RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2
Project

USC 1520 tightened control over confidential data using SearchInform information security solutions

Customers: USC 1520

Moscow; Construction and Construction Materials Industry

Contractors: SearchInform
Product: Information security Kontur SearchInform (CIB Serchinform)
Second product: SearchInform FileAuditor

Project date: 2024/04  - 2024/10

2024: Increased control over sensitive data

The combined construction company "1520" (hereinafter - USC 1520) uses the products of the Russian developer of information protection tools "SearchInform." As of October 2024, the company has deployed two solutions of the vendor: DLP system "SearchInform CIB" and DCAP-system "SerchInform FileAuditor." This was announced on October 16, 2024 by representatives of SearchInform.

The main task set by the customer is to increase the current level of information security USC 1520. In particular, control of forwarded information inside and outside the company, analysis of information security incidents and the quality of employees' work.

File:Aquote1.png
Ensuring information security is one of the key tasks of our company. After analyzing the market and studying the feedback of colleagues, we decided to immediately implement CIB and FileAuditor from SearchInform without a test period. We work in the field of constructions railway infrastructure, transport so it is important for us that the design and construction documentation: layout of facilities, drawings are under reliable protection. A large amount of information is transmitted through flash drives, and some of this information refers to commercial secrets, leaks which can lead financial to losses. Therefore, DeviceController module protection is especially relevant for us.

told Vadim Lazarev, head of the economic security service of USC 1520
File:Aquote2.png

The DCAP system "SearchInform FileAuditor" enhances the protection of USC 1520 many times. The system is seamlessly integrated with the CIB, it shows if files with privacy tags were transmitted in instant messengers, mail, were printed, recorded on a flash drive or uploaded to the cloud. Tags show an information security specialist how dangerous it is to send a document.

File:Aquote1.png
"So, with the help of CIB, the security specialist managed to identify and prevent a number of information security incidents in time. - In general, the introduction of protective equipment has increased the level of information security in the company and simplified the work of the information security department. Now one security specialist can control several thousand employees. And we can be calm that sensitive information is well protected. "

told Vadim Lazarev
File:Aquote2.png

File:Aquote1.png
Interest in our products from construction companies is constantly growing, which speaks primarily about the quality of products and their convenience for organizations in this area of ​ ​ activity. Construction companies work with large amounts of data, and the ability of security tools to quickly process information is very important to them.

commented Alexey Parfentiev, Deputy General Director for Innovation Activities, "SearchInform"
File:Aquote2.png

USC 1520 plans to increase the volume of implementation, as well as strengthen information protection with the help of additional information security products, including SearchInform SIEM, monitoring and management system of information security events.