Steganography
Analyzer Real-Time Scanner
Detect
steganography artifacts and signatures in real-time over a
network!
Sensitive
data leakage is of utmost concern to corporate management.
Data Loss Prevention (DLP) solution providers offer products
with a wide range of functionality and capability. However,
none of these products detect insider use of steganography.
StegAlyzerRTS
is the world�s first commercially available network
security appliance capable of detecting digital
steganography applications and the use of those applications
in real-time. StegAlyzerRTS offers a �drop-in, turn-key�
capability that will not affect network throughput.
StegAlyzerRTS
detects insiders downloading steganography applications by
comparing the file fingerprints, or hash values, to a
database of known file, or artifact, hash values associated
with over 1050 steganography applications.
StegAlyzerRTS
also detects insider use of steganography applications by
scanning files entering and leaving the network for known
signatures of over 55 steganography applications.
StegAlyzerRTS detects insider theft of sensitive information
hidden inside other seemingly innocuous files which are sent
to an external recipient as an e-mail attachment or posted
on a publicly accessible web site.
Product
highlights in StegAlyzerRTS:
Detect
fingerprints of over 1050 steganography applications
Detect
signatures of over 55 steganography applications
Exclusive
Automated Extraction Algorithm functionality for selected
steganography applications gives examiners a
�point-click-and-extract� interface to easily extract
hidden information from suspect files
Send
real-time alerts to network security administrators
Retain
copies of suspect files for further analysis
Does
not impact network performance
Available
in 100 Mbps and 1 Gbps aggregated throughput models
BENEFITS
Detect
leakage of sensitive information and intellectual property
outside the enterprise network through insider use of
steganography
Detect
insider use of steganography to conceal evidence of criminal
activity
Real-time
detection of files associated with over 1050steganography
applications
Real-time
detection of signatures of over 55 steganography
applications
Real-time
alerts to network security administrators
Enforce
organizational policy prohibiting insiders from having or
using steganography or other data-hiding applications on the
enterprise network
|