietary scripting languages of workflow automation platforms such

as АBS, ERP, CRM, and analytical systems.

SCALABILITY AETOS-INFOWATCH Appercut license allows users auditing any number of

applications in all of the supported languages any number of times regardless of

whether these applications were developed in-house or by third-parties.

InfoWatch Appercut

Custom Code Scanner

Security Check Coding Testing Acceptance

Best practices Enterprise Standards

Platform Vendor Recommendations

Compliance, Commenting Style, Portability

OWASP, CERT Application

Specific Vulnerabilities, Critical Data Operations

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 11 of 39

4. AETOS-INFOWATCH ENDPOINT SECURITY

A great tool for optimizing workflows, improving employee productivity, reducing financial losses

and damage to reputation, and cutting the costs of protecting your infrastructure and information.

AETOS-INFOWATCH EndPoint Security targets the typical tasks facing small and medium

businesses. This solution is specifically designed to:

Discover resources for improving business efficiency;

Take over control of employee productivity;

Guide employees in handling data that are crucial to business efficiency,

operating company equipment, reducing power costs and eliminating personal

use of company resources;

Increase savings on personnel recruitment and training, and reduce the need

for additional equipment;

Enable regulation compliance regarding information security and the protection

of devices used for data storage.

What are the main causes of low

business efficiency?

What type of information are lost on

flash drives?

Disarray, chaotic

workflow systems

Contracts & other

legal documents

Employees’

«idleness»

Development

plans, incl.

marketing strategy

Employee distracted

by playing games and

viewing entertainment

content

Financial data

Client/supplier

databases

Employee leaving

companies with client

databases; client

poaching

Other

40%

55%

25%

55%

55%

35%

3%

5%

2%

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 12 of 39

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 13 of 39

70% If the data on a laptop are encrypted, the

cost of losing the device equals the price

of the laptop; if not, the loss will amount

to hundreds of thousands of Rand.

EndPoint Security allows losses to be

minimized, protecting valuable data.

40% of employees spend their work time on

personal activities, such as, viewing

entertainment content and videos, playing

computer games etc. EndPoint Security

reduces this percentage substantially.

of employees keep highly confidential

company data (including financial

documents, client and supplier databases, and

personal information) on flash drives for easy

access during meetings, business trips,

conferences, for work remotely etc. Of

those flash drives, 60% are regularly lost or

forgotten, exposing client databases to

competitors, which causes irreparable loss for

businesses. EndPoint Security helps prevent

such consequences.

96% of small to medium companies have to deal

with client database losses every year.

EndPoint Security is designed to eradicate

this problem.

«Idleness» 68% The average loss suffered by small to

medium companies because of

employees’ «idleness» amounts to 10% of

their monthly income.

EndPoint Security eliminates the cost of

personnel inefficiency.

Computers running during off-work hours

is standard practice in many offices. In

30% of such cases these PCs are accessed

by third parties who copy the data to

portable media.

EndPoint Security eliminates such

incidents by switching off employees’

computers at the end of the working day on

a regular schedule, which also reduces

power costs.

of companies with less than 200 employees

are exposed to attacks which target files

stored in the cloud.

EndPoint Security provides secure remote

storage, encryption and control of access to

data in the cloud.

4 out of 5 companies lack proper defense against

malicious software that is brought into the

office by employees on flash drives and other

media.

EndPoint Security provides comprehensive

control of device connection to company PCs

and the data on those devices, safeguarding

PCs from dangerous applications.

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 14 of 39

4.1 Control of employees’ access to valuable data

Employee actively use portable media, flash

drives, tablets, smartphones and other

communication devices at work, which implies

considerable risks of valuable information being

copied and used for personal purposes. This

may cause irreparable harm for a company’s

business and reputation. A virus from an

employee’s flash drive might compromise a

company’s entire IT infrastructure, blocking the

operation of core business units for several

hours or days.

AETOS-INFOWATCH

Endpoint Security allows

increased efficiency of

workflow management and

ensures tiered access to external

devices for employees.

AETOS-INFOWATCH

EndPoint Security can manage

more than 24 types of devices

and external media!

The solution enables full control of access to devices, ports, network interfaces and

catalogues, and to cloud storage systems. It offers a variety of features to control access

rights:

By means of black and white lists of devices;

By device models (with exclusive access to devices according to the list of authorized

device models);

By serial numbers of devices (with exclusive access to devices with certain serial

numbers, irrespective of user privileges);

Through a list of authorized media and a list of authorized wireless networks (with

exclusive access to authorized Wi-Fi networks).

4.2 Automatic monitoring of unauthorized employee activity

An employee’s working day can be quite

diversified, including: playing computer

games, watching movies, or printing

documents for personal use. 70% of

companies do not track employees’

activity during work time, or the files and

data they bring in or take away with

them. This information is not registered

in any way.

