Developers: | LANIT |
Date of the premiere of the system: | 2019/01/16 |
Technology: | Cybersecurity - Information loss preventions, cybersecurity - Information management and events in a security system (SIEM) |
"LOGOS" analyzes files which are printed. The product unloads data in the format compatible to Microsoft Excel, keeps the magazine of the performed works and archives records.
2019: Representation of a software package
On January 16, 2019 the Department of information security of LANIT provided the software package "LOGOS". A system automatically controls printing. She uses contextual analysis and search of a key word in the text of files which go to the printer. The solution helps to avoid leak of confidential information and a trade secret.
The software package consists of three components. "Agent" reveals document printing with signs of confidentiality and monitors inappropriate use of printers. "Panel" only management tool all components of a system. Through it the information security administrator can configure group politicians of control of printing, work with magazines and browse the printed documents. The specialist, working with Panel, can configure notifications and scheduled works.
The third solution component – Service. It interacts with Agent and Panel and places files in a directory for storages printing tasks. The component saves information, using a management system databases SQLite. "Service" according to the schedule checks integrity of the database and a status of agents.
A system analyzes directly printing flow (all known file formats are supported). A system creates the single interface of monitoring of printing and builds the flexible mechanism of administration, creation of rules of contextual analysis of printing. Using a software package the company can receive operational data on incidents and use the centralized protected storage of magazines of printing.
The LOGOS program is multifunction. It is used by our customers for the control of printing and document distribution which are subject to protection. Also we use "LOGOS" at an information security audit. The agent of the program quickly extends through domain politicians. Already by the end of the working day it is possible to make the card of information flows and potential channels of leak. Victor Minayev, Head of Department of information security of LANIT
|