ITsMine – Beyond DLP

ITsMine – Beyond DLP

The leading data security solution for scattered data – protects data within company boundaries and beyond

ITsMine is a leading solution used by organizations to protect against internal and external threats automatically. ITsMine takes a proactive approach to protect data within company boundaries and beyond. ITsMine is Agentless and very easy to implement (takes less than a day), does not require additional headcount due to AI and deception techniques used, has a built-in automatic reaction for both Internal and External threats, and can turn any folder into the most secured folder, whether on-premise or in the cloud.

ITsMine tracks, targets, and pinpoints your data regardless of its location. Whether your company’s data is on a personal device, on a remote server, in the cloud, or on an external device or medium, it notifies you in real time. It allows you to know who has access to your data and where they’re using it at any given moment and the power to control that data—the perfect tool to help you deal with any data breach emergency.

ITsMine Beyond DLP requires no policies and no permanent endpoint agents while guaranteeing protection against internal and external attackers. ITsMine’s Beyond DLP solves the challenges using a fully automated solution with negligible false positives and without affecting employee productivity. ITsMine is a DLP solution to protect against internal and external threats automatically.

Why ITsMine?

ITsMine is the ONLY platform that has the answer to the most terrifying attack an organization can experience – the new generation of Ransomware (Lockbit 2.0/3.0) that involves data leakage followed by encryption.

• It gives a REAL-TIME ALERT that an attacker opened a file that leaked OUTSIDE company boundaries.
• Provides a FULL list of leaked files.
• Enables Security Team to IMMEDIATELLY KILL critical files outside the company.

With the increasing number of data breaches, current Data Loss Protection solutions struggle to detect data breaches in real-time, also failing to collect sufficient threat event information after threat detection. At ITsMine, we have focused on solving some of the major issues around putting a DLP solution in place. This includes solving the following headaches faced by organizations looking to effectively protect their data:

• Solutions that are not effective
• Platforms that are prohibitively expensive
• Tools that require more maintenance than they are worth
• Software (and hardware!) that takes ages to implement, integrate and train

Traditional DLP solutions are based on the knowledge that security teams do not – and cannot – have. Moreover, current solutions do not treat the vector of attack – they try to determine if a file supposedly left the company or not, instead of verifying if it is: an external attacker trying to steal company data (or harm it), a rogue employee or an employee that made a mistake. Therefore, current solutions only treat and track the data, failing to provide the needed automatic action for each vector of attack.

Beyond DLP™ automatically plants thousands of SoftwareMines™ around the organization’s file storage, both on-premise and cloud. When a SoftwareMine™ gets opened, the company will immediately receive critical forensic information about the breach. This information can be used to understand exactly what happened in order to improve data security measures within the company and put the control back into the Security Department’s hands.

Due to its automatic detection mode, ITsMine is the only available option that provides real-time breach detection notifications with specific data on the compromised data, location, and time when the breach occurred. This is achieved through the Call Home feature, which ensures that all enterprise documents are protected anywhere in the world. Our innovative approach requires no policies and no permanent endpoint agents, providing the best protection while detecting breaches in real time.

Beyond Boundaries:- Track and protect your data anywhere with Beyond DLP’s unique technology.
File-GPS:- Transparently track scattered data’s location, anywhere. “Call Home” capabilities ensure that even if files leave the organization, administrators can see where the file is, disable it, or revoke access.
SoftwareMines:- Proactively protect against internal and external attackers.
Implement in one day to start tracking your files on
> On-premise hosts & file systems
> Cloud repositories & drives
> SaaS platforms

ITsMine – Prominent Features

Beyond DLP™ uses Artificial Intelligence (AI) to understand the severity level and vector of the attack, proactively taking the necessary action to block data loss and obtain critical evidence while guaranteeing protection against internal and external attackers:

  • > Ensure employees do not take company data with them
  • > Revoke Access to files even if they leave the organization
  • > Enhance protection for work-from-home users – protect company data wherever it’s being used
  • > Safeguard company data shared with 3rd parties – maintain control of your data
  • > Eliminate the Threat of Ransomware
  • > Implementation within 2 days

From an internal attack perspective, ITsMine detects abnormal behavior and calculates risk levels to automatically block the activity or educate and empower
employees to handle critical data properly.

