Home
About us
Products
Partners
Knowledge Base
Press Office


Advantages

A focus on business.
Permitetrix integrates with all business processes and involves all of an organization’s key divisions. This makes it possible to conduct audits and modernize processes. It also helps the organization enforce a unified, centralized and approved information security policy, in particular the policy on confidential documents.

Protection against any type of internal threat.
This feature provides security for situations where: the company, its management or shareholders find themselves compromised; abuse of office; corporate espionage; sabotage; and employee negligence. This protection ensures the safe-keeping of commercial secrets, an increased competitive edge, the establishment of beneficial relations with investors and partners, and compliance with government requirements.

Compliance with government and industry requirements.
Perimetrix can help achieve compliance with the most critical government regulations and industry standards governing the protection of a variety of different data types. These include: the Bank of Russia's STO BR IBBS-1.0 Standard, Basel II, SOX, PCI DSS, the Federal Law on Personal Data, the National Code of Corporate Governance and privacy laws, GLBA, HIPAA, and others.

A unified, corporate-wide information security policy.
The reliability of protection depends on whether or not a company has put a unified information security policy into place. The use of different approaches for each channel can result in a “software zoo,” lowering the effectiveness of corporate information systems and blurring the lines between the responsibilities of employees and company divisions. Perimetrix brings together the different components of the corporate information system under one common security policy.

Confidential data.
Perimetrix performs automated, continuous control over the entire lifecycle of confidential documents. From the moment confidential documents are created right up until their official destruction, the client will have an extensive history for each and every document, including who worked with them and when. This powerful tool makes employee actions transparent and prevents both intentional and accidental breaches of the information security policy.

Corporate information system integration.
Perimetrix integrates closely with heterogeneous corporate storage and data processing programs (RDBMS, ERP, CRM, HRMS, PLM, and others). As a result, the internal information security system penetrates all of the key elements of the corporate IT infrastructure, while accumulating all kinds of data, propagating a common policy, and reinforcing the foundation of corporate confidentiality policies.

Giving structure to corporate content.
Perimetrix allows the client to organize corporate content, classify data, and identify and control protected components.

Protection is priority.
Unlike competitors who focus on the control of dedicated communication channels, the Perimetrix security paradigm is based on controlling the component under protection: confidential documents. This approach provides incomparable flexibility when it comes to settings, the effectiveness of protection and universality (the client won’t have to deal with an endless competitive race to provide support for unpackers and different types of mobile devices, protocols, etc.).

Confidence in protection.
The use of third-generation DLP technologies (a combination of probability and deterministic methods) helps achieve 100% effective protection for classified data and 99.6% for non-classified data.

Control across all levels.
Perimetrix provides end-to-end, full-scale control over confidential documents, including data-at-rest, data-in-use, and data-in-motion.

One step ahead of insiders.
Perimetrix identifies and analyzes hidden dependencies in employee operations in order to proactively identify potentially threatening actions and prevent the breach of document confidentiality and integrity.

A solution that grows with the organization.
Perimetrix develops with your business. Advanced clustering technology makes Perimetrix the most comprehensive solution available. A cluster will bring together any and all computing capabilities and permit the dynamic balance of both load and functions in order to optimize performance and complete priority tasks.

An evidence base and extensive audit functions.
Perimetrix accumulates exhaustive logs for each user and each document over an assigned period of time. These records are stored in the central database. This provides invaluable material for conducting an internal audit, a retrospective investigation of specific incidents, and evidence of noninvolvement in an information leak. It also plays a critical role in achieving compliance with government and industry requirements.

A unique approach to business.
Perimetrix uses industry-specific referential models to keep track of industry factors and business scenarios typical for each industry (SSBS, Security Sensitive Business Scenarios (SSBS)). In particular, supported sectors include government service, telecoms, the power sector, banking, commerce, services, mining, processing, heavy and light industry, insurance, and others.

 

Didn't find something you were looking for? Need additional information? Please, get in touch with the Perimetrix Team!

 

Data Leaks: Fact & Figures

80% of efforts by companies to protect confidential data are spent in the form of technological protection from external threats: while 80% of attacks, presenting a serious threat to the business, were performed from within.
US Secret Service // Insider Threat Study

The risk of losing informational resources, due to internal threats, is on a rising tendency: 84% in 2007 vs. 59% in 2006.
PwC // Global State of information Security

75% of Fortune 500 companies have experienced problems with intellectual property theft.
Ponemon Institute // Cost of a Data Breach

87% of incidents are the fault of non-technical personnel - people who do not have specific computer skills. Only in 9% of the cases, those responsible for the incident were IT specialists.
CSI/FBI // Computer Crime Report

In 78% of incidents, insiders used legal access to the company's information resources, and in 43% of these incidents they used their personal logins and passwords. In 83% of the incidents, the attacks occurred in the workplace, and in 70% - during business hours.
CSI/FBI // Computer Crime Report