By using tools to analyze how well data and the channels over which it is transmitted are secured, it is possible to obtain a comprehensive picture of dataflows within an organization’s business processes and to identify secondary ways of forwarding confidential information and prevent access by unauthorized individuals.

In order to improve efficiency, companies seek to build a business process model, which ideally will adequately reflect a clear organizational structure and provide an extensive picture of all existing processes.

The model established provides clear material for a detailed analysis of everything that is going on in the company, highlighting ‘bottlenecks’ in its activities, identifying hidden risks and costs, which have usually arisen as a result of overlap between functions and areas of responsibility, or conversely, insufficient attention being paid to important business processes.

Information Security Department

  • controlling the movement of sensitive information, internal control of data handling
  • controlling the distribution of corporate information;
  • tracking irresponsible behavior by staff working with confidential information;
  • identifying the activities of those engaged in espionage;
  • monitoring the information environment and blogosphere.

Financial Department

  • controlling the movement of financial documents and financial information about the company and its clients;
  • controlling the circulation of information about the cost of the company’s products;
  • ensuring that unauthorized staff do not have access to documents.


  • controlling access to the marketing department’s strategically important documents and plans;
  • managing the company’s reputation, identifying sources of «dark PR», negative reviews, etc.;
  • monitoring public response to the company’s innovations;
  • monitoring online media, developing products which take into account client opinions.

Sales Department

  • controlling the circulation of specific information (client databases, terms of business);
  • improving communications with clients to maintain loyalty;
  • supporting direct communication with customers over the Internet, real-time reaction to reviews and inquiries;
  • tracking the quality of contacts between call center staff and clients, as well as any instances of transmitting confidential information via any means of communication.


  • controlling the distribution of research and development information;
  • limiting access to production secrets;
  • safeguarding of intellectual property.

Senior Management

  • identifying ineffective and duplicate business processes;
  • monitoring tender processes;
  • identifying personal business activity by staff;
  • monitoring the collective mood;
  • protecting valuable and secret information, the loss of which could cause financial and reputational damage to the company.

HR Department

  • early identification of disloyal staff;
  • protection of employee personal data;
  • monitoring the collective mood and attitudes toward new policies;
  • analyzing the use of corporate resources for personal purposes.

IT Department

  • controlling the distribution of access credentials (logins, passwords) for the company’s information resources;
  • identifying inappropriate use of the company’s resources.