Data Resolve mission is to monitor all end-points and provide control, reporting to users/organizations

Data Resolve Technologies is started by group of alumni’s from IIT Kharagpur with client base on End-point Security Analytics in Indian and International market. An exclusive interview with Mr. Dhruv Khanna, CEO and Founding Team Member of Data Resolve Technologies Pvt Ltd for INFOSECURITY.

 

How is Data Resolve positioned in India as a pureplay security vendor?

inDefend Business is the next generation technology which uses Cyber security intelligence as a unique approach towards reducing the business risks of a company through intelligent analysis of the information flowing within and outside the company’s network.

It is just not a Data Leak Prevention Software, it’s a 360 degree approach to protect data from insider threats. inDefend is uniquely positioned to handle data throughout its lifecycle.

2) What are the major areas, Data Resolve currently focusing?

Data Resolve mission is to monitor all end-points and provide control, reporting to users/organizations. Our inDefend product offers:

Employee Monitoring & Behaviour Analysis: Detailed monitoring and controlling of the employee desktop and laptop activities in order to assess the employee behaviour.

Encryption: Ensuring data transferred to removable media stays protected in case of loss or theft attempts, by storing information in a password-protected and encrypted vault.

Asset Management: Monitoring and logging of the software and hardware assets used within the organization network, along with software license information management.

Data Leak Prevention & Analysis: Content-based policies for detection and prevention of confidential information being transmitted by employees via various channels. We built cyber analytics that provide analytics on Data Leak Prevention, Mobile Device Management, Information Rights Management and Employee Behaviour platform.

Employee Forensics: In depth analysis and detection of the employee malicious activities performed by employees via various channels, with inbuilt tools for performing extreme monitoring.

Mobile Workforce Management: Providing mobile data security and device management on smart phones and tablets accessing the corporate network.

Information Rights Management: Implementation of suitable policies on data in motion to ensure that the data is not tampered or misused, even when moving outside the organization boundaries.

Server Activity Monitoring: inDefend performs continuous screen monitoring at high frequency which can be seen as a movie. This will enhance the chances of capturing discrepancies during the connected session with server.

3) What is Cyber Intelligence report? What Value does CIR add in comparison to other threat intelligence reports available in cyber space?

Based on the data gathered by inDefend, we offer a reporting system called CI (Cyber Intelligence) Reporting for the management. Our intelligence is uniquely positioned to manage the issues handled by CXOs:

  • Provide real-time information on data leak in terms of who did what, how, when, what gone out. Getting this information is a nightmare in a traditional DLP approach. Today organizations with DLP running spend good amount of resources and time on the same.
  • Integrated reporting, blocking in real-time from DLP, MDM, IRM is next to impossible as today organization has multiple products for the same that are not truly integrated.
  • Cyber intelligence integrated with inDefend Cyber Seal provide business leaders view in terms of who did what and how without getting the same enforced from DLP or from IT team. This is very important as business own information not IT team.
  • One of the most critical is to detect human behavior well before incidents, all existing tools fails to deliver the same. inDefend reports this to business user and management to take actions well in advance as and when context rule matches.
  • Last would like to highlight is co-creation of engine and reporting system that delivers unique value to business and well integrates with company’s culture.

This is uniquely positioned for companies already running DLP suite from existing vendors.

4) What has been your leadership thought in terms of Data security solution?

Data Resolve Technologies is adding various components to their platform to cover social, mobile, web, email, cloud related issues. They are working on enhancing their analytics. Integration with dropbox, google-docs, IRM products. Building security adaptors for Apple, Android, Ubuntu, Windows Mobile etc.

5) CISOs are not preferring isolated solutions any more. They expect an integrated solution architecture from vendors. Can Data Resolve address that?

Yes, this is unique to Data Resolve where we have integrated all this on a common dashboard. Our all modules are integrated, one client, one analytics dashboard, no server. We have seen organizations replacing disparate end-points with inDefend because it delivers ROI to client and offer flexibility to integrate with existing Vendor products.

6) Managing multi-layered security approaches has been a challenge to CISOs. What can Data Resolve do to address this concern?

Our approach is to manage security threats from end-points only, under internal threat research and report its clearly identified end-user plays an important role hence our architecture is uniquely created for end-points.

7) A plethora of mobile devices besides different smart mobile applications, mobile security has been a challenge to organizations. What is your approach in this domain?

