SlideShare une entreprise Scribd logo
1  sur  26
SPHERESHIELD FOR
WEBEX TEAMS &
MEETINGS
Compliance & Security
OVERVIEW OF AGAT
SOFTWARE
Skype Teams Webex Slack Zoom RingCentral
PLATFORMS
ETHICAL WALL
Control who can communicate with
whom
Internal communication between
different groups/users/domains/Spaces
Federation with external, users/
Guests
Control specific collaboration
options
Control communication
types between users
Including:
IM’s,
file-sharing, Audio/Video/Screen-sharing
ETHICAL
WALL
SAMPLE POLICIES: INTERNAL AND EXTERNAL
MY COMPANY
MY
COMPANY
Group A
Group B Group C
IM
Audio/Video
Files
Allow Policy
…..
Limit Policy
IM
Audio/Video
Files
…..
IM
Audio/Video
Files
Block Policy
…..
Group A
Other Group
Allow Policy
IM
Audio/Video
Files
…..
IM
Audio/Video
Files
Limit Policy
…..
IM
Audio/Video
Files
Block Policy
…..
IM
Audio/Video
Files
Block Policy
…..
Federated
Company A
Federated
Company B
External Policy Using
Ethical Wall
Internal Policy
Using Ethical Wall
PRE-VALIDATE
MEETING
• SphereShield validates all meetings as soon as
they are scheduled before they start
• The user violating the policy will be removed.
• A message will be sent to organizer.
FEATURES
• Covers all MS Teams scopes: Chat, Teams & Channels and meetings
• Analyze Webex meeting participants
• Notifications – Popups and In-context
• Auditing and reports for training and awareness
• Works like a firewall – scans policies from top to bottom
DLP
INSPECTION
MAIN FEATURES
• Inspect messages, Files (Audio, Video inspection with Compliance
Recording)
• Block, Mask, Notify
• Complete Scope – policies apply to Spaces/Chat/Meetings
• Create Granular policies based on External Traffic/ Users/Groups/Spaces.
• Notifications to end-user (in context or pop-up)
• Incidents are displayed in SphereShield Admin Portal along with content
and users info. As well as links to eDiscovery
General DLP Demonstration
DLP INTEGRATION
Sending messages and files to existing DLP vendors or SphereShield DLP engine to
meet existing policies. incidents will be displayed at the vendor’s incident manager
DLP ADDED
ADVANTAGES
Active DLP - Preventing sensitive data being sent
to the cloud and reaching destination
Taking advantage of existing DLP infrastructures,
experience and policies
Prevent sensitive data from being sent to external users
Scan data shared with external / guest users
Audio & Video Data Loss Prevention (Available with
Recording AI Compliance Analysis)
Inspect Files for Custom Rules
RECORDING AI
COMPLIANCE
ANALYSIS
RECORDING AND ANALYSIS
MAIN CAPABILITIES
• Enforce Recordings based on flexible policies
• Transcript of all users meeting audio
• Converts speech to text in 70+ languages with automatic language
detection
• Speaker enumeration: which speaker spoke which words and
when.
• Meeting eDiscovery - make meeting searchable by many parameters
• Automatically Inspect meeting content by DLP and Ethical Wall policies
• Audio DLP via Audio transcript – Realtime!
• Video DLP via On screen OCR from video and screen/document
sharing
• Links to eDiscovery
• On prem storage of Audio/Video Recordings
• Integrated with Leading DLP Vendors
ARCHIVE &
eDISCOVERY
eDISCOVERY
• Advanced search by text, user, dates and more
• Integrate with existing eDiscovery systems
• Search for personal information and export
user data
• See message context in incidents
• Support files and Messages (Audio&Video
Available with Recording AI Compliance
Analysis)
• Archive data on cloud or on site
• Meet GDPR and compliance requirements
RISK ENGINE
Meet security requirements
GEO FENCING
• Set Geo Fencing rules based on groups, domains or users.
• Allow, block or monitor access from specific countries.
USER ENTITY
BEHAVIOR
ANALYTICS- UEBA
• Profile Teams usage (messages, files, hours, devices,
IP etc)
• Detect anomaly
• Create and handle security events
• Examples:
o Location change / Impossible traveler
o Large data consumptions
ADDITIONAL SECURITY SOLUTIONS
• Threat protection – Anti Virus/Malware/Phishing
• Conditional Access – ensure that users can only log on from a
managed device – e.g Blackberry, MaaS 360, Airwatch, Citrix
ROAD MAP
GOVERNANCE
• Control who can create a space
• Space Live cycle management – for how log data should be kept
• Auto archive inactive spaces
• List of Spaces and Members
WORKPLACE
ANALYTICS
• List of active and non active spaces
• How many users in each space and if they are external users
• Automatic messages to encourage users to use the product
• User behavior trends and change notification
• Trends in spaces popularity by messages and users
• Identify Space champions
• Reports by Active Directory groups
SERVICE OFFERING
SaaS - online service
Customers don’t need to install anything.
Each customer will have dedicated servers
A customer installation solution
Customers install SphereShield in their DMZ or
Cloud (e.g. Azure, AWS)
A Free Trial is available
MORE INFO
Visit our website
Contact us
+972-525209860
https://AGATSoftware.com
sales@agatsoftware.com