AETOS-INFOWATCH EndPoint Security supports event logs and allows the discovery of unauthorized handling of valuable information by employees. Automatic report generation enables the discovery of bottlenecks in the operations of office employees and extra resources to be located to enhance their productivity.

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 15 of 39

Event log in AETOS-INFOWATCH EndPoint Security display user activities per

employee: i.e., who performed certain operations and when (reading, copying, creating

or deleting data) using removable media, phones, Wi-Fi networks, network folders, and

cloud storage. The shadow copying feature allows to files specified in the logs directly

from the product console.

4.3 Data control during copying and storing, on premises and in the cloud

Small to medium companies

actively use the cloud to store

and exchange information, but

only a small percentage of these

companies make sure their cloud

data are protected. Over 80% of IT

specialists are not even aware of

the amount of data stored in the

cloud, let alone the nature of those

data or their value for the business

AETOS-INFOWATCH EndPoint Security

monitors all files uploaded to

Dropbox, OneDrive, Google Drive,

Yandex.Disk, or Box Sync by

employees and authorizes external

storage of files based on document

type and data format.

AETOS-INFOWATCH EndPoint

Security allows to share files over the

cloud storage, eliminating concerns

about data security

Clients can choose a separate data encryption method for each cloud provider.

Encryption keys are stored at the client’s site, not in the cloud, which ensures that

they are never exposed to outsiders. Encryption is performed transparently at file

level, so that employees are not involved in the process. This eliminates the

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 16 of 39

possibility for employees to ignore or bypass this mechanism or to distribute

unprotected confidential documents outside the company.

Encryption with AETOS-INFOWATCH EndPoint Security is:

Easy: Transparent:

Data encryption does not

interfere with employees’ work

and does not disrupt production.

Data are automatically

encrypted when recorded to

media and decrypted when

copied to hard drives

Safe: Flexible:

The loss or theft of media does

not lead to data abuse by

outsiders.

Solving various business

problems through encryption:

you can grant access to

encrypted files to all company

employees, to a group of users

(e.g., employees of a given

department) or to a single

employee.

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 17 of 39

4.4 Protection against data theft from lost laptops or flash drives

Portable media and

laptops are the

weakest link of any

corporate

infrastructure, as

they are very often

lost or forgotten by

employees

AETOS-INFOWATCH EndPoint Security offers an easy

and effortless way of protecting information through

encryption. By enabling encryption in AETOS-

INFOWATCH EndPoint Security, you can significantly

enhance the security of stored data:

– No outsiders can read the data

– The theft or loss of devices do not cause information

leaks

– All data are automatically encrypted at creation without

interference for employees, or requiring additional work

by IT personnel (transparent encryption)

The solution enables data encryption on laptops, PCs, external devices, network drives,

and in cloud storage directories.

The encryption is carried out in the background and is fully transparent to employees. The

solution employs the AES–256 OS encryption algorithm with 1,024 to 4,096-bit key

lengths.

AETOS-INFOWATCH EndPoint Security provides two ways of enabling encryption:

optional, by employees, and mandatory, by system administrators. The mobile encryption

feature of AETOS-INFOWATCH EndPoint Security allows secure off-site data

processing.

4.5 Application Control

Games, movies, music, and entertainment

content… Are you sure that your employees

aren’t watching a new film at work right

now? That they are not playing games? What

tools does your company use to monitor these

problems?

Uncontrolled use of various applications by

employees reduces their productivity,

causing them to lag behind with tasks, which

eventually leads to business losses because of

inefficiency.

AETOS-INFOWATCH EndPoint

Security allows businesses to

manage the launch of applications

and control employees’ access to

applications by means of white lists

(of authorized applications) and

black lists (of blocked

applications). This feature

guarantees that no prohibited

applications or files are installed or

launched on any company PC.

The solution includes a learning mode; in this mode the product automatically tracks

applications launched from employees’ PCs and generates a list of trusted applications.

This feature can be used to create a list of trusted applications categorized by applications

developer and extension or file signature, and to setup rules for launching applications for

individual employees, workstations, etc.

