Infopoint discovers, classifies, and controls in-house data assets in line with corporate policies by scanning them end-to-end. It increases data awareness and operationalizes data security.

Know, Manage, Protect Your Data with Infopoint

Infopoint is an integrated data discovery and classification platform that enables the detection, classification and management of sensitive data scattered and invisible on corporate systems.

It works in a wide scope from file contents to user groups; It detects illegal content, makes risky data structures visible, and makes scanning processes sustainable with automated workflows.

Content-Based Data Exploration

Regardless of the file extension, it analyzes based on content. Detects embedded, forgotten or unauthorized data contents.

Multi-Layer Classification Engine

Regex offers a flexible classification infrastructure with dictionary and expression-based rules. Supports user-defined and ready-made rule sets.

Rule-Based Policies

It transforms classifications into a complex set of rules. Advanced conditions can be defined with AND, OR, NOT, and parenthetical operators.

LDAP and User Targeting

Scan tasks can be restricted to specific users, groups, or access roles. It provides authorization-based scanning.

Scheduling and Scheduling Tasks

Scan tasks can be scheduled at specific times, periodically, or according to specific scenarios. Process automation is supported.

Infopoint Discovery Module

Infopoint’s Discovery Module performs content-based scanning of files and folders on all systems. Lost, buried, or neglected datasets are detected. This module works in a wide scope, from file contents to user groups; It detects illegal content, makes risky data structures visible, and makes scanning processes sustainable with automated workflows.

Classifier Module

Defines scan rules through regex, dictionary or key phrases. You can create your own rules or use ready-made templates.

Policy Engine

Policies that enable action to be taken according to the classification results are defined. A structure is established in accordance with corporate data management policies.

Task Planner

It is a configurable task system that determines which dataset will be scanned for which user or group, at what time interval, in which formats.

Scope and Authorization Management

Narrows or expands the scope with controls such as user-based scanning, directory exclusion, file type filtering, etc. It offers an access-controlled architecture.

Infopoint Watermark Module

Infopoint’s Screen Watermark Module deterrents users to data leaks. This module continuously places user-specific watermarks on the screen in certain applications (e.g. Word, Excel, Chrome). These watermarks can include information such as username, IP address, date and time, and can be customized (thickness, font size, color, etc.).

Process Based Application

It provides watermark display in certain applications.

AD Integration

It offers user-based application.

Screenshot Detection

If the user takes a screenshot, this action is logged and reported to the administrators.

Customizable Watermarks

The appearance of the watermarks is fully customizable.

Print Watermark

Watermarks can also be printed on files that are removed from the printer.

Process Based Application

It provides watermark display in certain applications.

AD Integration

It offers user-based application.

Screenshot Detection

If the user takes a screenshot, this action is logged and reported to the administrators.

Customizable Watermarks

The appearance of the watermarks is fully customizable.

Print Watermark

Watermarks can also be printed on files that are removed from the printer.

Infopoint File Migration Module

Infopoint’s File Migration Module enables automated action to be taken on incidents detected as a result of context-based data discovery with Forcepoint or the Infopoint Discovery Module. Detected files are either moved or deleted according to corporate policies. Migrations are carried out by directing them to remote areas determined by the institution or to user-specific disk areas. In place of the moved file, a tombstone is left on the system so that the user can understand where the file has been moved. In addition, as a result of the data discovery, the user is notified to move files that do not comply with the policies of the institution.

Discovery-Based Active Response

Move or delete actions are triggered on the files determined as a result of discovery.

Directed Transport to Destination

Data can be moved to remote servers or to user-specific disk spaces.

Tombstone Drop

The moved file is replaced by a symbolic tombstone that shows the location information.

Policy-Based Alerting and Automation

According to the policies of the institution, the user is guided with scenarios such as "You cannot keep this file on the local computer".

Infopoint File Labeling Module

Infopoint’s File Tagging Module automatically tags files downloaded through browsers based on the source URL. This structure detects files downloaded with add-ons integrated into browsers; The tagging process is carried out by the Infopoint agent. Thus, files from external sources are marked in accordance with corporate policies at the time of first contact.

URL-Based Tagging

Downloaded files are automatically tagged based on the web address from which the file came.

Plugin + Agent Integration

Browser plug-ins detect the file download, tagging is done by the Infopoint agent.

Instant and Automatic Application

Downloaded files are flagged in real-time without the need for any manual intervention.

Corporate Labeling Policies

Labels can be configured according to data sources specific to the organization (for example: externally sourced file, untrusted content, etc.).

URL-Based Tagging

Downloaded files are automatically tagged based on the web address from which the file came.

Plugin + Agent Integration

Browser plug-ins detect the file download, tagging is done by the Infopoint agent.

Instant and Automatic Application

Downloaded files are flagged in real-time without the need for any manual intervention.

Corporate Labeling Policies

Labels can be configured according to data sources specific to the organization (for example: externally sourced file, untrusted content, etc.).

Why Infopoint?

Infopoint is a system designed to ensure the security of sensitive data and to inform users. It scans and classifies sensitive data on computers and identifies risks. It is a reliable product in information security with its user-friendly interface, automatic processes and customizable structure.

Context-Aware Discovery Approach

Thanks to the scan structure that focuses on the file content, not the extension, files that contain personal data, but are stored in an unusual way, are detected. Sensitive data in folders, archives, or old backups becomes visible.

Rule Definition and Ease of Compliance

Scanning scenarios can be created with regex, dictionary and expression-based rules. It provides pre-audit visibility and control in compliance processes with regulations such as KVKK and ISO 27001.

Flexible Task Scheduling

Scanning operations can be run timer-based or manually. The file type can be customized by user, access group, and time criteria.

Authorized Scan Logic

Thanks to LDAP integration, user-based targeting can be done. It complies with the internal authorization hierarchy, only authorized areas can be included in the scope of scanning.

Reveals Unclaimed and Scattered Data

Files that are embedded, forgotten or whose owner is unknown are marked. Data security awareness is increased in non-DLP systems and provides concrete resources for data cleaning.

Why Infopoint?

Infopoint is a system designed to ensure the security of sensitive data and to inform users. It scans and classifies sensitive data on computers and identifies risks. It is a reliable product in information security with its user-friendly interface, automatic processes and customizable structure.

Context-Aware Discovery Approach

Thanks to the scan structure that focuses on the file content, not the extension, files that contain personal data, but are stored in an unusual way, are detected. Sensitive data in folders, archives, or old backups becomes visible.

Rule Definition and Ease of Compliance

Scanning scenarios can be created with regex, dictionary and expression-based rules. It provides pre-audit visibility and control in compliance processes with regulations such as KVKK and ISO 27001.

Flexible Task Scheduling

Scanning operations can be run timer-based or manually. The file type can be customized by user, access group, and time criteria.

Authorized Scan Logic

Thanks to LDAP integration, user-based targeting can be done. It complies with the internal authorization hierarchy, only authorized areas can be included in the scope of scanning.

Reveals Unclaimed and Scattered Data

Files that are embedded, forgotten or whose owner is unknown are marked. Data security awareness is increased in non-DLP systems and provides concrete resources for data cleaning.

How Do We Ensure Security?

Daha fazla bilgiye mi ihtiyacınız var?

Formu doldurun, uzman ekibimiz en kısa sürede sizinle iletişime geçsin.