The application provides unprecedented awareness of the users’ activities as well as changes that occur in the organization’s IT infrastructure in order to improve the detection of foreign and inner threats.
The application’s work is based on the monitoring of changes in the Active Directory, File Systems and Exchange. The application performs continuous monitoring of all activities and changes in the corporate network being installed only at the servers. If any event able to disturb directly or indirectly customized rights and settings occurs, the application logs an unauthorized event with a possibility to block it immediately in order to prevent the confidential data leakage.
In comparison with other systems, developed application provides continuous complex data protection in the real time mode with effective detection and logging of the users who try to get unauthorized access to the data.
SCOPE OF WORK
Analysis, research and consulting on one or all of the following aspects:
Technical architecture design
User interface design
Implement Unit Tests
Required specific hardware installation and configuration
Required specific software installation and configuration
Conference call with CLIENT personnel
Conference call with an application end users
Knowledge transfer and training
TOOLS & TECHNOLOGIES
.NET 3.5, C#, C++, Silverlight 3, Web Services, MS SQL 2005, MS IIS, MSVS 2008, SVN, Seapine TestTrack Pro, TestLog, SVN, Mantis BTS.
Management and tracking tools:
– daily status call;
– daily status report;
– weekly updated project plan and budget;
– weekly status call;
– weekly status report;
– web access to Bug Tracking System;
Engagement model: Project implementation on Time and material base.
Development methodologies: Modified Waterfall.
9 person project for 5+ years, December 2011 till now
IT security service provider, USA.