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 18 of 39

Classic features of AETOS-INFOWATCH EndPoint Security are described by a simple acronym

C.A.F.E. – revealing the concept of the product as an easy and robust protective tool to assist the

development of a growing company:

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 19 of 39

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 20 of 39

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 21 of 39

Perfect for small and medium

business

Fits the needs of any company,

irrespective of industry or profile

Alert to companies’ business

processes

Available even for small budgets

Intuitive and user-friendly

Easy installation and setup

No extra network load

Inconspicuous to employees

Compatible with any software,

programs

A single management console

Offline client

InfoWatch

EndPoint

Security Agent

InfoWatch EndPoint Security:

Control over connections to external devices

Audit of user activity

Filtering by data type

Encryption of data written to portable

media, network folders and cloud storage

Domain Controller

Novell e Directory

Management console

Management console

for iPhone

InfoWatch

EndPoint Security

Server

SQL Server TAN

InfoWatch EndPoint

Security Agent

InfoWatch EndPoint

Security Agent

InfoWatch EndPoint

Security Agent InfoWatch Endpoint

Security

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 22 of 39

4.6 Benefits for Business

Reduction of business costs and financial losses

– AETOS-INFOWATCH EndPoint Security substantially reduces the risks

associated with data leakage: client databases copied to flash drives and

passed to competitors may well put a company out of business. The product

eliminates the risk of loss or theft of valuable information because its

encryption feature can be used for any portable media and laptops, or for data

transferred to cloud storage.

– The solution reduces bandwidth consumption: AETOS-INFOWATCH

EndPoint Security settings allow most traffic-consuming operations that

are not job-related to be eliminated.

– The solution reduces personnel costs: it incorporates very simple

installation, setup and management procedures that can be performed

without hiring a qualified administrator or IS officer.

– The solution reduces power costs: its power control feature allows PCs to

be switched on and off on a regular schedule, if employees forget to do so.

– The solution reduces the cost of additional hardware, services and

applications: AETOS-INFOWATCH EndPoint Security does not require

the purchase of any extra hardware or software, and because of its

encryption system many business features, such as document workflow

management, can be deployed in the cloud, which facilitates clear cost

reduction.

All necessary features in one product

AETOS-INFOWATCH EndPoint Security does not contain any unnecessary

functionality. All tasks concerning protection of information are integrated

in the single user-friendly interface, which covers only decisive aspects of

information security.

Business process awareness

AETOS-INFOWATCH EndPoint Security is easily adjustable to company

workflows because of its modular, multicomponent structure: by pinpointing

weak points in your business processes, you can provide targeted protection

for such areas without restricting access to assets that are needed to complete

the company’s work.

Robust and high-quality product

Only 1% of 1,000 companies that have installed AETOS-INFOWATCH

EndPoint Security require support services. Faultless operation of the

product eliminates concerns for system administrators, management and end

users.

Extreme simplicity and usability

AETOS-INFOWATCH EndPoint Security can be installed and configured

in 20 minutes, without any special qualifications or training, and it can be

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 23 of 39

managed with a few clicks. The simplicity of these procedures is facilitated

by the intuitive interface and business logic of the product.

Affordable even on a small budget

The price of AETOS-INFOWATCH EndPoint Security fits into the

operating budget of any company.

Compatibility and productivity

AETOS-INFOWATCH EndPoint Security is fully compatible with any

corporate devices, systems and applications.

AETOS-INFOWATCH EndPoint Security is a simple and efficient solution for workstation and

data protection on endpoint devices for companies of any size and in any sphere of activity.

Whether your customer is a bank or an insurance company, they will find the product very useful.

Product installation does not take long: it can be installed and configured in 15 minutes and fully

implemented within 2 days. No training of personnel is required as this is a user-friendly and

simple to configure solution. It is designed to operate automatically, without taking time away

from employees and IT staff to learn and "get used" to it. Once the rules are set, you will only

perform regular audits to check what employees have taken from the company.

It's a custom-built solution: you can flexibly configure the modules and buy only those features

that your customers need to perform their tasks. This solution will help you raise corporate security

to a new, higher level.

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 24 of 39

5. AETOS-INFOWATCH TRAFFIC MONITOR ENTERPRISE

AETOS-INFOWATCH Traffic Monitor Enterprise is a comprehensive solution for data

protection, loss prevention and monitoring the transmission of sensitive information outside a

company, as well as for the protection of the company from internal threats.

Monitoring &

Analysis data

Automatic

Classification of

Information

transmitted

Prevention &

detection of sensitive

data leakage

Secure storage of

data for analysis and

investigation

A Fresh look at Data Leakage Protection (DLP)

Holistic Approach to Traffic Analysis and Data Protection

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 25 of 39

DLP system makes a decision whether there is a data leak or not

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 26 of 39

5.1 AETOS-INFOWATCH Traffic Monitor Enterprise protects your company from:

5.1.1 Insider Activity

5.1.2 Conspiracies

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 27 of 39

5.1.3 Identifying Corrupt Schemes

5.1.4 Industrial Espionage

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 28 of 39

5.1.5 Working for Competitors

5.1.6 Theft of Personal Data

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 29 of 39

5.1.7 Poaching clients personal data

5.2 AETOS-INFOWATCH Traffic Monitor Technologies and Capabilities

5.2.1 Business Applications data analysis

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 30 of 39

A database is an essential part of any business application

that contains clients' personal information, commercial or

project documentation and other confidential

information, the uncontrolled distribution of which may

damage your business.

