Everytag
Loading document from the system... ...................... Loading completed USER REQUESTS DOCUMENT Company DLP system SENDING FAILED PRINT THE DOCUMENT TAKE A PHOTO A RELIABLE DOCUMENTED SOURCE REVEALED THAT.. DAILY NATION EMPLOYEE INFORMATION DATE AND TIME OF DOCUMENT CREATION TRANSFORMATIONS ALGORITHM EMPLOYEE INFORMATION COPY CREATED TRANSFORMATION ALGORITHM LEGAL PROCEEDINGS PRISON TERM MONETARY RECOVERY

ILD - Information Leaks Detection

DOCUMENT LEAK DETECTION SYSTEM

"Security Module" for your documents. Protection of paper documents and printed copies, reduction of sensitive information leakage risks on paper media due to:

  • Prompt investigation of leaks and finding a staff member who may have been supplying information to competitors or mass media for years;
  • Preventive measures: staff members are warned that any transfer of information will be investigated and a thief will be found with 100% probability;
  • Special "leaks" initiated by security service to identify security vulnerabilities in the company's information protection system or reveal untrustworthy employees.

This is particularly important if your company:

  • Has a large document flow with considerable volume of sensitive commercial or scientific and engineering information;
  • Has a structure where the major part of sensitive data are represented by hard copy documents;
  • May suffer material losses through the reputational risks.

CONFIDENTIAL INFORMATION: WHY IS IT SO EASY TO LOSE IT?

Confidential documents usually contain data on the company's achievements or research activities in the area of production and engineering, scientific studies, as well as research & development. Together with the financial statements and customer data, this information represents a commercial secret. Such data leaks jeopardize the reputation of the company and may cause the loss of revenue.

Confidential documents include:

  • Audit results
  • Minutes of meetings
  • Test and research protocols
  • Inquiries of controlling and inspection authorities
  • Internal documents

Currently, digital information is protected by DLP systems (Data Leak Prevention). However, paper documents are still vulnerable: Such documents can be unlawfully copied and transferred to third parties. This may cause financial losses and reputation damage since leakage of documents stamped and signed by executives may inflict irreparable damage to any organization.

Up to 20% of data leaks occur through paper media!

HOW DOES ILD WORK?

The ILD system (Information Leaks Detection) is a security module, representing a special system for protection of the company's confidential e-document flow. The ILD system operation is based on the patented algorithm: it automatically converts each copy of the document into a new personalized file. The changes are not visible to human eye, but can be read by the system with 100% probability even in complex cases:

  • Damaged document
    (dirty, crumpled)
  • Document fragment
  • Document photos
  • Screenshots and photocopies

The ILD system neither copies the documents, nor archives them in the workflow system, but retains three parameters:

  • Transformation algorithm
  • Date and time when
    the copy was created
  • Information about the recipient of
    a personal copy of the document

ADVANTAGES

The ILD solution is easily and quickly integrated into the company's Electronic Document Management System (EDMS). Integration with any popular ECM system (IBM FileNet, Documentum, Directum, Sharepoint, ECM) will make your EDMS a totally leak-proof system.

The security module doesn't interfere with the workflow and doesn't require changing the routine scheme used by employees to receive documents from ECM. Requesting a copy, a user does not have to fill out any questionnaires or enter a personal ID — the ILD system automatically converts the document into a personal tagged copy and issues it through the usual algorithm. Employees may not even know that ILD system was deployed in your company.

Each new copy of the document:

  • Cannot be visually distinguished from the original copy;
  • Is a unique copy:
    (205 891 136 094 649 unique combinations of the same document);
  • Can be read despite damaged segments, spoiled places, disruptions or tear.
  • Can be copied, photographed as usually;
  • Is assigned to a specific employee.

WHO'S LEAKING CONFIDENTIAL INFORMATION?

* According to InfoWatch

In 2016, up to 44 leaks of information occurred every second (Breach Level Index). It is 1.4 billion cases per year — 86% more than in 2015. However, there is a positive trend too: in 2016, the number of leaks caused by employees reduced due to security measures applied within companies.

WHAT TO DO IF LEAKS OCCUR REGULARLY WITHIN YOUR COMPANY?

Leaked report reveals BP safety failures as it heads back to the Gulf of Mexico.
The confidential document handed to Energydesk and shared with the Financial Times, reveals serious weaknesses in the way the company manages critical information and reporting of incidents at its refineries and oil rigs. It went on to claim the failures got close to two potentially lethal accidents and was costing the firm $180m a year. The list of failures stretches from missing blueprints to crucial anti-blowout devices being wrongly installed. In recent years – the report notes -these have resulted in “repeated near-misses” and two serious incidents.

