StopPhoto – immediately traces an attempt of taking picture of a computer screen with the smartphone camera.

After detecting a violation, the software will prohibit the execution of the risk action.

StopPhoto will send a notification to the manager about a potentially dangerous event.

Taking a picture of a laptop screen with a smartphone camera is a common technique of stealing valuable data.

According to statistics, about 50% of leaks happened with the help of mobile devices. And about 10-15% of the information, published for sale in the dark web, is presented as a photo of a computer screen. Such approach helps insiders to be below the radar level and stay invisible to the standard security systems.

StopPhoto will stop intruders

Technology

StopPhoto – technology, based on artificial intelligence.

AI has already learned to identify objects such as “phone” or “tablet”. And gradually learns to recognize other objects: a “bottle”, “cup” etc.

In the nearest future, AI will learn to identify dangerous objects, such as weapons. So the software will be able to prevent a wide range of emergencies: workplace alcohol and drug addiction, mass shooting, etc.

StopPhoto for Business:

  • IT, Consulting agencies

    Powerful protection of valuable commercial assets

  • Financial Institutions:

    Protection of private third-person data from insider actions

  • HR:

    Corporate ethics compliance monitoring.

  • Development, Engineering:

    Industrial espionage and theft of new technologies prevention

  • For TOP-manager and legal department:

    StopPhoto will not only protect the company’s assets but also helps to collect evidence in case of litigation

Case study: data loss prevention

You get an alert that someone is taking pictures of the computer screen on their smartphone in the Boston branch

You call Sophia’s manager and find out that today is her last day at your company

Corporate data is the new black gold

Companies that are capable of extracting and managing staff-generated data will achieve greater sustainability and will be able to survive any crisis

1
2
3
4
5
6
7
8
1

Cam capture with AI face recognition

2

Screenshots recording

3

Remote monitoring

4

Clipboard monitoring

5

Active DLP

6

Email, Messengers and Websites monitoring

7

Input text recording with author recognition

8

Monitoring of USB flashdrives and printing

Insider investigations

Mirobase provides essential tools for insider investigations and data leak prevention such as realtime monitoring, security alerts, activity monitoring and behaviour deviations

Case study: insider threat revealing

Web-Activities

Mike

Amanda

Sophia

Solomon

Ray

Time

75%
12%
14%
20%
8%

Deviation

291%
47%
54%
78%
31%

You get a weekly behaviour report on your Email and find a deviation by one sales manager in the NYC branch

Risk analytics report

Mirobase provides essential tools for insider investigations and data leak prevention such as realtime monitoring, security alerts, activity monitoring and behaviour deviations

Website type

Social network

Entertainment

Job search

File sharing

Illegal activities

Time

10:15:36

6:23:24

13:13:48

00:07:12

00:00:00

Websites

Facebook.com
Reddit.com
Jobs.com, Indeed.com
Transferwise.com
-

Performance management

Mirobase provides essential reports for performance management. Define the best practices of top employers and spread them to everyone in your organisation

Case study: Individual Behaviour Report

Activities

SalesForce

Chrome

Email

Skype

Idle

Time

15%
5%
25%
33%
12%

Details

951 contacts

157 visited websites

341 outbound / 93 inbound

45 contacts / 71 calls / 921 messages

Meet Miya. She is the best performing worker it the L.A. sales unit with 12 sales in the last week

Insider investigation support

Ready-made patterns for recognising and preventing data leakage for data regulated by laws.

Our information security experts assist our clients in investigating insider threats