Data Resolve mission is to monitor all end-points and provide control, reporting to users/organizations

Data Resolve Technologies is started by group of alumni’s from IIT Kharagpur with client base on End-point Security Analytics in Indian and International market. An exclusive interview with Mr. Dhruv Khanna, CEO and Founding Team Member of Data Resolve Technologies Pvt Ltd for INFOSECURITY.

 

How is Data Resolve positioned in India as a pureplay security vendor?

inDefend Business is the next generation technology which uses Cyber security intelligence as a unique approach towards reducing the business risks of a company through intelligent analysis of the information flowing within and outside the company’s network.

It is just not a Data Leak Prevention Software, it’s a 360 degree approach to protect data from insider threats. inDefend is uniquely positioned to handle data throughout its lifecycle.

2) What are the major areas, Data Resolve currently focusing?

Data Resolve mission is to monitor all end-points and provide control, reporting to users/organizations. Our inDefend product offers:

Employee Monitoring & Behaviour Analysis: Detailed monitoring and controlling of the employee desktop and laptop activities in order to assess the employee behaviour.

Encryption: Ensuring data transferred to removable media stays protected in case of loss or theft attempts, by storing information in a password-protected and encrypted vault.

Asset Management: Monitoring and logging of the software and hardware assets used within the organization network, along with software license information management.

Data Leak Prevention & Analysis: Content-based policies for detection and prevention of confidential information being transmitted by employees via various channels. We built cyber analytics that provide analytics on Data Leak Prevention, Mobile Device Management, Information Rights Management and Employee Behaviour platform.

Employee Forensics: In depth analysis and detection of the employee malicious activities performed by employees via various channels, with inbuilt tools for performing extreme monitoring.

Mobile Workforce Management: Providing mobile data security and device management on smart phones and tablets accessing the corporate network.

Information Rights Management: Implementation of suitable policies on data in motion to ensure that the data is not tampered or misused, even when moving outside the organization boundaries.

Server Activity Monitoring: inDefend performs continuous screen monitoring at high frequency which can be seen as a movie. This will enhance the chances of capturing discrepancies during the connected session with server.

3) What is Cyber Intelligence report? What Value does CIR add in comparison to other threat intelligence reports available in cyber space?

Based on the data gathered by inDefend, we offer a reporting system called CI (Cyber Intelligence) Reporting for the management. Our intelligence is uniquely positioned to manage the issues handled by CXOs:

  • Provide real-time information on data leak in terms of who did what, how, when, what gone out. Getting this information is a nightmare in a traditional DLP approach. Today organizations with DLP running spend good amount of resources and time on the same.
  • Integrated reporting, blocking in real-time from DLP, MDM, IRM is next to impossible as today organization has multiple products for the same that are not truly integrated.
  • Cyber intelligence integrated with inDefend Cyber Seal provide business leaders view in terms of who did what and how without getting the same enforced from DLP or from IT team. This is very important as business own information not IT team.
  • One of the most critical is to detect human behavior well before incidents, all existing tools fails to deliver the same. inDefend reports this to business user and management to take actions well in advance as and when context rule matches.
  • Last would like to highlight is co-creation of engine and reporting system that delivers unique value to business and well integrates with company’s culture.

This is uniquely positioned for companies already running DLP suite from existing vendors.

4) What has been your leadership thought in terms of Data security solution?

Data Resolve Technologies is adding various components to their platform to cover social, mobile, web, email, cloud related issues. They are working on enhancing their analytics. Integration with dropbox, google-docs, IRM products. Building security adaptors for Apple, Android, Ubuntu, Windows Mobile etc.

5) CISOs are not preferring isolated solutions any more. They expect an integrated solution architecture from vendors. Can Data Resolve address that?

Yes, this is unique to Data Resolve where we have integrated all this on a common dashboard. Our all modules are integrated, one client, one analytics dashboard, no server. We have seen organizations replacing disparate end-points with inDefend because it delivers ROI to client and offer flexibility to integrate with existing Vendor products.

6) Managing multi-layered security approaches has been a challenge to CISOs. What can Data Resolve do to address this concern?

Our approach is to manage security threats from end-points only, under internal threat research and report its clearly identified end-user plays an important role hence our architecture is uniquely created for end-points.

7) A plethora of mobile devices besides different smart mobile applications, mobile security has been a challenge to organizations. What is your approach in this domain?

