Monitoring and Control Bundle:
Communications Monitoring Module
Record all employee communications - Email (including webmail) & Instant Message Conversations
Employee communications are the backbone of all business. Yet, they also represent a critical unaddressed threat to business. Indeed, a company’s very survival can be put at risk by essential business information being circulated in the wrong way to the wrong people. Because Web-based mail sites (such as Hotmail, Yahoo mail and AOL mail) offer such a high degree of anonymity, employees can use these sites to send highly inappropriate, offensive, or even potentially damaging communications on company time. With SONAR, however, you’ll even be able to record all forms of computerized communications, including Webmail, ensuring that you know exactly what information is coming into and going out of your company.
Instant Messaging can be a useful productivity tool. Our goal, with SONAR, is to make certain it is used only in ways that enhance the value and service of your business, not as an unpoliced method to misrepresent your company and its policies.
SONAR is unique. Competing solutions are unable to monitor webmail or instant messaging programs because the competitors only control what goes through the company’s own email servers. Webmail and Instant Messaging usually do not. SONAR’s unique design ensures that these employee communications – along with all communications sent over company email servers -- are all recorded and monitored, providing you with the ability to effectively protect your company from the many threats that Webmail and IM can pose.
Example: SONAR records every Instant Message conversation that an employee engages in. By creating an unchangeable record of all employee communications, SONAR ensures that you can identify potential problems early, and stop them before they cause your organization any damage. SONAR also provides the most advanced e-forensic tools now available, allowing you, at any time, to search and review all employee communications, and all work done on word processing programs, spread sheets, presentations, even queries to your company data bases.
SONAR’s records are unalterable. This can protect your business from costly litigation, and also ensure that your business has the foundation with which to meet federal and state compliance guidelines.
Web Monitoring & Filtering Module
Monitor and filter Internet use on and off your network
Internet Filtering / Block Websites
SONAR gives you total control over employee Internet usage. This gives you the power to increase employee productivity by eliminating frivolous web surfing, and where appropriate, enforce your Acceptable Use Policy. SONAR’s unmatched Internet blocking capabilities give you total control over Internet use no matter where it happens - in the office next door, or on a laptop continents away. Indeed, only SONAR allows you to control web access on laptops that never connect to your network.
Our easy-to-use proprietary filtering system allows you to totally control your employees’ Internet access with the following tools:
Blocking Based on Website Category
SONAR allows you to block entire categories of websites (such as pornography, gambling sites, time-wasting sites, etc.) so that you can control employee web surfing activity to keep them focused where they should be.
Advanced Content Filtering
SONAR’s Advanced Content Filtering also allows you to block websites on-the-fly. SONAR’s content filtering module perpetually scans web pages, in real-time, for blocked words and terms that you set. Whenever a blocked word is encountered, the webpage is instantly shut down before the user can view the restricted content.
White Listing of Websites
SONAR also allows you to create a "White List" of acceptable websites, for those businesses seeking the highest level of security protection and the certainty that all employee Internet use is for the efficient completion of business tasks. Only "White List" sites are then allowed onto employees computers - both those on the network and those off of it, like laptops, or desktops used by home-based employees.
Keystroke Monitoring Module
Capture all keystrokes typed
SONAR's keystroke module provides the most granularity of any monitoring application available. You'll be able to see each individual keystroke typed in your organization. This provides you a secure, detailed transcript of all activities done on computers within your entire company. Even if employees are located states, or even countries apart, SONAR will report all keystroke activity, regardless of the application that they were typed in. Results are then sent seamlessly and undetectably back to the Centralized Reporting System.
Best of all, unlike other keystroke recorders, SONAR formats the keystroke data into an easy-to-read format that makes finding critical information a simple task.
Software Application Module
Monitor and block software application use on a scheduled basis
SONAR allows you to set time restrictions on if and when certain software applications can be used. Are employees spending time watching YouTube videos? SONAR can restrict the time – or prevent entirely -- when the underlying video-player application can be used. So, no more video-watching, or other time-wasting activities can be engaged in on company time.
With an intuitive interface and a completely customizable scheduling system, you can quickly and easily manage your entire workforce and ensure that your policies are always enforced. SONAR's Program Monitoring and Blocking Module provides you with total control over each and every computer in the company, and can be tailored on a user-by-user basis.