Contenu connexe

Tendances

Virtual assistant presentation
Virtual assistant presentationVirtual assistant presentation
Virtual assistant presentationAGAT2
 
Social Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskSocial Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskPrecisely
 
SkypeShield - Securing Skype for Business
SkypeShield - Securing Skype for BusinessSkypeShield - Securing Skype for Business
SkypeShield - Securing Skype for BusinessYoav Crombie
 
Sophos synchronized security in action @Netpluz CS Event Nov 2017
Sophos synchronized security in action @Netpluz CS Event Nov 2017Sophos synchronized security in action @Netpluz CS Event Nov 2017
Sophos synchronized security in action @Netpluz CS Event Nov 2017Netpluz Asia Pte Ltd
 
Multi domain security-management_technical_presentation
Multi domain security-management_technical_presentationMulti domain security-management_technical_presentation
Multi domain security-management_technical_presentationdavebrosnan
 
00. introduction to app sec v3
00. introduction to app sec v300. introduction to app sec v3
00. introduction to app sec v3Eoin Keary
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Benelux
 
Technet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager PresentationTechnet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager Presentationjasonlan
 
Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Ricardo Resnik
 
Sophos Security Day Belgium - The Hidden Gems of Sophos
Sophos Security Day Belgium - The Hidden Gems of SophosSophos Security Day Belgium - The Hidden Gems of Sophos
Sophos Security Day Belgium - The Hidden Gems of SophosSophos Benelux
 
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...DevOps.com
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Sophos Benelux
 
Aureon Managed Firewall
Aureon Managed FirewallAureon Managed Firewall
Aureon Managed FirewallMike Wallen
 
MultPoint Ltd.company overview 2014 3214 short version
MultPoint Ltd.company overview 2014 3214 short version MultPoint Ltd.company overview 2014 3214 short version
MultPoint Ltd.company overview 2014 3214 short version Ricardo Resnik
 

Tendances (20)

Virtual assistant presentation
Virtual assistant presentationVirtual assistant presentation
Virtual assistant presentation
 
Social Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskSocial Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity Risk
 
SkypeShield - Securing Skype for Business
SkypeShield - Securing Skype for BusinessSkypeShield - Securing Skype for Business
SkypeShield - Securing Skype for Business
 
Sophos synchronized security in action @Netpluz CS Event Nov 2017
Sophos synchronized security in action @Netpluz CS Event Nov 2017Sophos synchronized security in action @Netpluz CS Event Nov 2017
Sophos synchronized security in action @Netpluz CS Event Nov 2017
 
Multi domain security-management_technical_presentation
Multi domain security-management_technical_presentationMulti domain security-management_technical_presentation
Multi domain security-management_technical_presentation
 
00. introduction to app sec v3
00. introduction to app sec v300. introduction to app sec v3
00. introduction to app sec v3
 
Sandboxing
SandboxingSandboxing
Sandboxing
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
 
Technet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager PresentationTechnet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager Presentation
 
Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3
 
UTM Cyberoam
UTM Cyberoam UTM Cyberoam
UTM Cyberoam
 
Sandboxing
SandboxingSandboxing
Sandboxing
 
Workspace Technology
Workspace TechnologyWorkspace Technology
Workspace Technology
 
F5 Web Application Security
F5 Web Application SecurityF5 Web Application Security
F5 Web Application Security
 
Sophos Security Day Belgium - The Hidden Gems of Sophos
Sophos Security Day Belgium - The Hidden Gems of SophosSophos Security Day Belgium - The Hidden Gems of Sophos
Sophos Security Day Belgium - The Hidden Gems of Sophos
 
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
GDPR v pojetí F5
GDPR v pojetí F5GDPR v pojetí F5
GDPR v pojetí F5
 
Aureon Managed Firewall
Aureon Managed FirewallAureon Managed Firewall
Aureon Managed Firewall
 
MultPoint Ltd.company overview 2014 3214 short version
MultPoint Ltd.company overview 2014 3214 short version MultPoint Ltd.company overview 2014 3214 short version
MultPoint Ltd.company overview 2014 3214 short version
 

Similaire à SphereShield for Webex Teams & Meetings - Compliance and Security

Sphereshield for Zoom - Presentation
Sphereshield for Zoom - PresentationSphereshield for Zoom - Presentation
Sphereshield for Zoom - PresentationAGATSoftware
 
Sphere shield for ms teams compressed 24 2-21
Sphere shield for ms teams compressed 24 2-21Sphere shield for ms teams compressed 24 2-21
Sphere shield for ms teams compressed 24 2-21AGAT2
 
SphereShield for MS Teams - Presentation
SphereShield for MS Teams - PresentationSphereShield for MS Teams - Presentation
SphereShield for MS Teams - PresentationAGATSoftware
 
Sphereshield for Webex - Presentation
Sphereshield for Webex - PresentationSphereshield for Webex - Presentation
Sphereshield for Webex - PresentationAGATSoftware
 
Sphereshield for webex
Sphereshield for webexSphereshield for webex
Sphereshield for webexAGAT2
 
Sphere shield for webex presentation 3.1
Sphere shield for webex presentation 3.1Sphere shield for webex presentation 3.1
Sphere shield for webex presentation 3.1AGAT2
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...MongoDB
 
SecureScreener_Final
SecureScreener_FinalSecureScreener_Final
SecureScreener_FinalYuval Tori
 
Acronis access for blaud event
Acronis access for blaud eventAcronis access for blaud event
Acronis access for blaud eventBLAUD
 
Securely Monitor Critical Systems From Anywhere
Securely Monitor Critical Systems From AnywhereSecurely Monitor Critical Systems From Anywhere
Securely Monitor Critical Systems From AnywhereInductive Automation
 
SphereShield for Webex Meeting
SphereShield for Webex MeetingSphereShield for Webex Meeting
SphereShield for Webex MeetingAGAT2
 
XO _Hosted Security Product Overview__v.21 (1)
XO _Hosted Security Product Overview__v.21 (1)XO _Hosted Security Product Overview__v.21 (1)
XO _Hosted Security Product Overview__v.21 (1)Pasquale Tursi
 
On-demand & Live Streaming with Amazon CloudFront in the Post-PC World (MED30...
On-demand & Live Streaming with Amazon CloudFront in the Post-PC World (MED30...On-demand & Live Streaming with Amazon CloudFront in the Post-PC World (MED30...
On-demand & Live Streaming with Amazon CloudFront in the Post-PC World (MED30...Amazon Web Services
 
Cloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving itCloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving itHentsū
 
SafeDNS filtering solutions for ISPs & Telecom
SafeDNS filtering solutions for ISPs & TelecomSafeDNS filtering solutions for ISPs & Telecom
SafeDNS filtering solutions for ISPs & TelecomSafeDNS
 
Dubber Partner Presentation Dec 2014
Dubber Partner Presentation Dec 2014Dubber Partner Presentation Dec 2014
Dubber Partner Presentation Dec 2014Justin Absalom
 
