ILD - INFORMATION LEAKS DETECTION
DOCUMENT LEAK DETECTION SYSTEM
"Security Module" for your documents. Protection of paper documents and printed copies, sensitive information leakage risks on paper media are reduced by:
Prompt investigation of leaks and finding a staff member who may have been supplying information to competitors or mass media for years
Preventive measures: staff members are warned that any transfer of information will be investigated and, with 100% probability, a thief will be found
Special "leaks" initiated by security service in order to identify security vulnerabilities in the company's information protection system, or reveal untrustworthy employees
This is particularly important if your company:
Has a large document flow with considerable volume of sensitive commercial or scientific and engineering information
Has a structure where the major part of sensitive data is represented by hard copy documents
May suffer material losses through the risks to reputation
WHY IS IT SO EASY TO LOSE IT?
Confidential documents usually contain data on the company's achievements or research activities in the area of production and engineering, scientific studies, as well as research & development. Together with the financial statements and customer data, this information represents a commercial secret. Such data leaks jeopardize the reputation of the company and may cause loss of revenue.
Confidential documents include:
Minutes of meetings
Test and research protocols
Inquiries of controlling and inspection authorities
Currently, digital information is protected by DLP systems (Data Leak Prevention). However, paper documents are still vulnerable.
Such documents can be unlawfully copied and transferred to third parties. This may cause financial losses and reputation damage since leakage of documents stamped and signed by executives may inflict irreparable damage on any organizationation.
Up to 20% of data leaks occur through paper media!
HOW DOES ILD WORK?
The ILD system (Information Leaks Detection) is a security module, representing a special system for protection of the company's confidential e-document flow. The ILD system operation is based on the patented algorithm: it automatically converts each copy of the document into a new personalised file. The changes are not visible to the human eye, but can be read by the system with 100% probability even in complex cases, such as:
Screenshots and photocopies
The ILD system neither copies the documents, nor archives them in the workflow system, but retains three parameters:
Date and time when
the copy was created
Information about the recipient of
a personal copy of the document
The ILD solution is easily and quickly integrated into the company's Electronic Document Management System (EDMS). Integration with any popular ECM system (IBM FileNet, Documentum, Directum, Sharepoint, ECM) will make your EDMS a totally leak-proof system.
The security module doesn't interfere with the workflow and doesn't require changing the routine scheme used by employees to receive documents from ECM. When requesting a copy, a user does not have to fill out any questionnaires or enter a personal ID, the ILD system automatically converts the document into a personal tagged copy and issues it through the usual algorithm. Employees may not even know that ILD system is deployed in your company.
Each new copy of the document:
WHO'S LEAKING CONFIDENTIAL INFORMATION?
* According to InfoWatch
In 2016, up to 44 leaks of information occurred every second (Breach Level Index). That is 1.4 billion cases per year, 86% more than in 2015. However, there is a positive trend too: in 2016, the number of leaks caused by employees fell because of security measures applied within companies.
WHAT TO DO IF LEAKS OCCUR REGULARLY WITHIN YOUR COMPANY?
Leaked report reveals BP safety failures as it heads back to the Gulf of Mexico.
The confidential document handed to Energydesk and shared with the Financial Times, reveals serious weaknesses in the way the company manages critical information and reporting of incidents at its refineries and oil rigs. It went on to claim the failures got close to two potentially lethal accidents and was costing the firm $180m a year. The list of failures stretches from missing blueprints to crucial anti-blowout devices being wrongly installed. In recent years the report notes - these have resulted in repeated near-misses and two serious incidents.
Panama papers firm Mossack Fonseca shrinks globally.
A trove of 11.5 million digital records from the Panamanian law firm revealed how many of the world's wealthy used offshore companies to stash assets. Perpetrators ranged from simple businessmen to Heads of States and sports stars. The data was leaked to a German newspaper, Sueddeutsche Zeitung, which shared them with the International Consortium of Investigative Journalists (ICIJ), and reports appeared in major media from April 3, 2016.