Take Screenshots of any computer activity
With SONAR's revolutionary screenshot module you'll be able to see EXACTLY what your employees are doing. SONAR's screenshot module provides you with incontrovertible visual evidence of each employee’s computer activity - providing conclusive, actionable data. This essential security module works in two ways:
- SONAR will take a screenshot of the employee's desktop whenever an alert word that you have defined is typed or read on a webpage
- Acting like a hidden surveillance camera, SONAR records what is essentially running video of the person's desktop activity. SONAR's screenshot module allows you to quickly identify and document inappropriate activity. This level of detail ensures that you can act on the information that is recorded, and gives you the power to make decisive, informed decisions.
SONAR can be set up to capture each employee’s computer activity, or target only those employees considered the greatest security risks. Other applications force you to go through cumbersome gyrations just to obtain the IP address associated with a given piece of data, even though the IP address cannot be linked definitively to a specific employee. In contrast, SONAR's screenshot module provides you with visual evidence of each person's unique desktop - providing conclusive, actionable data.
Data Loss Prevention (DLP) Bundle:
Attachment Capturing & Blocking Module
Monitor and block all email attachments
Data in motion presents major challenges to any company – and any Data Loss Prevention (DLP) solution. Employees increasingly use web-based applications such as Gmail and IM. Competing DLP solutions are completely blind to these applications, failing to monitor or block communications that could harm your business. Most employees already know this. So, it becomes easy for sensitive data to leak out of an organization - intentionally or otherwise.
But, SONAR works like a laser, not a sledgehammer. SONAR scans email attachments instantly at the local computer, without having to contact a company server. This allows you to enforce individually, on a case-by-case basis, the polices that will effect each employee’s computer use. The CEO can have blanket permission to attach files to an email. A junior member of the accounting team, however, can be blocked from attaching a spreadsheet of your company’s sensitive financial data to a Gmail email, as well as many other Webmail applications. No other software can do this. Only SONAR.
File Tracking Module
Be alerted to file action violations
Much of a company's intellectual property, trade secrets, and confidential market data are stored on computers. To ensure that this critical information remains safe, it is essential to be able to monitor and control who accesses this information and what they do with it. SONAR's file tracking module, uniquely, makes it easy for administrators or senior-level management to control access to mission-critical information.
SONAR is raising the bar in data protection, by taking actions – blocking or tracking access -- based on the contents within a file (for example, a Word document or Excel spreadsheet) as well as file names and paths, SONAR also eliminates the need for cumbersome fingerprinting of documents, or the need to check all files against a critical document repository on a server. This is file-tracking at its most effective, and yet simplest to deploy.
Removable Media Monitoring/Control Module
SONAR's Removable Media Monitoring and Control module, with its ability to block the copying of any file to removable media based on the file's content, strikes the ideal balance between protection of a business’s assets and the efficiency of day-to-day operations. There are multiple points of possible leakage inherent to any PC within an organization. For any company to achieve a true measure of protection against the loss of critical information, all of the points of potential failure must be identified and controlled. This is particularly true with removable media like USB memory sticks.
SONAR, unlike competitors, doesn’t simply shut down the use of all removable media at all times. This is throwing the baby out with the bathwater. Instead, SONAR can be targeted to prevent only files with pre-determined sensitive content from being saved to a USB memory device.
SONAR works with the flow of your business, to improve your business. No more. No less.
Enforce policies on PCs that never connect to a network (even laptops)
Traditional Data Loss Prevention software thrives on complexity. It often creates more problems than it solves, by being difficult and expensive to install, and easily evaded. In short, it delivers less than promised, and so creates risks all its own. SONAR takes a different approach. We provide total DLP protection across your entire organization - regardless of where your employees or your critical information reside. We promise. We deliver.
In today's increasingly mobile world, where employees and contractors alike demand instant access to corporate assets and information from remote locations, protecting that information can be extremely difficult. Traditional network-based solutions have porous perimeters. Removable media? Webmail? Instant Messaging? All these escape the control of many of our competitors. They offer limited, qualified “data loss prevention”.
