The question of information security is crucial for any organization, as the value of any business is in its data: financial information, information on company products, customer information (including confidential data), etc.
We offer our analytical tools for tracing suspect activity in corporate mail, social networks and other means of communication. Peculiar features of our tools are:
Tracing of analytical relations prevents unintended information leak.
Our semantic tools can be effectively used for identification of global threats. The system scans the information channels (including emails, messengers, etc.), analyzes the extracted information and warns the user about detected threats:
Read more about our products that can be used for information security:
Named Entity Recognition and Relation Extraction
Extraction of names and relations
Use of name recognition and relation extraction to identify threats and to prevent information leaks.
The automatic system scans the information channels (including emails, messengers, social networks, etc.) and warns the user in case of security triggers
Our tools can extract various types of entities and relations between them.Read More >
Threat and Leak Detection
Analytical tools for for detection of possible threats based on semantic technologies.
With the help of our semantic tools one can create a system tracing the appearance of certain documents on the internet/intranet.
Tracing of analytical relations prevents unintended information leaks.Read More >