Published on June 6, 2008
Ratinder Paul Singh Ahuja, Ph.D C.O.O & C.T.O 05/02/06 Reconnex Confidential
Reconnex performs content monitoring, alerting, and forensic analysis Switch The Reconnex iGuard Competitive Advantage • IP theft • Defensibility of Trade Secrets • Competitive Intelligence Critical Corporate Compliance Information Governance Security • • • “Insider” Threats SOX SB1386 • Workplace Safety • • Forensics GLBA • Appropriate Use of • • Social Engineering HIPAA Corporate Resources 05/02/06 Reconnex Confidential
Traditional Bottom UP Approach • Firewalls/antivir us • Network intrusion Communication detection/protec tion Protocols • Network flow tools Ports • limited session Bits reconstruction 05/02/06 Reconnex Confidential
The Bottom Up View: Bytes, Ports and Protocols 05/02/06 Reconnex Confidential
More Bottom Up 05/02/06 Reconnex Confidential
New Approach: Top Down WORD JPG GIF BMP TIFF C++ Objects, document & applications Communication Protocols Ports Bits 05/02/06 Reconnex Confidential
What Can You See? Over 150 content types Microsoft PowerPoint E-Mail Microsoft Excel Proprietary Schematics Format India Romania Source code Confidential Documents Offshore Development 05/02/06 Reconnex Confidential
Reconnex has the ONLY Solution That Addresses the Known and Unknown Threats The Reconnex iController Executive Team Finance Gigabit Databases The Reconnex Ethernet or Repositories Sales iManager Off-Shore Integration Points InfoSec/IT • SIM • Storage • AD/LDAP Switch • URL Filtering or Tap Signature • Web & Mail Proxies Match Rule “Reconnex’s forensics Match capabilities are a key piece of my compliance policy.” The Reconnex iGuard — Detect — Remediate Register — Report 05/02/06 Reconnex Confidential
Reconnex Surveillance Types • General Surveillance of all content, documents and communications • Document/Date/Time/Size/Watermarks/Sender/Recipient … • Targeted Surveillance, powered by Reconnex Document Registration • Exact or Generic Phrases/Individuals… • “A Unique Solution to the Problem of False Positives” • Can be operated on an ad hoc or scheduled basis CONFIDENTIAL - All Rights ReservedReconnex Confidential
What does Reconnex iGuard do? • Captures, classifies and stores in real time all content going in or out of a network • Alerts are generated for policy violations in real time • Allows for forensic searches over captured content for issues that you may become aware of in the future Gigabit network 05/02/06 Reconnex Confidential
The Reconnex Difference Real-Time End User Alerts Inbound capture(?) RCPE Network Traffic Rule Creator Outbound capture Content Historical Forensic Summarization Content Investigator Look Up Table (RFS) 05/02/06 Reconnex Confidential
Why don’t other products do this? !!Because it’s HARD!! Content Historical Summarization Content Look Up Table (RFS) Forensic Investigator 05/02/06 Reconnex Confidential
Easy to use Browser based access 05/02/06 Reconnex Confidential
Drill down to actual content 05/02/06 Reconnex Confidential
Moments of Revelation from “Top Down” Work with Reconnex CONFIDENTIAL - All Rights ReservedReconnex Confidential
www.reconnex.net 05/02/06 Reconnex Confidential
... FireEye, and Gigamon show you how you can "See More. ... application analysis, forensics review and ... You have more control over your monitoring ...
... and Gigamon show you how you can "See More. Secure ... and Centralizes Network Performance Monitoring with Gigamon. ... Gigamon Traffic Analysis.
Gigamon Enables Threat Detection and Analysis at ... Security Monitoring Appliances, from Gigamon's ... content is expressly ...
... company as Vice President of Worldwide Channel Sales bringing with him more ... at Gigamon, Sullivan will lead ... analysis, data forensics ...
View Andrea Smith's professional profile on LinkedIn. ... alerting and visual forensics to identify when users are putting your ... See who you know in ...
Application & Server Log Monitoring, Correlation, & Alerting. You searched or ... real-time event correlation ; Perform forensic analysis on ... Content ...
... a "network tap" may be the best way to accomplish this monitoring. The network ... network traffic analysis cannot ... because all you will see is ...
HP ArcSight Logger is a log ... Built in rules and reports enable monitoring, alerting, and forensic ... Enterprise Content Management; File Analysis;