From the perspective of an external attack, once an attacker evades all the traditional organizational security, and successfully accesses the organizational data network, ITsMine automatically blocks and isolates the compromised endpoint and provides important forensic information to the security department even after data exfiltration.360° Of Control:- Continuously track your scattered data’s location, anywhere: on-premise, on personal devices, and in the cloud – with File-GPS™ beacons, transparently embedded into all your sensitive files.

> Transparently track scattered data’s location, anywhere, with FILE-GPS™ which constantly “calls home” and reports on a file’s whereabouts
> Unique dashboard displaying location and risk level of monitored data
> Consistent data security controls across all data storage applications (including OneDrive, Google Drive, Dropbox, NetApp and any Windows/Linux file storage)

Malicious Behavior Remediation:- Detect both internal and external data breaches and abnormal use of company data by planting SoftwareMines™ (advanced virtual sensors) in critical areas. Obtain forensic evidence on internal offenders by deploying disposable agents on suspicious endpoints.

> Prevent data breaches by planting SoftwareMines™ in sensitive locations adjacent to files that need protection
> Detect external attackers by detecting SoftwareMines™ “detonations” (unexpected access or opening of files) in critical areas
> Automatic deployment of disposable agents on suspicious endpoints

Employee-Centric Protection:- Engage employees in your data protection efforts by using integrated Data Security Awareness Training Campaigns and avoiding unnecessary access to data.

> Integrates training campaigns educating in real-time on the safe use of necessary data only
> Dashboard with clear metrics presenting the progress of the Data Protection Awareness Campaigns in your organization
> Integrates mechanisms to collaboratively (with consent) remove employees’ unnecessary access to data

ITsMine Architecture
ITsMine Architecture
ITsMine Beyond DLP uniqueness

Current solutions on the market are all based on manual policies, which limit the effectiveness and reliability of the solutions. We automatically protect sensitive data in all three states of digital data:

1. Data at rest – ITsMine monitors and protects data in central file storage (on-premise and cloud) against insider and external attackers including encryption, deletion, change, or data theft. The Transparent evidence Obtainer and attack Blocker (TOB) protects and monitors data on the endpoint computer HDD, on suspected devices, or when sensitive data exist on the employee’s computer.

2. Data in motion – the solution is monitoring all downloaded data from file storage, TOB is protecting data that goes out from the endpoint computers, on suspected devices, or when sensitive data exists on the employee’s computer.

3. Data in use – Beyond DLP™ monitors any misuse of data from file storage, TOB is protecting data that is created or copied from a sensitive resource, on suspected devices, or when sensitive data exists on the employee’s computer.

Key Benefits

All in all, Beyond DLP™ offers organizations the following key benefits:

Quickest implementation: Less than 2 hours with no policy needed, compared to current solutions that require over 12 months. This means that the deployment time is reduced by 99%.

Low false positive ratio: 2 cases per week for every 500 users with risk level >1 (vs the average of 1000 events per day with other solutions)

0% effect on the network: The fact that our solution has no endpoint and inline network involvement frees up the networks for the employees to work productively with minimal interruptions and no effect on employee productivity.

Regulatory Compliance, such as GDPR, requires active data protection, with full threat detection within 72 hours of the breach.

Tracking capabilities: Through the Call Home feature, the user is alerted immediately after a breach has occurred. ITsMine tracks data even beyond companies’ boundaries – granting immediate breach identification and granular details for containment.

Fully monitor the organizational file storage platform, while educating employees on responsible behavior when dealing with organizational data.

Endpoint Sanitation: Ensure sensitive data or “leftovers” of sensitive data do not stay on the endpoint and will be saved only on the file storage.

Best value for money: With ITsMine, the end-user will not need additional professional services, thus saving at least 66% in data loss protection.

Request a Quote
close slider