Create a Compliance Strategy for Office 365
Create a Compliance Strategy for Office 365Create a Compliance Strategy for Office 365
Create a Compliance Strategy for Office 365Erica Toelle
 
Employing automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptxEmploying automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptxJeffrey Lam
 

Similaire à SphereShield for Webex Teams & Meetings - Compliance and Security (20)

Sphereshield for Zoom - Presentation
Sphereshield for Zoom - PresentationSphereshield for Zoom - Presentation
Sphereshield for Zoom - Presentation
 
Sphere shield for ms teams compressed 24 2-21
Sphere shield for ms teams compressed 24 2-21Sphere shield for ms teams compressed 24 2-21
Sphere shield for ms teams compressed 24 2-21
 
SphereShield for MS Teams - Presentation
SphereShield for MS Teams - PresentationSphereShield for MS Teams - Presentation
SphereShield for MS Teams - Presentation
 
Sphereshield for Webex - Presentation
Sphereshield for Webex - PresentationSphereshield for Webex - Presentation
Sphereshield for Webex - Presentation
 
Sphereshield for webex
Sphereshield for webexSphereshield for webex
Sphereshield for webex
 
Sphere shield for webex presentation 3.1
Sphere shield for webex presentation 3.1Sphere shield for webex presentation 3.1
Sphere shield for webex presentation 3.1
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
 
SecureScreener_Final
SecureScreener_FinalSecureScreener_Final
SecureScreener_Final
 
Acronis access for blaud event
Acronis access for blaud eventAcronis access for blaud event
Acronis access for blaud event
 
IT security solutions
IT security solutionsIT security solutions
IT security solutions
 
Securely Monitor Critical Systems From Anywhere
Securely Monitor Critical Systems From AnywhereSecurely Monitor Critical Systems From Anywhere
Securely Monitor Critical Systems From Anywhere
 
SphereShield for Webex Meeting
SphereShield for Webex MeetingSphereShield for Webex Meeting
SphereShield for Webex Meeting
 
XO _Hosted Security Product Overview__v.21 (1)
XO _Hosted Security Product Overview__v.21 (1)XO _Hosted Security Product Overview__v.21 (1)
XO _Hosted Security Product Overview__v.21 (1)
 
On-demand & Live Streaming with Amazon CloudFront in the Post-PC World (MED30...
On-demand & Live Streaming with Amazon CloudFront in the Post-PC World (MED30...On-demand & Live Streaming with Amazon CloudFront in the Post-PC World (MED30...
On-demand & Live Streaming with Amazon CloudFront in the Post-PC World (MED30...
 
DigitalLibrary4
DigitalLibrary4DigitalLibrary4
DigitalLibrary4
 
Cloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving itCloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving it
 
SafeDNS filtering solutions for ISPs & Telecom
SafeDNS filtering solutions for ISPs & TelecomSafeDNS filtering solutions for ISPs & Telecom
SafeDNS filtering solutions for ISPs & Telecom
 
Dubber Partner Presentation Dec 2014
Dubber Partner Presentation Dec 2014Dubber Partner Presentation Dec 2014
Dubber Partner Presentation Dec 2014
 
Create a Compliance Strategy for Office 365
Create a Compliance Strategy for Office 365Create a Compliance Strategy for Office 365
Create a Compliance Strategy for Office 365
 
Employing automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptxEmploying automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptx
 

Dernier

Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 

Dernier (20)

Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Advantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your BusinessAdvantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your Business
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 

