RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Zecurion Zdiscovery

Product
The name of the base system (platform): Zecurion DLP
Developers: Zecurion (before SecurIT)
Last Release Date: 2014/06/05
Technology: Cybersecurity - Information loss preventions

Content

2014: Zecurion Zdiscovery 3.0

On June 5, 2014 the Zecurion company announced release of Zecurion Zdiscovery 3.0 with a possibility of data scanning on servers — from normal network folders and cloud storages to distributed databases and workflow systems.

Key innovation of the third version - an opportunity to scan databases and to detect violations the politician of storage of confidential information. Zecurion Zdiscovery 3.0 supports scanning of the majority of widespread databases, including Oracle Database, Microsoft SQL Server and IBM DB2.

In the new version the server module Zdiscovery with a possibility of remote scanning operates. As in a case with the local agent, remote scanning can selectively be made also according to the schedule.

Zecurion Zdiscovery 3.0 becomes the first product from a DLP line of the company where the newest developments of Zecurion in the field of detection and data analysis are implemented. The support vector machine of SVM and a possibility of creation of prints of tables or the whole databases will be added to the used now to morphological analysis of MorphoLogic, digital fingerprints of DocuPrints and text recognition. Using the built-in system of OCR in the new version there will be a search capability of data not only in text, but also in graphic files. New technologies will expand borders of application of DLP and will increase efficiency of leak detection by 13-15%.

"Zdiscovery for only several years surely occupied the niche and is one of the key products Zecurion now — told Alexey Rayevsky, the CEO Zecurion. — When developing the new version we were focused on implementation of wishes of users of the previous versions and also on performance and reliability of a product. Among new opportunities of the new version there is a separate wish to note data analysis and documents in systems SharePoint 1C, SAP and other widespread products for business process automation".

2012

Май: Zecurion Zdiscovery

On May 31, 2012 the Zecurion company announced release of the Zecurion Zdiscovery system — a product for search of confidential information at workstations and servers. Zdiscovery the politician of storage of confidential information in scales of the organization will complement a line of the Zecurion DLP systems with observance control opportunities.

For search of confidential data in corporate network Zecurion Zdiscovery uses special agents who analyze data on disks of computers and servers including on the "hidden" logical disks. Zecurion Zdiscovery allows to detect unauthorized copies of confidential information on working computers and notebooks of users and also in network storages. A system checks the detected confidential documents for compliance to rules of their storage and, in case of violation, fixes an incident.

The Zecurion Zdiscovery settings allow to set actions which will be made at detection of violations of security policies. Data can be deleted or moved to special storage, on the file server or to DBMS, and without delay to send the message about violation to the administrator and the user who allowed the wrong storage. In addition all events, including the list of the detected violations and exact arrangement of data, remain in special magazines (logs) for the subsequent analysis. The archive of copies of files allows to browse the found suspicious documents even if the original was deleted, changed or moved to other place. In particular, the archive appears an irreplaceable source of information at investigation of incidents of information security.

"We developed our new product under specific requests of customers therefore it was demanded directly "from the pipeline': already now we have several "pilots' — the CEO of Zecurion Alexey Rayevsky says. — Zecurion Zdiscovery prevents the whole class of the violations of security policy connected with the wrong storage of confidential documents. Among them, for example, storage of confidential materials or personal data not in the protected storage, and on the computer of the user or on opened the file server".

Zecurion Zdiscovery scans available storages in real time, instantly reacting to creation of new files and making changes in documents. It allows to control constantly observance the politician of storage of confidential information and to quickly take measures at detection of violations. At the same time there is also an opportunity to set the schedule of search with any interval for the purpose of resource optimization. For example, if the efficiency of reaction is not critical, it is possible to plan scanning at night when load of network is minimum.

For detection of confidential data of Zecurion Zdiscovery uses the hybrid analysis — a complex of modern technologies of detecting, including check on templates of regular expressions, MorphoLogic linguistics, digital fingerprints of DocuPrints and the trained SmartID technology. Application of the hybrid analysis provides the accuracy of determination of confidential information to 95%.

December: Zecurion Zdiscovery 2.0

For search in corporate network of confidential information in Zecurion Zdiscovery 2.0 special agents who are established at the protected workstations and servers are used. Agents of Zdiscovery analyze the data which are contained on local disks and in the "shared" network folders and as a result detect violations the politician of storage of confidential documents. Version 2.0 supports the analysis more than 500 types of widespread files using the hybrid analysis, in particular digital fingerprints of DocuPrints and intellectual SmartID technology.

The Zecurion Zdiscovery settings allow to set actions which will be made at detection of violations of security policies. Data can be deleted or moved to special storage, on the file server or to DBMS and also without delay to notify the administrator and the user who allowed the wrong storage. In addition all events, including the list of the detected violations and exact arrangement of data, remain in special magazines (logs) for the subsequent analysis. The archive of copies of files allows to browse the found suspicious documents even if the original was deleted, changed or moved to other place. In particular, the archive appears an irreplaceable source of information at investigation of incidents of information security.

"We put the first version of Zecurion Zdiscovery on, in May, 2012, and initially were not going to release one more full version of a product this year — the technical director of Zecurion Roman Vasilyev says. — But the product was exclusively demanded — only for the first several months we sold more than 30,000 licenses Zdiscovery — and we decided to force development, having made version 2.0 is notable more reliably and quicker".

Zecurion Zdiscovery 2.0 scans available storages in real time, instantly reacting to creation of new files and making changes in documents. It allows to control constantly observance the politician of storage of confidential information and to quickly take measures at detection of violations. At the same time there is also an opportunity to set the schedule of search with any interval for the purpose of resource optimization. For example, if the efficiency of reaction is not critical, it is possible to plan scanning at night when load of network is minimum.