Title: Vericept Corporation
1Vericept Corporation
Snowmass (7.1) Slides Two Options 2 slide
overview or 5 slides more in-depth
Vericept Corporation 800.262.0274
www.vericept.com
2 3Vericepts Unique Approach Intelligent Content
Monitoring, Analysis and Reporting
- Passively monitors the content of ALL Internet
traffic - Includes web, web-based email, email, chat,
instant messaging, peer-to-peer file sharing,
Telnet, FTP, postings and more... - Intelligently analyzes and identifies ONLY the
pertinent content at risk - Provides detailed content capture, proof
positive evidence - Identity Match ties inappropriate activity and
content to the user - Pinpointing information unique to you
- 58 pre-defined Categories of risk
- Category Builder and Custom Search Parameters
- Provides summarized and detailed management
reports - Ability to perform same intelligent analysis on
stored data
4Vericepts Unique Approach Managing the
Enterprise Environment
- Define who, what and when you want to monitor
- Make exceptions to monitoring rules
- Set event priorities to know when this is a Red
Hot issue - Automatically route and assign events
- Investigation management with data mining, case
files, proof positive events and annotation
ability - Auditing functionality with audit trails, event
history and reporting - Built-in mechanism for handling violations with
event reassignment - Set priority and receive a hot link to event
- Centralized administration and LDAP support
5 6Vericepts Unique Approach Intelligent Content
Monitoring, Analysis and Reporting
- Passively monitors the content of ALL Internet
traffic - Includes web, web-based email, email, chat,
instant messaging, peer-to-peer file sharing,
Telnet, FTP, postings and more... - Intelligently analyzes and identifies ONLY the
pertinent content at risk - Provides detailed content capture, proof
positive evidence - Identity Match ties inappropriate activity and
content to the user - Pinpointing information unique to you
- 58 pre-defined Categories of risk
- Category Builder and Custom Search Parameters
- Provides summarized and detailed management
reports - Ability to perform same intelligent analysis on
stored data
7Vericepts Unique Approach Managing the
Enterprise Environment
- Enterprise Monitoring
- Define who, what and when you want to monitor
- Set a category to turn on or off during certain
hours - Make exceptions to monitoring rules
- CFO will not be monitored for MA communication
- Sales Department will not be monitored for going
to expedia.com - Make new categories on a moments notice, i.e.
new MA potential - Set event priorities to know when this is a Red
Hot issue - Automatically route to Category Manager
- Everyone views ONLY what they are interested in
- HR sees sexual harassment issues / CSO views
compliance violations - Create search templates for quick searches
8Vericepts Unique Approach Managing the
Enterprise Environment
- Investigation Management
- Dig deep into potential violations with advanced
data mining - Freeform Boolean searches to search on ALL
captured data - Make annotations to an event without tampering
with evidence - Create Case Files to track questionable events
- Assign events to other users with hot links and
priority settings - Know who has access to information and system at
all times
9Vericepts Unique Approach Managing the
Enterprise Environment
- Auditing Functionality
- Provide an audit trail event history
- Know who had access to an event(s) under
investigation - Know if any system changes have happened or been
attempted - Create any kind of search instantly for managers,
auditors or counsel - Save searches for reuse during quarterly and
annual audits
10Vericepts Unique Approach Managing the
Enterprise Environment
- Simplified Administration
- Centralized System Management updates,
maintenance, etc. - LDAP Interface
- Auto-populate User IDs and group definitions
- Real-time sync between Active Directory and
Vericept System - Centralized Policy Management