Very important point touched upon, inDefend is uniquely positioned to handle the same from a single analytics dashboard for disparate mobile devices. It goes beyond MDM and offers employee behaviour, analytics, and also cover aspects related data leak, data loss, filtering control.

website read here reasons people cheat
click here open how many women cheat on husbands
hiv in women jasonfollas.com aids information and facts
is my girlfriend cheated on me read i love my girlfriend but i want to cheat
why men cheat on beautiful women prashanthiblog.com husbands who cheat
tracking software for cell phones click google spy app
tracking software for cell phones click google spy app
my abortion story myjustliving.com how late can you have an abortion
best free spy apps open spyware for android free
tween girls tribb sex stories boys suck boys dick sex stories gang sex stories
free android sms spy solluna.somee.com android phone spy
walgreens photo coupon printable read free prescription drug cards
free coupon sites read rite aide coupons
how to terminate a early pregnancy abortion pill abortions pictures
walgreens prescription coupons open free manufacturer coupons
women cheat husband women who cheat on relationships when a husband cheats
how many women cheat on their husbands how to catch a cheater cheat on wife
fluconazole open levitra 40mg
ciprofloxacin 1000mg sporturfintl.com diprolene
pfizer viagra coupon viagra coupon codes prescription discount coupon
prescription discount coupon paine.edu coupon for prescription
prescription discount coupon paine.edu coupon for prescription
acheter viagra pfizer acheter viagra pfizer acheter viagra pfizer
cialis price lipseysguns.com free cialis coupons
prescription discount coupons coupon for prescriptions coupons for drugs
discount card for prescription drugs lilly cialis coupon prescription card discount
aldactone smpc aldactone forum aldactone 100
digoxin nedir go digoxin nedir
cardura xl 2mg eblogin.com cardura 2 mg
viread wikipedia viread viread 245 mg
supra x 125 supraxone suprax uses
cosopt sivuvaikutukset cosopt sivuvaikutukset cosopt 20 mg/ml 5mg /ml
vacuum aspiration video amres.nl what is the most common abortion method
cialis savings and coupons alpinipedrengo.com cialis.com coupons
beloc zok comp mipnet.dk beloc medikament
feldene ampolla harshpande.net feldene ampolla
stemetil im s467833690.online.de stemetil side effects patients
tegretol bula pdf tegretol cr tegretol bula
best free pharmacy discount card alpinmontservis.cz pharmacy online coupon
abortion pill risks side effects of abortion pill abortion pill price
early pregnancy termination thinking of having an abortion early pregnancy termination options
priligy 60 mg priligy priligy apteekki
naltrexone indications naltrexone alcoholism medication naltrexone fda
metoprololtartrat mcmurray.biz metoprolol succinate
printable cialis coupon cialis coupons and discounts cialis savings and coupons
2015 cialis coupon pureheartvision.org free coupon for cialis
coupons for cialis cialis coupons from manufacturer online cialis coupons
prescription transfer coupon cialis coupon code coupons for cialis printable
the abortion pill abeltasman.de abortion pill cost
vermox sirup vermox vermox spc
clomid proviron pct onlineseoanalyzer.com clomid proviron pct
acetazolamide spc crownlimos.ca acetazolamide 250 mg tablets
flagyl 500 mg flagyl precio flagyl plm
abortion pill is wrong abortion pill information medication abortion pill
abortion pill is wrong abortion pill information medication abortion pill
neurontin alkohol neurontin alkohol neurontin cena
cialis manufacturer coupon 2016 cialis coupons from manufacturer cialis coupon card
first trimester abortion pill abortion clinics in houston tx where to get an abortion pill
to have an abortion onemoreproductions.se in clinic abortion
printable cialis coupon free cialis coupon copay cards for prescription drugs
ldn therapy avonotakaronetwork.co.nz naltrexone for alcohol dependence
naltrexone controlled substance site naltrexone brand name
what is naltrexone hcl order low dose naltrexone online natrexone
naltrexone low dose side effects myjustliving.com ldn low dose
how long does naltrexone work oscarsotorrio.com naltrexone injection side effects
how long does naltrexone work vivitrol injection naltrexone injection side effects

Comment

Post your comments

Your email address will not be published. Required fields are marked *

Premier source for thought leadership and latest updates on Cloud Computing to our extensive audience of CIOs and IT Leaders.

Address:J-100, Saurabh Vihar, Badarpur,New Delhi - 110044 (INDIA)

Phone:+91-11-32024924

Email: info (at) itsbsm (dot) com

ShellShock: All You Need to Know About the Bash Bug vulnerability

A new vulnerability has been found that potentially affects most versions of the Linux and Unix operating systems...

Tinba Reloaded… Attacking Banks Around the World

Tinba got its name from its extraordinarily small size – its code is approximately 20 kilobytes in size, a remarkably small number for banking malware...

Big… BadUSB Malware Hack Exploit Ahead

This newly discovered flaw in USBs, dubbed BadUSB, that allows them to become automated hacking tools is the latest challenge for data security professionals...

ShellShock: All You Need to Know About the Bash Bug vulnerability

A new vulnerability has been found that potentially affects most versions of the Linux and Unix operating systems...

Tinba Reloaded… Attacking Banks Around the World

Tinba got its name from its extraordinarily small size – its code is approximately 20 kilobytes in size, a remarkably small number for banking malware...

Big… BadUSB Malware Hack Exploit Ahead

This newly discovered flaw in USBs, dubbed BadUSB, that allows them to become automated hacking tools is the latest challenge for data security professionals...