BLACKbox LITE As Service on Rental

For Indian Enterprises aiming for Business Continuity against Data Loss through deletion, ransomware or disaster


BLACKbox 3D As Service on Rental

For Indian Enterprises aiming for Business Continuity against Data Loss through deletion, ransomware or disaster & Data Theft through USB, Email or Internet


Indian enterprises adopt information technology to achieve operational efficiencies. They generate digital assets by use of Software. These digital assets are in the form of Designs, Drawings, Documents, Spreadsheets, MIS Reports, Tender Bids, Cost Sheets, ERP Data, CRM Data and many more. These digital assets are scattered on different devices like File Server, NAS, Computers and Laptops. This scattered-ness of data makes backup very difficult and complex and data loss chances are very high. Loss of any of these digital assets will affect Business Continuity of enterprise.

Overview

Synersoft, the maker of path breaking and disruptive technology for Indian Enterprises, branded as BLACKbox, is incubated and invested portfolio company of CIIE - IIM-Ahmedabad (Center for Innovation, Incubation and Entrepreneurship at Indian Institute of Management - Ahmedabad) would like to submit this proposal as per your requirement for data preservation and information security solution.

This solution is available on OPEX model with monthly rental and security deposit for 48 months agreement and 12 months lock-in period. It includes supply of hardware, antivirus, data center disaster response systems, onsite monthly audits, call center support and managed report analysis.

The Objective


To ensure that Enterprise never loses on business continuity due to data loss
To ensure that Enterprise is never exploited competitively due to data leakage

Features of BlackBox


Forced Centralization and Active Recycle Bin
  • No Data is scattered on Desktops, Laptops, Servers
  • Deleted Data can be instantly restored by Active Recycle Bin
  • Users are not left with choice of where to save data

Innovative Folder Structure, De-Duplication Report, File Log Report
  • Users have to work on specified network locations / Folders
  • Duplicate File Report can be generated
  • Who deleted what, can be instantly retrieved

Vault and Workspace
  • Store frozen (old) data in Vault where data can be only accessed by authorized users, but cannot be deleted or modified
  • Manually or Automatically move data to Vault periodically
  • Avoid risk of deletion, infection or modifications in frozen (old) data

Automatic Backup of Forcefully Centralized Data on Data Center or Media for Business Continuity
  • All data which is forcefully centralized on BLACKbox, is backed up on desired media or data center.
  • By pushing data on data center, BLACKbox provides for business continuity post-disaster situation.

Automatic Backup of Forcefully Centralized Data on Data Center or Media for Business Continuity
  • All data which is forcefully centralized on BLACKbox, is backed up on desired media or data center.
  • By pushing data on data center, BLACKbox provides for business continuity post-disaster situation.

Time Machine of Data Backup to minimize impact of Ransomware or Data Manipulation for Business Continuity
  • BLACKbox maintains number of versions for the backup on media as well as on data center.
  • In case of Ransomware, enterprise can always restore data from previous version on BLACKbox, or media or data center.

Domain Policies for Information Security
  • BLACKbox enforces specific enterprise policies on users, so that they cannot manage LAN, cannot install new software or change crucial system.
  • Users are provided with application rights relevant to their job profile and can compute only to the extent admin has allowed.

Email Server with Innovative Email Shadowing for Business Continuity
  • BLACKbox acts as full fledged mail server with innovative email shadowing technology.
  • BLACKbox acts as a full fledged mail server which shadows every email coming in or going out from itself, that too user wise and date wise. So, if user finds corrupt pst or such file, admin can restore all in-out mails in minutes.

Email server with Innovative Vigilance for Information Security
  • BLACKbox acts as full fledged mail server which provides vigilance controls on email communication.
  • You can define email users policy on where he / she can or cannot send email, what he / she can or cannot send emails to suit your information security requirements.

Email server with Innovative Vigilance for Information Security
  • BCC (Blind Carbon Copy) is an easy way to leak data from enterprise.
  • BLACKbox intercepts BCC, allows or disallows as per policy and submits report to designated users with content of email and recipients in BCC.

Innovative Dual Password System in Email Server for Information Security
  • BLACKbox uses innovative dual password technology to prevent email identity theft induced frauds.

Innovative USB drive policies with report generation for Information Security
  • BLACKbox makes all USB ports of connected computers, “smart”. Enterprise can define policy on USB usage for keyboard, mouse, printer and deny usage of USB by pen drives, hard drives, mobile phones on USB.
  • It can also define policy that data can be brought in the enterprise network over USB, but cannot be taken out on USB. It can also define policy where entrusted users can take data out on USB, but report is generated and sent to designated users for evidence purpose.

Innovative Screen Capture and Play Back for Fraud Investigation
  • BLACKbox can capture screens of every computers and store it for months for play back in future.
  • In case enterprise suspects any fraud on a specific computer, and wants to play back what happened weeks or months ago, it can do it. This empowers enterprise with capability to investigate any frauds.

Innovative Happy Hours in Firewall for Information Security
  • BLACkbox acts as a firewall for network and controlling internet usage for users.
  • It also works on the concept of happy hours, which gives full access of internet to users during happy hours, but at the same time, isolates enterprise data so it cannot be infiltrated out on internet.

Innovative Hybrid Cloud Technology for Laptops and Branch Offices, Mobile Phones and Tablets
  • Most of the policies can be enforced on laptops and branch office computers, Mobiles and Tablets which are not connected with BLACKbox.
  • However, Most of above features can be implemented on Laptops and Branch Computers through agent (client side), server (Blackbox on cloud).