Very important point touched upon, inDefend is uniquely positioned to handle the same from a single analytics dashboard for disparate mobile devices. It goes beyond MDM and offers employee behaviour, analytics, and also cover aspects related data leak, data loss, filtering control.

signs of unfaithful husband website why do men cheat
abortion at 6 weeks pregnancy abortion how early can you have an abortion
is abortion legal go abortion opinions
is abortion legal go abortion opinions
dating sites for married people tracyawheeler.com dating for married people
dating sites for married people tracyawheeler.com dating for married people
my wife cheated spnote.com cheats
tween girls tribb sex stories boys suck boys dick sex stories gang sex stories
ciprofloxacin gruene-kehl.de revia
synthroid 200mcg go keflex pill
dutasteride pill shellware.com celebrex pill
dutasteride pill go doxycycline 100mg
coupons for viagra 2016 coupons for prescription drugs prescription transfer coupon
can i take valacyclovir for cold sore canitake.net can i take valacyclovir for cold sore
lisinopril and chlorpheniramine http://lisinopriland.net lisinopril and chlorpheniramine
prescription drugs coupons click cialis coupon code
prescription drugs coupons coupon for prescription cialis coupon code
new prescription coupons go cialis coupons printable
printable coupons for cialis link cialis coupon
aldactone smpc nguoiviendong.net aldactone 100
digoxin nedir digoxin yan etkileri digoxin nedir
abilify alkohol link abilify wiki
cyclogyl for iritis cyclogyl eye drops cyclogyl for iritis
prescription discount coupon go cialis online coupon
abortion is wrong order abortion pill online teen pregnancy
motilium lekarna blog.jrmissworld.com motilium diskuze
diclac gel reviews diclac 50mg tablets diclac spc
diclac gel reviews diclac 50mg tablets diclac spc
feldene ampolla harshpande.net feldene ampolla
drug coupon card prescription drugs discount coupons drug discount coupon
facts on abortion pill how to have an abortion pill abortion pill recovery
facts on abortion pill abortion pill process abortion pill recovery
best coupons site coupon websites coupon websites for groceries
strattera discounts amres.nl discount code for strattera
discount coupons for prescriptions andreinfo coupons for prescription medications
2015 cialis coupon new prescription coupon coupons for cialis printable
side effects of abortion pill britmilk.co.uk information on abortion pill
cialis generic partickcurlingclub.co.uk cialis patent
abortion pill recovery spontaneous abortion pill abortion pill cost without insurance
addiyan chuk chuk thebaileynews.com addyi suomi
coupons for cialis cialis coupons from manufacturer online cialis coupons
prescription transfer coupon cialis.com coupons coupons for cialis printable
post abortion pill akum.org abortion pill definition
how do abortion pill work average cost of an abortion pill early abortion pill
how does an abortion pill work abortion clinics in houston tx low cost abortion pill
abortion pill pictures natural abortion pill side effects of abortion pill
vermox sirup vermox vermox spc
prescription drugs coupons discount coupons for prescriptions prescription coupon card
clomid proviron pct onlineseoanalyzer.com clomid proviron pct
duphaston cijena bez recepta duphaston tablete za odgodu menstruacije duphaston 10 mg
abortion pills cost types of abortion pill about abortion pill
amoxicillin 500 mg airascatering.com amoxicillin antibiyotik fiyat
cialis manufacturer coupon 2016 cialis coupons from manufacturer cialis coupon card
cialis manufacturer coupon 2016 coupons for cialis 2016 cialis coupon card
early medical abortion stories pebblesteps.com dallas abortion clinics
printable cialis coupon prescription coupons copay cards for prescription drugs
abortion clinics in houston texas europeanwindowshosting.hostforlife.eu choices abortion clinic
naltrxon zygonie.com low dose naltrexone india
naltrexone thyroid williamgonzalez.me is naltrexone safe
dexamethason 1 5 mg dexamethason tabletten dexamethason gebruik
mebendazol graviditet mebendazol nebenwirkungen mebendazol kaufen

Comment

Post your comments

Your email address will not be published. Required fields are marked *

Premier source for thought leadership and latest updates on Cloud Computing to our extensive audience of CIOs and IT Leaders.

Address:J-100, Saurabh Vihar, Badarpur,New Delhi - 110044 (INDIA)

Phone:+91-11-32024924

Email: info (at) itsbsm (dot) com

ShellShock: All You Need to Know About the Bash Bug vulnerability

A new vulnerability has been found that potentially affects most versions of the Linux and Unix operating systems...

Tinba Reloaded… Attacking Banks Around the World

Tinba got its name from its extraordinarily small size – its code is approximately 20 kilobytes in size, a remarkably small number for banking malware...

Big… BadUSB Malware Hack Exploit Ahead

This newly discovered flaw in USBs, dubbed BadUSB, that allows them to become automated hacking tools is the latest challenge for data security professionals...

ShellShock: All You Need to Know About the Bash Bug vulnerability

A new vulnerability has been found that potentially affects most versions of the Linux and Unix operating systems...

Tinba Reloaded… Attacking Banks Around the World

Tinba got its name from its extraordinarily small size – its code is approximately 20 kilobytes in size, a remarkably small number for banking malware...

Big… BadUSB Malware Hack Exploit Ahead

This newly discovered flaw in USBs, dubbed BadUSB, that allows them to become automated hacking tools is the latest challenge for data security professionals...