SphereShield for Webex Teams & Meetings - Compliance and Security

  • 1. SPHERESHIELD FOR WEBEX TEAMS & MEETINGS Compliance & Security
  • 2. OVERVIEW OF AGAT SOFTWARE Skype Teams Webex Slack Zoom RingCentral PLATFORMS
  • 3.
  • 5. Control who can communicate with whom Internal communication between different groups/users/domains/Spaces Federation with external, users/ Guests Control specific collaboration options Control communication types between users Including: IM’s, file-sharing, Audio/Video/Screen-sharing ETHICAL WALL
  • 6. SAMPLE POLICIES: INTERNAL AND EXTERNAL MY COMPANY MY COMPANY Group A Group B Group C IM Audio/Video Files Allow Policy ….. Limit Policy IM Audio/Video Files ….. IM Audio/Video Files Block Policy ….. Group A Other Group Allow Policy IM Audio/Video Files ….. IM Audio/Video Files Limit Policy ….. IM Audio/Video Files Block Policy ….. IM Audio/Video Files Block Policy ….. Federated Company A Federated Company B External Policy Using Ethical Wall Internal Policy Using Ethical Wall
  • 7. PRE-VALIDATE MEETING • SphereShield validates all meetings as soon as they are scheduled before they start • The user violating the policy will be removed. • A message will be sent to organizer.
  • 8. FEATURES • Covers all MS Teams scopes: Chat, Teams & Channels and meetings • Analyze Webex meeting participants • Notifications – Popups and In-context • Auditing and reports for training and awareness • Works like a firewall – scans policies from top to bottom
  • 10. MAIN FEATURES • Inspect messages, Files (Audio, Video inspection with Compliance Recording) • Block, Mask, Notify • Complete Scope – policies apply to Spaces/Chat/Meetings • Create Granular policies based on External Traffic/ Users/Groups/Spaces. • Notifications to end-user (in context or pop-up) • Incidents are displayed in SphereShield Admin Portal along with content and users info. As well as links to eDiscovery General DLP Demonstration
  • 11. DLP INTEGRATION Sending messages and files to existing DLP vendors or SphereShield DLP engine to meet existing policies. incidents will be displayed at the vendor’s incident manager
  • 12. DLP ADDED ADVANTAGES Active DLP - Preventing sensitive data being sent to the cloud and reaching destination Taking advantage of existing DLP infrastructures, experience and policies Prevent sensitive data from being sent to external users Scan data shared with external / guest users Audio & Video Data Loss Prevention (Available with Recording AI Compliance Analysis) Inspect Files for Custom Rules
  • 15. MAIN CAPABILITIES • Enforce Recordings based on flexible policies • Transcript of all users meeting audio • Converts speech to text in 70+ languages with automatic language detection • Speaker enumeration: which speaker spoke which words and when. • Meeting eDiscovery - make meeting searchable by many parameters • Automatically Inspect meeting content by DLP and Ethical Wall policies • Audio DLP via Audio transcript – Realtime! • Video DLP via On screen OCR from video and screen/document sharing • Links to eDiscovery • On prem storage of Audio/Video Recordings • Integrated with Leading DLP Vendors
  • 17. eDISCOVERY • Advanced search by text, user, dates and more • Integrate with existing eDiscovery systems • Search for personal information and export user data • See message context in incidents • Support files and Messages (Audio&Video Available with Recording AI Compliance Analysis) • Archive data on cloud or on site • Meet GDPR and compliance requirements
  • 19. GEO FENCING • Set Geo Fencing rules based on groups, domains or users. • Allow, block or monitor access from specific countries.
  • 20. USER ENTITY BEHAVIOR ANALYTICS- UEBA • Profile Teams usage (messages, files, hours, devices, IP etc) • Detect anomaly • Create and handle security events • Examples: o Location change / Impossible traveler o Large data consumptions
  • 21. ADDITIONAL SECURITY SOLUTIONS • Threat protection – Anti Virus/Malware/Phishing • Conditional Access – ensure that users can only log on from a managed device – e.g Blackberry, MaaS 360, Airwatch, Citrix
  • 23. GOVERNANCE • Control who can create a space • Space Live cycle management – for how log data should be kept • Auto archive inactive spaces • List of Spaces and Members
  • 24. WORKPLACE ANALYTICS • List of active and non active spaces • How many users in each space and if they are external users • Automatic messages to encourage users to use the product • User behavior trends and change notification • Trends in spaces popularity by messages and users • Identify Space champions • Reports by Active Directory groups
  • 25. SERVICE OFFERING SaaS - online service Customers don’t need to install anything. Each customer will have dedicated servers A customer installation solution Customers install SphereShield in their DMZ or Cloud (e.g. Azure, AWS) A Free Trial is available
  • 26. MORE INFO Visit our website Contact us +972-525209860 https://AGATSoftware.com sales@agatsoftware.com