FalconGaze LLC
Moscow, Nizhnyaya Krasnoselskaya str., 35, p. 9, office 302, 105066
Telefon: +7 (490) 116-30-00
Working hours: weekdays from 9:00 to 18:00 General questions: contact@falcongaze.ru Sales Department: sales@falcongaze.ru Technical support: support@falcongaze.ru Partnership issues: partner@falcongaze.ru MEDIA: pr@falcongaze.ru https://falcongaze.com/en/
Falcongaze
+375 (17) 311-10-14
+375 (17) 311-10-14
Try for free
  • About DLP-system
    • What is the SecureTower DLP system?
    • Tasks performed by SecureTower

      • Protection against data leaks caused by employees Control of employees' work on computers Analysis of employee computer behavior (UBA) Identification of potentially dangerous employees (risk analysis)
    • Control of all communication channels
    • Benefits from SecureTower for business
    • FAQ
    • Hardware requirements
  • Company
    • About us Contact us Our clients Partners Become a partner
  • Publication
  • Support
    • Updates
    • Tech support
Try for free
+375 (17) 311-10-14
  • About DLP-system
    • What is the SecureTower DLP system?
    • Tasks performed by SecureTower
      • Protection against data leaks caused by employees Control of employees' work on computers Analysis of employee computer behavior (UBA) Identification of potentially dangerous employees (risk analysis)
    • Control of all communication channels
    • Benefits from SecureTower for business
    • FAQ
    • Hardware requirements
  • Company
    • About us Contact us Our clients Partners Become a partner
  • Publication
  • Support
    • Updates
    • Tech support
    • News
    • Articles
    • Research
    • DLP-systems
    • Main Up
    • Publications
    • Articles
    Fundamentals of information security. What is information security
    Articles
    Fundamentals of information security. What is information security
    Specialists of Falcongaze analytical centre prepared an article that explains the basics of information security. It will be useful to those who wish to begin to get to know about information security

    Редакция Falcongaze

    Авторы материала

    The Best Software and Data Security Tools in 2022
    Articles
    The Best Software and Data Security Tools in 2022
    Preventing software attacks requires additional testing efforts not just at the end of development. For those who develop software themselves, the software should be tested early and often. This can reduce delays and additional costs when an application needs to be rewritten towards the end of a production run. In the case of outsourced software, the smartest approach is to test it in multiple ways before launching it into full production.

    Редакция Falcongaze

    Авторы материала

    Data Storage Security: Why Is It Risky
    Articles
    Data Storage Security: Why Is It Risky
    Each company probably has its own data storage system, however, a large amount of information remains outside, which, if leaked, also carries certain risks. Any PDF files, document scans, audio and video files, in addition to important documentation, are also classified as information assets of the company and can be used against the business.

    Редакция Falcongaze

    Авторы материала

    How To Save Your Business From The Leak: 5 Steps
    Articles
    How To Save Your Business From The Leak: 5 Steps
    An information security audit of a company is one of the reliable tools for checking the current state of business information protection, risk management, and identifying potential threats and vulnerabilities of a company. A regular audit of the company's information security allows you to make sure that the information assets of the business are protected and analyze further data protection measures.

    Редакция Falcongaze

    Авторы материала

    What Is the Difference Between Encrypting, Encoding and Hashing?
    Articles
    What Is the Difference Between Encrypting, Encoding and Hashing?
    Encoding is not used to protect data, but only to bring data arrays into a format and size that is readable by the system. Encryption and hashing, on the contrary, are responsible for the safety of information during transmission and storage.

    Редакция Falcongaze

    Авторы материала

    How The Yandex.Metrica’s Counter Works
    Articles
    How The Yandex.Metrica’s Counter Works
    Yandex.Metrica is a functional web analytics tool from Yandex. With the help of this free service, you can analyze user behavior on the platform, website traffic, compare traffic indicators for different segments. To work with Yandex.Metrica, it is enough to have a Yandex account and a website with an inserted JS code.

    Редакция Falcongaze

    Авторы материала

    How to Prevent Backdoor-Viruses' Attacks
    Articles
    How to Prevent Backdoor-Viruses' Attacks
    In fact, the backdoor is a new remote entry point into the device for non-authorized users. Backdoors are mainly used by attackers to access databases or file servers.

    Редакция Falcongaze

    Авторы материала

    SecureTower Update 6.6: Linux-agent Control
    Articles
    SecureTower Update 6.6: Linux-agent Control
    Since the Linux OS is especially popular in the field of IT workers, in order to control a whole caste of employees (developers, administrators, etc.), software that can control this operating system was vital for information security specialists. In the coming days, the Falcongaze SecureTower DLP system will launch the system update 6.6, which will have a huge number of new features, including agent control on Linux OS.

    Редакция Falcongaze

    Авторы материала

    Secure E-mail Domains: Good Alternative to Market Leaders
    Articles
    Secure E-mail Domains: Good Alternative to Market Leaders
    How should a good postal service work? The most important thing is encrypting messages on both sides so that third parties can not get the contents. Of course, in 2022, no well-managed services would ignore MFA and encryption. The reputation is also important, because the bigger cyber incents happened to the company, the less confidence in the product.

    Редакция Falcongaze

    Авторы материала

    Zero Trust Concept
    Articles
    Zero Trust Concept
    The zero trust model is an information technology approach to security, which involves verification of not only the user but also the device, regardless of the user's location. By default, all users, gadgets, clouds, systems, and networks are compromised, whether or not a firewall protects them.

    Редакция Falcongaze

    Авторы материала

    How cookies are linked to online advertising
    Articles
    How cookies are linked to online advertising
    Almost every site, provided that you are visiting it for the first time, will ask you to allow cookies. We have previously discussed changes to cookie policy around the world. In particular, the changes relate to the procedure for accepting and canceling cookies, the vast majority of users accept cookies in order to use the site conveniently, but not everyone approves of cookies and even talks about their insecurity.

    Редакция Falcongaze

    Авторы материала

    Cyber Incident Prevention: First Steps
    Articles
    Cyber Incident Prevention: First Steps
    The most important thing in a critical situation is the speed in order to preserve and restore what is recoverable. Much earlier, company management should appoint trusted people from the information security department who will notify management in the event of an attack or leak.

    Редакция Falcongaze

    Авторы материала

    Show more

    Company
    About us
    Contact us
    Our clients
    Partners
    Become a partner
    Benefits from SecureTower for business
    Control of confidential information
    Control of mobile workstations
    Data Leak Prevention Software for GDPR Compliance
    Detection of internal threats
    Incident investigation
    Business processes optimization
    Economic security
    Compliance with requirements of regulating bodies
    Provision of transparency of all business processes
    Controlling employees at remote work
    Our clients
    Banking and financial sector
    Social structures
    Healthcare
    Trade companies
    Telecommunications
    Industry
    Education
    State institutions
    Transport and logistics
    Research centres
    High tech
    © 2010–2025 Falcongaze
    FAQ
    Privacy agreement