https://www.ft.com/content/a62438fc-be36-11e6-8b45-b8b81dd5d080

Panama papers firm Mossack Fonseca shrinks globally.
A trove of 11.5 million digital records from the Panamanian law firm revealed how many of the world's wealthy used offshore companies to stash assets. Perpetrators ranged from simple businessmen to head of states and sports stars. The data were leaked to a German newspaper, Sueddeutsche Zeitung, which shared them with the International Consortium of Investigative Journalists (ICIJ), and reports appeared in major media from April 3, 2016.

http://www.nation.co.ke/news/world/Panama-Papers-Mossack-Fonseca-shriks/1068-4042986-rvvj2j/index.html

ILD SYSTEM PREVENTS INFORMATION LEAKS

Though the ILD system cannot guarantee to prevent all paper document leaks, it can ensure to reveal the point of leak. However, with the announcement of ILD system deployment, potential information security intruders would reflect on the consequences of their actions. Experience has shown that the system is capable to reduce data leaks to almost zero in those organizations where such cases occurred frequently.

ILD enables to prevent information leakage and to reach the thief before the data are lost. Simply upload a false document in the secure e-document flow system with allegedly all-important confidential information and wait until documents are leaked to mass media or competitors. This method is commonly used by intelligence agencies and known as the "canary trap".

FREQUENTLY ASKED QUESTIONS

How much does it cost to implement the ILD system? How to calculate the price? What is the minimum number of licenses I can order?
ILD system licenses are purchased for each workstation. The cost of the system depends on the following options: ILD system operation within your organization — either offline or integrated into EDMS; the number of employees interacting with the system; the type of deployment platform and the period of operation. You can purchase any number of licenses, even one license. The cost of deployment is calculated individually, depending on your company's IT infrastructure and settings.
What is the average deployment time for the system? What does it depend on?
On the average, the system deployment takes three months. The final date depends on the number of users and the system architecture.
Can I get test access to ILD system to check out its features?
Yes, sure. You can request a demo on our website.
Which popular EDMS can be integrated with ILD?
ILD has already been successfully integrated with a number of popular EDMS: IBM Filenet, Directum, Documentum, Sharepoint, ECM, and Alfresco. We also developed our own REST-protocol, allowing any third-party system to use ILD functions. Integration with self-developed systems of confidential e-document flow takes place within the framework of ILD integration projects performed by our staff.
How can you use ILD?
  1. In offline mode: the system works without integration with document workflow systems.
  2. As an integration solution for EDMS: all confidential documents are stored in our secure storage or in your storage, and EDMS controls access to documents.
  3. As a cloud service: we deploy the system based on our infrastructure and provide access via the Internet. This option allows for both offline and integrated operation.
What types of documents can be handled by the system? Can ILD protect images and drawings?
ILD works with any graphic images of a document that has at least a few lines of text.
What is the system algorithm principle?
The algorithm uses affine transformations. The system recognizes the image of the original, finds words and strings in it. By generating a personal copy, ILD randomly moves the rows vertically and the words in the lines horizontally in relation to each other. These changes are not visible to humans, but they form a unique "depiction" of a copy identifiable by the system.
What portion of the document would be enough to investigate the leak? Is the photography enough for investigation?
A small paragraph is sufficient for the system to successfully investigate the case. If the text in the photo is readable, that's enough.
What is the degree of probability to identify the owner of a document copy during the investigation?
The system analyzes the copy and generates a matching rating compared to the sample. The results of this rating are sorted in a descending order. For the final decision, a security officer shall compare the personal copy that caused the leak and the sample. The officer will unambiguously determine whether the images are the same.
How does the system reduce the likelihood of document leaks on paper media?
ILD creates a situation when a thief will be exposed and incur liability. Inevitability of punishment minimizes the number of leaks because the thief simply does not have a chance to remain anonymous.
Will the system be able to work with our LDAP directory?
The system allows you to work with any directories that supports LDAP protocol.
Can we request a demo in our office to check out the system performance?
Yes, it's possible. We'll introduce you to the basic features of ILD system — document processing, generating a copy and printing multiple copies. We'll also investigate and identify the point of the simulated leak.
Where does ILD store the document copies? How much space does the data storage occupy?
The system does not store copies, but their digital signatures, which are 10-15 KB only.
How long is the document copy retained?
The retention period is easy to set up. By default, it is set to nine hours. Retention period for digital masks is not limited in time.
Where are the images stored?
They are stored in a closed storage segment.

If you could not find an answer to your question, please, send it through the contact form. We'll get back to you shortly.

Ask a question

REQUEST A DEMO

Check out the demo version of the ILD system. What you can do:

  • Upload a document into the system;
  • Create a protected copy;
  • Request multiple personal copies of the uploaded document;
  • Run investigations.

Fill in the form below to receive account credentials:

Everytag - Keeping secrets

EVERYTAG LLC — ILD SOLUTION DEVELOPER

Development of confidential information protection tools.

PARTNERS

COMPANY CUSTOMERS

  • Sberbank
  • VTB
  • Svyaztransneft

Contacts

Everytag LLC
Novorogozhskiy BC, building 93, block 2, Rabochaya Street, Moscow.