Intelligent ID is a unique Endpoint Monitoring and Protection (EMaP) solution that protects your organization's most valuable assets by continuously monitoring, analyzing, and alerting you when incidents occur. Because Intelligent ID resides on the endpoint, we can identify and often stop incidents as they occur rather than detecting the event after the damage has been done.
Intelligent ID's customizable suite of tools can help stop data loss at the source, identify and control insecure workflow practices, and protect your organization's resources and IP from misuse. Additionally, our robust investigation tools correlate events organization-wide to create a clear timeline and root cause of the event from all angles.
The Intelligent ID Difference
Intelligent ID's innovative approach to endpoint monitoring and protection truly sets us in a class of our own. Here's a sample of what sets us apart:
One Agent Does It All
All of Intelligent ID’s functionality, even our email monitoring, web usage statistics, and network connection monitoring, are accomplished with our small, low-impact agent. Unlike our competition, there are no network software installations or appliances required, regardless of which features you decide to employ – only our endpoint agent and the web administrator console. This not only means a quick and simple deployment, but also a dramatic cost savings to your organization.
A True 360 View
At Intelligent ID, we know that if you don’t have all the information, you cannot truly understand the problem or the solution. That’s why Intelligent ID is the only endpoint-only framework to correlate real time data from our powerful DLP tools, data crawler, identity activity monitoring, infrastructure monitoring, and application/web usage statistics. Rather than gathering data from three or four tools, your organization can get a full 360 view, plus investigation tools and instant alerts all in one location, already correlated.
Designed and Purpose-Built In-House
Intelligent ID was designed entirely in-house and built from the ground-up as a continuous endpoint monitoring tool. It is not a network tool that we tried to refit for endpoint. It is not an anti-virus tool that we patched DLP features into. We also do not require feeds from network appliances to function. We were simply designed to work seamlessly on endpoints, providing detailed rich event information straight from the source.
We're Looking Out For Privacy
Every rule and feature of the Intelligent ID system has been built with highly customizable options that allow for any exclusions necessary to protect the privacy of an organization and its employees. Intelligent ID will collect only that data that your organization requests and will display that data to only approved personnel, so no one has to worry about exposure of personal data or sensitive alerts ending up as public knowledge.
SaaS, Scalability, Functionality
Intelligent ID’s flexible framework, deployment, and pricing options mean that we have a solution to fit your organization whether you have 5 users or 500,000. With our optional secure SaaS model, Intelligent ID can provide full 360 data to your organization with minimal impact on infrastructure and a quick deployment.
According to recent research, even though most cyber-incidents tend to be external attacks, organizations should not underestimate the likelihood of a malicious insider stealing sensitive information or sabotaging internal systems. In fact, of all forms of cyber attack, insider attacks are capable of causing the most damage. These attacks can be the most devastating, due to the amount of damage a privileged user can do, the data they can access and the institutional knowledge they may have to escape detection. According to a study funded by the U.S. Department of Homeland Security, the CERT Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute and the U.S. Secret Service, insider threats are capable of going undetected for an average of 32 months.
Nearly 200 million records have been compromised in the first quarter of 2014, a rise of 233% from last year. Of these compromised records, more than 52% were attributed to a malicious insider, and another 25% of the total incidents were due to accidental loss or exposure by an employee.
It is safe to say that while more total threats originate from outside of the organization, the threats, whether intentional or not, that are the most dangerous to an organization often originate from within.
To support clients in accounting for this vulnerability, Convergence is proud to offer clients Intelligent ID (IID). IID is a unique security offering, in that it is an Endpoint Monitoring and Protection (EMaP) solution that protects your organization's most valuable assets by continuously monitoring, analyzing, and alerting you when circumstances suggest that there is something abnormal occurring, or that an incident is pending. Intelligent ID resides on the endpoint, and this position allows security personnel to identify and often stop incidents as they occur rather than detecting the event after the damage has already been done.
Intelligent ID's customizable suite of tools can help stop data loss at the source, identify and control insecure workflow practices, and protect your organization's resources and IP from misuse. Additionally, the program's robust investigation tools correlate events organization-wide to create a clear timeline and root cause of the event from all angles. The technology has produced evidence that has been used in numerous investigations and criminal trials. And when the incident is a result of an error or accidental exposure, IID allows security personnel to engage to provide enhanced supervision and to offer retraining to staff members who need additional education.
Along with End Point Monitoring for the purposes of avoiding a security threat, Intelligent ID's Productivity Analysis tools provide a detailed view of endpoint usage. Intelligent ID provides application and web usage statistics broken down into 10 subcategories of usage including active vs. idle time, but also including statistics such as focused time, minimized time, and screensaver time. These statistics can be studied to determine, by user, group or department, what applications are being utilized and which may not be worth re-licensing, what individuals and teams are providing the most value in terms of productivity, and whether off-site employees are making appropriate use of their billable time and resources.
Convergence has proven expertise with designing and implementing a secure cloud computing environment with multi-layer security. Our solutions have been delivered to Intelligence agencies that require highly secured remote access/remote management access.
Secure IT Professionals
Many members of Convergence’s highly skilled team, comprised of Software, Systems and Network Engineers, Information Assurance Managers , Technology Solution Architects, Customer Relationship Managers, Project Managers and Business Development professionals, carry security clearances which allow them to engage client mission objectives.