Infraskope Agent Onur Diker June 20, 2022
Our Technological Products

Infraskope Agent - End User Control and Security

To be safe, you need to know what the danger is. Without knowledge of a threat, you cannot take precautions. Infrascope is a product developed based on this principle. In a nutshell, Infrascope Agent is like someone turning on a light when you’re trying to find your way in the dark.
Infraskope Agent

The human factor is the weakest link in security. All attack vectors rely on human error. Social engineering, a desire for revenge, espionage, a poorly written code snippet… they all target human weaknesses.

When developing our product, we approached it with the mindset of “If I were malicious…”. We asked ourselves questions such as, “How could I steal information from this system?”, “How could I cause harm to this system?”, and “Which areas are not protected by the system administrator?” We shaped our product based on the lessons we learned from incidents that occurred in our country and among our customers.

infraskope-agent-grafik2
Security Starts with Awareness™
To be safe, you need to know what the danger is. Without knowledge of a threat, you cannot take precautions. Infrascope is a product developed based on this principle. In a nutshell, Infrascope Agent is like someone turning on a light when you’re trying to find your way in the dark. If the internet can be used as a weapon, it needs to be monitored in some way. Infrascope acts like a security camera that monitors all systems within your organization. It doesn’t intervene in events, but it ensures that they are recorded centrally. Important events are processed on the server side, and real-time alert messages are sent to the relevant individuals.
What does Infrascope record?

Infrascope can record all events reported by servers containing your company information, network devices, user computers, and applications running on these systems. For example, the installation of an unlicensed application on a company computer or a user logging in can be recorded. But if that were enough, events like those that occurred at NSA, Sony, and WikiLeaks would not have happened. Just think for a moment; 1.8 million classified documents were leaked from an organization like the NSA, and no one knew about it! Don’t you think something was done wrong?

“We don’t want to record our users.”
This is where the mistake lies! Monitoring servers, air conditioners, and network devices in the server room enables you to take preventive measures against operational problems. Once the user’s computer is taken out of the information system room, there is nothing you can do. Organizations that make this mistake will eventually share the same fate as organizations like the NSA.

Recording Users
Monitoring the server room and devices inside it alone is not sufficient. Users also need to be monitored. Infraskope records user computers with its micro agent architecture. Infraskope not only records events reported by the operating system, but also monitors critical data exit points to detect possible information leak attempts. For example:

  • Files copied to a user’s USB drive
  • Screenshots of important information
  • Unauthorized activities performed by a system administrator in the database
  • Users attempting to bypass corporate security policies by connecting their phones to the computer
  • System administrators accessing computers they should not have access to (e.g. HR, R&D, executives)
  • Files stored in cloud-based systems
  • Hacking of your computer using tools like KonBoot, ERDCommander or other password crackers.

Infraskope offers many unique features that set it apart from other products, including the ability to detect the threats listed above and much more. In addition, Infraskope offers a wide range of other features to its users.