Title: Compliance and Content Protection
1Compliance and Content Protection From Every Angle
2Agenda
- Vericept Overview
- The Internal Threat
- Increasing Business Risk
- 360º Visibility and Control
- Why Companies Choose Vericept
- Question Answers
3Vericept Overview
- Founded in 1999
- Award-winning, patent-pending (9) technology
- Industries
- Financial Services
- Healthcare
- Manufacturing
- Telecommunications
- Government
- Education
- Approximately 650 customers trust Vericept
millions of pieces of communication protected
everyday. - 21 quarters of consecutive growth
4The Insider Threat
5The Increasing Business Risk
6Vericept provides Maximum Protection over
Informational Assets
7Unparalleled Visibility Control
8360º Visibility and Control
Compliance Violations
HIPAA GLBA PCI DSS SOX State Data Privacy
9360º Visibility and Control
Intellectual Property Theft
Financials Executive Communications Source Code
10360º Visibility and Control
Customer Data Loss
Customer Lists Patient Information Investment
Portfolio
11360º Visibility and Control
Insider Hacker Activity
Keylogger Applications Unauthorized
Access Network Exposure
12360º Visibility and Control
Internet Abuse
Gaming Online Trading P2P File Sharing
13360º Visibility and Control
Other Insider Risk
Sexual Harassment Racism Defamation Of Character
14Vericept Controls all Insider Risk
15The Vericept 360º Risk Management Platform
16Why Companies Choose Vericept
Why do millions of users trust Vericept to
protect their proprietary information every day?
- Vericept is the Market Leader
- Unparalleled 360º Visibility and Control
- Visibility ACROSS the EnterpriseNetwork,
Desktop, Application - Ability to Intelligently Monitor, Control
and Investigate - Proven Scalability Performance
- Significant, On-going Investment in RD
- World Class Support and Services
- The Vericept E3 Promise
17Chosen by the Worlds Leading Organizations
Vericept has a strong customer baseOver 650
Customers and over 2.5 Million workstations,
across all Industries
18Thank You
QA
19 20Insider Risk Management
21Intelligent Content Control EngineTM
- Intelligently analyze ALL Internet traffic and
attachments, and - identify ONLY the pertinent content at risk
- Three-Tiered Analysis
- Content and Context Analysis
- Structure Analysis
- Category Accuracy Assurance
- Content Analysis Description Language (CANDL)
- Robust syntax to model and create content
analysis rules - for unique precision
- Port and Protocol Agnostic
22Suite of Investigation Management Tools
- Proof-Positive Evidence
- Identity Match
- In-depth data mining
- Build Case Files
- Annotation Ability
- Audit Trail of Event and System Changes/History
- Automated launching of in-depth investigation
23Vericept and Guidance Software Bringing
together incident identification and response!
24(No Transcript)