Information Security. Monitoring threats of corporate information leakage

• Monitoring of network packets within the enterprise
• Monitoring and control of digital data for the workplace
• Control of personal pages of employees in social networks for the detection of potentially dangerous access to the process, causing reputational damage to the enterprise