Remote Safely Security Solution for Remote Teams
Remote Safely
Solution Overview
Show more
Customer problem
As companies have adapted to digital transformation and the pandemic’s systemic disruptions, more businesses than ever are managing remote workers. This move from secure, corporate facilities to home environments adds the residual risk of sensitive data being accessed or viewed by the wrong people.
A stranger may get physical access to corporate information when the workstation is left unlocked or simply steal sensitive data via shoulder surfing and photographing the screen. In offices, such risks are mitigated by traditional security controls (e.g., CCTV, door locks, etc.); however, the nature of remote workspaces makes visual hacking a real threat that should not be underestimated. Therefore, since companies have shifted to remote work, there is a demand for solutions that provide a replacement for traditional security controls to mitigate security risks associated with physical security in remote workplaces.
EPAM Solution
Remote Safely is a set of security controls that include an application installed on a remote employee’s laptop and a complex AI infrastructure providing real-time user verification and detecting potentially malicious events.
Remote Safely verifies the identity of the person located in the camera view area and detects suspicious behavior that may cause data leakage. It takes photos of the camera view area and passes them to the Security Operational Server.
The AI processes the images to verify the user and screen for anomalous behavior. If there is any misconduct detected on the image, the alert appears on SOC Web Panel. Members of the SOC Monitoring Team analyze the employee’s images to detect any suspicious behavior and provide a measure to resolve potential security incidents.
Key Differentiators
AI based Security Controls to prevent data leakage
Security controls combining multiple protection such as AI-based risks detection, monitoring team and virtual desktops
24/7 Monitoring Team to resolve incidents
SOC’s team real time monitoring of security incidents adds the additional protection layer preventing data breach
Enhanced physical security controls for remote teams
Uniquely designed wide-angle camera extends the visibility area and allows to detect more potential threats
Benefits
Seamless User Identity Verification
1:1 biometric verification to ensure only authorized people can access the data.
Detect & Alert Suspicious Behavior
Get alerted if there are suspicious events detected in the camera view area.
SOC Team 24/7 Monitoring
SOC team resolves the security incidents to minimize risks of data leakage.
Custom Automatisation to Prevent Data Leakage
Setup rules for automated response in case of suspicious events.
Control Access To Corporate Infrastructure
Improve access control to corporate data via customizable posture checks.
Features
- Remote employee identity verification via face biometrics and deep learning algorithms.
- Monitoring of the remote employee’s workplace over the camera and alerting when suspicious events are detected. Examples of such events are ‘No person found’, ‘Unknown Person’, ‘Multiple Persons’, ‘Phone is detected’, and ‘Spoofing is detected’.
- SOC Web Panel for real-time digital monitoring of suspicious events and mitigating security risks when necessary.
- Real-time notifications via email.
- Customized rules for automatic execution of actions as responses to security events.
- Block attempts at screen sharing and taking screenshots, project data to unauthorized monitors, and connecting to the desktop via RDP (can be enabled/disabled by configuration).
- Control access to the corporate environment based on the state of digital monitoring.
- Optional extra physical security hardening via privacy screens and a custom wide-angle camera.
- Compliant with the strongest data protection regulations. Minimum impact to employees’ privacy.
- Can be delivered as an EPAM-managed cloud-based solution or deployed on the customer’s infrastructure.
Awards
ISO 27701 (PIMPS)
ISO 27701 was developed to provide a standard for data privacy controls, which, when coupled with an ISMS, allows an organisation to demonstrate effective privacy data management. ISO 27701 establishes the parameters for a PIMS in terms of privacy protection and processing personally identifiable information (PII).SOC 2 (ISAE 3000) Type II
SOC 2 is developed by the AICPA (American Institute of CPA’s) and defines criteria for the management of user organizations’ data based on the Trust Service Criteria – The Trust Service Criteria relate to security, availability, processing integrity, confidentiality and privacy related controls. A SOC 2 report ensures that a service organization keeps data private and secure while processing or in storage, that data is accessible at any time and that specific controls are implemented relating to confidentiality and privacy of information.System and Organization Controls (SOC 3)
A System and Organization Controls 3 (SOC 3) report outlines information related to a service organization's internal controls for security, availability, processing integrity, confidentiality, and privacy. SOC 3 reports assure clients that an organization's controls and processes pertaining to the protection of sensitive customer data are up to industry standards.IOActive Security Assessment
EPAM engaged IOActive to assess the security threats and risks associated with its Remote Safely mobile and web applications and associated API. EPAM remediated all of the reported vulnerabilities during the engagement, and IOActive confirmed they were properly fixed.Questions & Answers
Have a question? We are ready to help you.
type
license type
industries
categories
Integrates with
Global Protect VPN
Splunk
Princeton Identity
Version
Updated on February 17, 2023
Get solution in 3 simple steps
We can help you achieve more! Choose the solution that supports your growth and success.
01
Reach Out to Us
Request the solution by submitting a short form
02
Sit Back & Relax
Our experts swiftly process your request and get back to you
03
Start Using The Solution
Dive in and unlock all the benefits