Data extraction from business applications is detected

through the Database Extraction Detector. This feature

instantly discovers data transfer from a database, blocks

unauthorized distribution of data, and serves as a source

of digital evidence for the investigation of an incident or

a court hearing.

5.2.2 Control the transfer of different types of data

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 31 of 39

5.2.3 Control the document flow

5.2.4 Control hard copies of documents

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 32 of 39

AETOS-INFOWATCH Traffic Monitor monitors and

intercepts print jobs on any type or model of printer and

tracks the number of printed copies.

Besides monitoring printed copies, AETOS-

INFOWATCH Traffic Monitor tracks the circulation of

scanned documents with the help of OCR (optical

character recognition) technology. It detects scanned

copies of confidential documents and controls internal as

well as outward transfer of such copies.

5.2.5 Eliminating illegal data storage

A customer places confidential files on public network

storage.

DLP system will detect the violation of the confidential

files storage policy, and will notify the information

security officer.

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 33 of 39

5.2.6 Identify disloyal Employees

In tracing the pattern of possible threats,

AETOS-INFOWATCH Traffic Monitor

relies on more aspects than traditional

DLP systems because of its built-in tools

for communication with the HR

department. The product allows the

configuration and application of special

targeted policies for monitoring personnel

included in certain 'at risk groups,'

generating reports on their activity and

applying stricter security policies.

We recommend including the following

types of employee in an 'at-risk group':

Employees on probation

Employees who have handed in their

resignation

Employees who display suspicious recent

activity

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 34 of 39

5.2.7 Control of Mobile Employees

AETOS-INFOWATCH Traffic Monitor enables:

Monitoring and analysis of all messages sent and

received by employees via corporate mail through mobile

devices on iOS, Android and other platforms.

Internal and external monitoring of information on

employee laptops:

Application agents stay active even if laptops are taken

away from company premises, submitting collected

information for analysis when the PCs reconnect to the

corporate network.

Because of its network connection control technology,

Internet access from employee laptops outside a

company's premises is only possible through the

corporate network gateway, which guarantees control

over all network traffic.

5.2.8 Monitoring access abuse

AETOS-INFOWATCH Traffic

Monitor allows the setting of different

threat levels based on user type and the

amount or categories of accessible

information. Each threat level is

associated with a corresponding

response. Thanks to the access abuse

function, an IS officer can detect both

intentional violations of policy and

negligent handling of confidential data

by employees.

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 35 of 39

5.2.9 Incident investigation and Prevention of confidential Information leaks

AETOS-INFOWATCH Traffic Monitor prevents leakage of confidential

information, protects intellectual property, investigates IS incidents related to

unauthorized employee activity, discovers collusion, and identifies the culprits and

their accomplices.

AETOS-INFOWATCH Forensic Storage is an archive which contains all

intercepted data. This enables tracking of information routes and unauthorized use

of corporate resources, and identifies the sender and receiver of information. It

serves as a trusted evidence base source for thorough analysis and investigation of

incidents related to confidential data leaks.

Prevention of information leaks is carried out through monitoring, interception, and

analysis of all company information flows, which is based on defined information

security rules and policies.

What happens to transmitted data?

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 36 of 39

AETOS-INFOWATCH technology supports document recognition and analysis

even in the case of small text fragments which can be copied into any document

and sent in informal communications or via IM systems.

AETOS-INFOWATCH Traffic Monitor enables:

Control of data transmitted via corporate email, Internet resources, and file

sharing protocols (SMTP, HTTP, HTTPS, FTP)

Control of instant messaging systems (ICQ, Skype, Mail.ru Agent, GTalk, etc.)

Control of voice traffic (Skype)

Control of device and port use on workstations

Control of network connections of workstations

Shadow copying of documents printed or copied to removable media

Prevention of confidential information leakage by blocking the transmission of

data in cases of security policy breach

Possible scenarios for leaks

5.2.10 Control of Document Versions

AETOS-INFOWATCH Traffic Monitor Enterprise

enables automatic updating of the digital

fingerprint database if source documents are

changed. In this way, Object Detector always

works with the most recent reference documents

database.

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 37 of 39

5.3 Key Benefits of AETOS-INFOWATCH Traffic Monitor

5.3.1 Web Interface

5.3.2 Business Engagement

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 38 of 39

5.3.3 Information Flow Analysis

5.3.4 Performance and Resiliency

5.3.5 Building a Safe Environment

AETOS-IT: PRODUCTS & SERVICES www.aetos-it.co.za

31 March 2015 Block C, Castle Walk Corporate Park, 3 Kuiseb Street, Erasmuskloof, Pretoria

T: 082 560 9134

Page 39 of 39

5.3.6 Forensics: Detection and Investigation of Incidents

5.3.7 Quick Response to Incidents