It enables control of every supported data transfer channel, while the multi-component architecture allows selecting only the modules you actually need.
The only solution able to monitor Skype traffic (attached files, text and voice messages).
Detecting data leaks through laptops used by employees outside corporate LAN (while being at home or on a business trip).
Windows domain structure integration
It enables you to accurately identify the user behind the incident, no matter what data channel is used - Skype, email, ICQ, MSN, regardless of the email address, ICQ account or Skype account.
Similar-content search feature
The similar-content search technology will allow you to easily tune the analytical subsystem so you will not need assistance from outside of your company. At the same time, you will not need to make a superhuman effort to tune the way the software will analyze intercepted documents.
Easy to integrate
To install SearchInform Perimeter components, you only need several hours. In most cases, you will not need to draw outside engineers. That means you will not need to show your corporate internal documents to the supplier's engineers or other specialists.
Today information is one of the critical assets for success and prosperity of your business. On average a data leak costs around 2.7M USD to the information owner.
SearchInform Information Security Perimeter is a software solution used to monitor and prevent leaks of sensitive data through e-mail, ICQ, Skype (voice and text messages), forums or web blogs, removable media (CD/DVD/USB), laptops (even when disconnected from corporate network), FTP, file servers, and printers. It can also find sensitive data-at-rest where it does not belong.
SearchInform Information Security Perimeter is used in more than 500 companies. We provide solutions for businesses and companies of any scale in almost any sector - from banking to engineering.
We strive to expand our horizons by offering more complex and feature-rich information security products and services. Aside from releasing new products and updating existing ones, we are developing improved technique to tackle security challenges, like identifying corrupt employees, protecting design plans, etc.