SONAR does not. SONAR DLP can identify and protect sensitive information no matter where it's being accessed. SONAR is installed at the desktop level and reports back over standard HTTPS protocols, instead of over the network. This matters, crucially. SONAR builds a protective circumference around all your businesses computing activities. SONAR's unique agent-based approach will allow you to identify, track, and control who accesses your data, what data they access, and what they can and cannot do with that data. Whether your concern is contract workers accessing your information from the outside, PCI compliance, or employees who have access to personally identifiable information (PII), SONAR protects, records, monitors and reports to key management.
Most importantly, all of this is done with an application that can be deployed and configured in a matter of minutes with a minimum of allocated resources. Other DLP solutions? Weeks or months to install, and enormous strain on the entire business. In DLP, choosing the best is also choosing the easiest and most cost-effective option: SONAR.
Stolen Laptop Recovery Bundle:
Over 85% of all businesses report having a computer with sensitive information lost or stolen. For any business, this can represent a severe challenge that threatens its very foundations. A stolen laptop might contain the most confidential company information: patents and other intellectual property; customer data (including financial records, credit card details, health records), M&A plans, proprietary investment algorithms, company bank records. The impact on a business can be substantial – there are possible severe legal and regulatory implications.
SONAR protects your laptops, and so protects your business.
Once a laptop is stolen or lost, SONAR, uniquely, does four things that are absolutely vital:
- SONAR allows you to remotely retrieve a directory listing of all files and folders on the stolen or lost laptop, and then retrieve all critical lost files. The laptop may be gone, but not the essential data you need.
- SONAR allows you to delete safely any or all files, or wipe the entire hard drive of all its contents.
- SONAR creates a record of all activity on the computer after it’s been lost or stolen. This can allow you to verify if any critical business files, or even your online banking passwords, have been accessed by an unauthorized person, whether it’s a thief or someone who finds the computer and later returns it.
- SONAR’s recovery team has been extremely successful in being able to return the physical property to the rightful owner.
Remote File Retrieving Module
Once a laptop is lost or stolen, SONAR allows you to use the laptop as if it were still in your hands. SONAR allows you remotely, over any internet connection, to retrieve a directory listing of all files and folders on the stolen laptop. You then decide which files you want to retrieve over the Internet onto a secure server. Once you’ve got back the files you need, they can be safely deleted from the stolen or lost laptop with the remote data deletion module (see below). In short: you have all that is essential from the stolen laptop, and you protect those files from any subsequent misuse.
Remote Data Deletion Module
With SONAR's remote data deletion module you can rest assured that even if a company laptop is stolen, the sensitive data it holds can be wiped clean from the computer.
Increasingly, legislation is mandating that companies report the theft or disappearance of company laptops. Just this reporting requirement can cost a business a great deal of money. Even worse, any such theft can open the way to criminal and civil legal action against the company. Here, the potential losses for the company can become truly astronomical.
No matter where the laptop is taken, SONAR lets you issue a remote delete command that will permanently erase the data on that laptop. This is true even if the missing laptop never connects back to the corporate network.
SONAR, importantly, will also give you a confirmation that all files have been deleted from a lost or stolen laptop. This is especially important for public companies that might otherwise have to report the laptop disappearance.
Losing a laptop is always a problem. SONAR, alone, can limit liability and exposure.
Monitor and control everything the thief does
Once activated, SONAR enables you to see everything being done on a lost or stolen laptop.
Example: your laptop is stolen out of your car. Log-in to SONAR, and you’ll instantly be able to find out what the thief has been doing with the laptop and its contents. Has he accessed sensitive company data? Read your emails? Found the passwords to your personal online banking account?
Only SONAR can give you this critical information, so you can respond most quickly and effectively to the threats from laptop theft.
Of course, SONAR then lets you (using our File Retrieving and Data Deletion modules) retrieve all vital files, then delete them from the stolen computer.
Stolen Laptop Recovery Module
In the event of a laptop theft, the SONAR Recovery Team will begin immediately working to recover the stolen laptop. We have some very powerful tools to achieve this, based on our unique architecture. For example, only SONAR can monitor, without possibility of detection, the thief’s actual activities on the computer, and capture the personal information that leads to the criminal, and to the stolen laptop.