White Papers

 

Cloud data protection: new age solution

Request

 

Increasing productivity and securing sensitive data while working remotely

Request

 

Financial industry at risk: the price of data loss

Request

 

Data protection and investigation services for business

Request

 

Cloud solution for productivity monitoring

Request

 

Data protection in 4 steps

Request

 

SearchInform for MSSP

Request

 

Risk Monitor for SOC

Request

 

Information protection in databases

Request

 

Risk Management: Complete data protection

Request

 

How much a former employee can cost you

Request

 

Protection of confidential documents

Request

Third-party integration
Our principal goal is to create a powerful, capable and competitive solutions and we are delighted to work with our technology partners together on delivering customers a product all parts of which are its strengths.

Storage area network (SAN) developers support

This kind of integration allows you to protect data, categorise stored information, perform access rights management depending on content, audit operations with files and folders, scan and analyse current access rights to data in a file system. Supported brands are:

Seamless integration, created in close cooperation with HUAWEI representatives, allows you to use all the file auditing functions (categorisation, checking of access permissions, audit of operations with confidential information) on Oceanstor SAN devices

PACS

Integration with PACS systems allows you to use the data received from these systems in the form of reports for the ProgramController.

Integration is possible with the following PACS:

Orion Pro

Business Intelligence

Integration with business intelligence (BI) systems will allow you to visualise any data in a form convenient for the customer. Supported brands are:

Presets for Power BI are included into the product

SIEM

Integration with SIEM systems allows the communication of incidents identified by security policies of the monitoring system (for example SearchInform Risk Monitor system). Integration is possible: 1. through a specially created CEF file 2. though Syslog. 3. or is seamless with SearchInform SIEM system. Supported brands are:

SOC

Integration with Security Operation Centers will reduce the time of response to information security threats due to their centralised and a unified approach. Supported brands are:

OCR

This type of integration allows you to extract text from graphic objects for further analysis by SearchInform Risk Monitor modules. Integration is possible with the following OCR systems:

NicomSoft OCR
The OCR engine built into the solution is free for a customer and has basic functions. Its performance is sufficient and recognition quality is quite high. Supports recognition of Latin and Cyrillic characters.
The industry-leading OCR solution, available as an add-on, has support for over 50 OCR languages, adapted for both print and handwritten text. There are built-in machine learning algorithms for categorising images by type. Ensures high stability and performance. Can be clustered for any load.

Integration with speech recognition systems

Such integration allows converting an audio recording into a textual representation for further analysis by Risk Monitor modules.

DSS LAB
DSS Lab developer’s solution was optimised specially for SearchInform Risk Monitor system

Research

2020

Research on the level of information security in Russia and CIS

2020

Internal security incidents detected in companies using SearchInform services

2020

How do companies make a shift to remote work?

2019

Solution implementation statistics 2019

2018

Information security survey

How to

 

How to clean up the file system

Request

Practices and use cases

 

Cyber Security Framework, compliance with SAMA (in Arabic)

Request

 

SearchInform solution, compliance with GDPR

Request

 

Configuring processes while going remote

Download

 

SearchInform solution, compliance with the Personal Data Protection Bill

Request

 

Risk management and internal audit as a service

Download

 

Risk management internal control and fraud prevention

Download