South African technology company launches innovative human intelligence product – Recall Covert Ops

3375

iSolv Technologies developed the solution to help with the generation and safekeeping of valuable intelligence products.

Managing security breaches and information leaks within any big organisation that deals with sensitive information is tricky at the best of times.

But what happens when your organisation’s worst case scenario comes true and you awake to find highly sensitive information has been leaked, like in the case of the NSA and the Edward Snowden leaks?

And how does an organisation begin to deal with the after-effects of such a leak?

Or, in the case of banks, insurance companies or revenue services that have fraud and investigations units dealing with top secret information: how secure is your case management from possible leaks or interception?

For example, the Guardian (http://www.theguardian.com/world/2014/apr/11/cia-white-house-pressure-leaked-senate-report) newspaper recently reported that the CIA and the White House are currently feeling the heat after a Senate torture report was leaked.

The Guardian reported that the leak “of the major findings of a landmark Senate inquiry into the CIA’s post-9/11 torture of terrorism detainees” led to intensified pressure on the White House and the CIA “to release the inquiry speedily and with a minimum of redactions”.

The US government can probably survive such a leak, but can your business weather the storm in the same way that a superpower like the US government can?

If leaks can happen at US government level, other organisations worldwide need to start looking at how safely their sensitive information is stored, and more importantly, ensure that top investigations are properly secured from moles and double agents.

These are just some of the questions that were being pondered by innovative South African ICT security specialist, iSolv Technologies, when it developed its Recall Monitoring Centre (RMC).

iSolv Technologies is a privately-owned industry leader specialising in the development and production of state-of-the-art communications protection and monitoring solutions. It has been in the industry for over a decade.

RMC includes a range of products to help with processing, storing, analysing and monitoring the distribution and use of sensitive information.

One of RMC’s key products is called Covert Ops.

Covert Ops was developed to help answer some of the questions posed, because it employs human intelligence (HUMINT) collection and field operations trade-craft to help with the generation and safekeeping of valuable intelligence products.

Jayesh Nana, CEO of iSolv Technologies, says: “Although the collection of intelligence through the use of technical collection methods (such as communication monitoring and covert surveillance) has evolved greatly in recent years in terms of sophistication and effectiveness, security agencies have also recognised the importance and new-found relevance of human collection methods to deal with asymmetric threats that have evolved to evade technical collection. iSolv has identified a need for modernising old school spycraft to take advantage of the benefits afforded by the current state-of-the-art information, monitoring and surveillance technology. Covert Ops brings this important collection method into the digital age.”

Covert Ops is the best tool to use during sensitive investigations that require analytics as well as complex case management.

The product provides comprehensive security encryption and access mechanisms to classified investigative information, which helps to prevent the leakage of highly sensitive classified information and helps to identify moles and other potential insider threats within the organisation.

Covert Ops also helps to secure all operational communication with military grade encryption.

The need to have fine-grained control over data classification and user privileges as well as comprehensive audit trails over access and changes in classification and privilege levels is a fundamental requirement for securing sensitive information. The cryptography-based security mechanisms provided in Covert Ops have been designed to address the unique and stringent requirements of this environment and go far beyond the sophistication of those mechanisms used to secure corporate information and Internet transactions today. In particular, the manner in which encryption is employed within Covert Ops safeguards against interception and analysis by the most well-funded and resourced government and defence agencies today.

Recently, the company entered into a five-year deal with Microsoft to help the company soar to even greater heights.

Covert Ops is also ideal for use by the fraud and investigations units of governments, judiciaries and parastatals; banks, insurance companies and revenue services; as well as law enforcement agencies and defence units.

For peace of mind and to hear about other products in the RMC, please contact iSolv Technologies today.

Editorial contacts:

Sales
(+27) 11 880 6103
[email protected]