ILD SYSTEM PREVENTS INFORMATION LEAKS
Though the ILD system cannot guarantee to prevent all paper document leaks, it can ensure revealing the point of leak. However, with the announcement of ILD system deployment, potential information security intruders would reflect on the consequences of their actions. Experience has shown that the system is capable of reducing data leaks to almost zero in those organizations where such cases occurred frequently.
ILD enables the prevention of information leakage and reaches the thief before the data is lost. Simply upload a false document in the secure e-document flow system with allegedly all-important confidential information and wait until documents are leaked to mass media or competitors. This method is commonly used by intelligence agencies and is known as the "canary trap".
FREQUENTLY ASKED QUESTIONS
How much does it cost to implement the ILD system? How to calculate the price? What is the minimum number of licences I can order?
ILD system licences are purchased for each workstation. The cost of the system depends on the following options: ILD system operation within your organization, either offline or integrated into EDMS; the number of employees interacting with the system; the type of deployment platform and the period of operation. You can purchase any number of licences, or even just one licence. The cost of deployment is calculated individually, depending on your company's IT infrastructure and settings.
What is the average deployment time for the system? What does it depend on?
On average, the system deployment takes three months. The final date depends on the number of users and the system architecture.
How can I get the latest version of ILD system to check out its features?
Which popular EDMS can be integrated with ILD?
ILD has already been successfully integrated with a number of popular EDMS: IBM Filenet, Directum, Documentum, Sharepoint, ECM, and Alfresco. We also developed our own REST-protocol, allowing any third-party system to use ILD functions. Integration with self-developed systems of confidential e-document flow takes place within the framework of ILD integration projects performed by our staff.
How can you use ILD?
In offline mode: the system works without integration with document workflow systems.
As an integration solution for EDMS: all confidential documents are stored in our secure storage or in your storage, and EDMS controls access to documents.
As a cloud service: we deploy the system based on our infrastructure and provide access via the Internet. This option allows for both offline and integrated operation.
What types of documents can be handled by the system? Can ILD protect images and drawings?
ILD works with any graphic images of a document that has at least a few lines of text.
What is the system algorithm principle?
The algorithm uses affine transformations. The system recognizes the image of the original, finds words and strings in it. By generating a personal copy, ILD randomly moves the rows vertically and the words in the lines horizontally in relation to each other. These changes are not visible to humans, but they form a unique "depiction" of a copy identifiable by the system.
What portion of the document would be enough to investigate the leak? Is the photography enough for investigation?
A small paragraph is sufficient for the system to successfully investigate the case. If the text in the photo is readable, that's enough.
What is the degree of probability of identifying the owner of a document copy during the investigation?
The system analyses the copy and generates a matching rating compared to the sample. The results of this rating are sorted in descending order. For the final decision, a security officer will compare the personal copy that caused the leak and the sample. The officer will unambiguously determine whether the images are the same.
How does the system reduce the likelihood of document leaks on paper media?
ILD creates a situation where a thief will be exposed and incur liability. Inevitability of punishment minimizes the number of leaks because the thief simply does not have a chance to remain anonymous.
Will the system be able to work with our LDAP directory?
The system allows you to work with any directories that support LDAP protocol.
Can we request a demo in our office to check out the system performance?
Yes, it's possible. We'll introduce you to the basic features of ILD system document processing, generating a copy and printing multiple copies. We'll also investigate and identify the point of the simulated leak.
Where does ILD store the document copies? How much space does the data storage occupy?
The system does not store copies, but their digital signatures, which are 10-15 KB only.
How long is the document copy retained?
The retention period is easy to set up. By default, it is set to nine hours. Retention period for digital masks is not limited in time.
Where are the images stored?
They are stored in a closed storage segment.
If you could not find an answer to your question, please send it through the contact form. We'll get back to you shortly.
TRY IT NOW
Request the latest version of the ILD system. What you can do:
Upload a document into the system
Create a protected copy
Request multiple personal copies of the uploaded document
EVERYTAG LLC - ILD SOLUTION DEVELOPER
Development of confidential information protection tools
Novorogozhskiy BC, building 93, block 2, Rabochaya Street, Moscow