How to Prevent Data Leakage Depends on How You Regard Your Business
Powerful Enterprise Data Protection Weapon – Enterprise Data Guard System (EDGS) by Decision Group
From the report released by Mandiant on Feb. 19, 2013, it is horrible to know that there are some hacker groups working on cyber espionage into lots of global companies and government agencies in order to steal confidential business information. Government agencies usually have sufficient budget and resource to defend such cyber attack; however, private enterprises may or may not have enough facilities to protect from such malice cyber intruders. It is estimated that there were US$ 8.9 trillion loss in 2012 by confidential business data stolen in US enterprises.
Private enterprises usually regard IT security as network access control, antivirus, intruder and BOT prevention…etc, most of which are external security threats, but they seldom consider the issue of insider threats. Insider threats may not be caused by insiders. In the most times, cyber identity stolen by hackers is also the major reason of insider threats. Hacker with cyber identity of authorized personnel can penetrate lots of business critical systems inside enterprise and steal tons of confidential data. The worst part is that none in enterprise is aware that those data has been stolen at the very moment.
A skillful hacker usually uses very complicated and composite ways to penetrate secured enterprise network and steals useful confidential data for a period. It is really hard to identify hacker activities with hand-on utilities in very short time, because there are versatile of behavior patterns by hacker, especially with authorized cyber identity. However, IT security officer still can track down hacker behavior through network user behavior analysis system, such as abnormal network access out of office hours, abnormal huge amount of data retrieval, failure records of unauthorized access to business systems…etc. All these online activity data must be collected from network forensic system, which can intercept all traffic data directly from intranet and conduct certain level of behavior pattern analysis.
In the Far East area, where is the most hacker rampaging area, many multinational enterprises start to deploy such employee behavior management system by Decision Group to prevent from both internal threats and hacker activities. Enterprise Data Guard System (EDGS) by Decision Group isn’t designed only to monitor the online activities of enterprise email, databases, file servers and mission critical systems, but it can also provide detail provision information of user by network level and application level, such as network account ID, access time, period, application account ID, IP address, access device ID by X.500…etc. All these data can be analyzed for locating suspicious hacker and grunted employee behavior.
“We believe there is always trace after you have done something in cyber world,” said Casper Chang, CEO of Decision Group, “and Decision Group develops Enterprise Data Guard System (EDGS) for enterprises to easily comprehend what is going on in its secured network.” EDGS helps several enterprises to locate some data leakage incidents by inside employees for the past 5 years and mitigate the risk of multi-million US dollar loss.
“How to prevent data leakage from your network is actually how you look at your business.” Steve Wong, CIO of Chinese PCB manufacturer. We totally agree with Steve’s words. For those are serious about their own business in the market, they will protect their own confidential business data inside IT systems. Enterprise Data Guard System by Decision Group is just the powerful solution those enterprises must deploy in their secured IT network. If you are interested in our EDGS, please check out our website: http://www.edecision4u.com/edgs.html. We also welcome you to contact with us for the trial software downloading and network deployment.
About Decision Group
Decision Group, established in 1986, is one of the leaders in manufacturing of PC-Based Multi-Port RS232/422/425 Serial Cards, Data Acquisition, Measurement Products, Industrial Automation and Control Systems. Decision Group, from the year 2000, started new line of industry involved in designing and development of network forensic equipment and software for Internet Surveillance and Forensics Analysis Solutions.
Decision Group also provides OEM/ODM services of its network forensic solution with deep packet inspection (DPI) technology to other partners worldwide. Decision Group has also developed a comprehensive training course, known as Network Packet Forensics Analysis Training (NPFAT), and has set up training centers worldwide for hands-on training, with certification option as well.
The network forensic solutions by Decision Group are listed below:
- E-Detective (ED) - LAN Internet Interception, Monitoring and Content Analysis Solution
- Wireless-Detective(WD) - WLAN Internet Interception and Content Analysis Solution
- E-Detective/LEMF Suite – lawful interception on telecom network with iMediator, iWarant, iMonitor, Data Retention Management System and Centralized Management System, which is compliance with ETSI standard
- Enterprise Data Guard System (EDGS) – Data and IT resource monitoring system for enterprise intranet
- EDDC - Offline Internet Packet Reconstruction Solution
- HTTPS/SSL Interceptor - LAN HTTPS/SSL Interception Solution
- VoIP-Detective - Voice over Internet Protocol (VoIP) Interception Solution
- NIT - Network Investigation Toolkit
- FIT - Forensics Investigation Tool (MS Windows based)
- NPFAT - Network Packet Forensics Analysis Training
- Cyber Crime Investigation Training - Field Training on the procedure of cyber crime investigation with legal procedure, methodology of data analysis and so on.
- National Security Training – Training on national surveillance deployment and case study
About Decision Group
Decision Group, established in 1986, is one of the leaders in manufacturing of PC-Based Multi-Port RS232/422/425 Serial Cards, Data Acquisition, Measurement Products, Industrial Automation and Control Systems. Decision Group, from the year 2000, started new line of industry involved in designing and development of equipment and software for Internet Surveillance and Forensics Analysis Solutions.
Decision Group also provides OEM/ODM services of its network forensic solution with deep packet inspection (DPI) technology to other partners worldwide. Decision Group has also developed a comprehensive training course, known as Network Packet Forensics Analysis Training (NPFAT), and has set up training centers worldwide for hands-on training, with certification option as well.
More Information and Contact by Email: decision@decision.com.tw
URL: www.edecision4u.com (Global), www.internet-recordor.com.tw (Taiwan), www.god-eyes.cn (China), www.decisionjapan.com (Japan) , www.decision-groups.com (Singapore), www.e-detective.de (Germany), www.edecision4u.fr (France), www.edecision4u.es (Spain and Latin America) |