SlideShare a Scribd company logo
OCC Bangalore Presentation
            Prakash Baskaran
          prakash@pawaa.com




Control       Protection
           © Pawaa Software    Freedom   1
Industry Pain Points


                                             Index


  Control          Protection
                © Pawaa Software   Freedom           2
Recent Data Leak News




                    © Pawaa Software   3
Recent Data Leak News




                    © Pawaa Software   4
Recent Data Leak News




                    © Pawaa Software   5
Recent Data Leak News




                    © Pawaa Software   6
Recent Data Leak News




                    © Pawaa Software   7
Recent Data Leak News




                    © Pawaa Software   8
Defences everywhere

                                                      Network Level
                                                      Firewalls
                                                      Content filters
                                                      Email filters
                                                      IDS, IPS, UTM
                                                      Network controls

                                                      Desktop Level
                                                      Anti-virus
                                                      Identity Mgmt
                                                      Access controls
          Customers                                   Device locks
          Suppliers & vendors                         Encryption
          Partners & Consultants
VPN/WEB   Remote Employees
                                       but data leaks continue..
                                   © Pawaa Software                      9
Source of Data Leak: Insiders

                                                                Traditional Approaches Not Enough
                                                                   Offline activities at endpoints
                                                                   Clipboard and screenshots
                                                                   Privilege abuse
                                                                   Removable media
                                                                   Local configuration changes
                                                                   Logs without context
                                    Source: Ponemon Institute
                                                                   Too many point solutions
   87% of insider attacks involved authorized
                                                                   User Intents not deciphered
   persons using legitimate commands.
                              -US Secret Service
                                                                  Insider risk management
   Through 2008, insiders will account for
   majority of financial losses from computers                   needs to start with Endpoint
                                       - Gartner                         Monitoring.

                                       © Pawaa Software                                              10
Impacts of Data Leak




                       © Pawaa Software   11
Drivers: DLP converging with GRC



                                            Key Driver


                                          Common thread
                                         between all these
                                          regulations is to
                                        protect information
                                            and control
                                            endpoints!




                     © Pawaa Software                         12
Pawaa Innovations & Product Portfolio


                                            Index


  Control         Protection
               © Pawaa Software   Freedom           13
Defences everywhere

                                                          Network Level
                                                          Firewalls
                                                          Content filters
                                                          Email filters
                                                          IDS, IPS, UTM
                                                          Network DLP

                                                          Desktop Level
                                                          Anti-virus
                                                          Access controls
                                                          Device locks
      Web Applications
                                                          Encryption
         Customers
                                                          Host based DLP
         Suppliers & vendors
         Partners & Consultants
         Remote Employees
                                                     Pawaa Protects..
                                  © Pawaa Software                          14
Traditional Browser & Files

   Traditional Web Browsers
   Can trust but cannot verify.
                                                     Problems
                                       Trusted users access information on Un-
                                       trusted computers
                                       No visibility beyond typical user
                                       authentication
                                       Simple user activities cause data leaks
         Files at Desktop
       Can easily walk away
                                             Clipboard
                                             Print
                                             Save as
                                       No audit trails available and compliance is
                                       tricky
                                       Files downloaded from web application
                                       through typical browsers can easily “walk
                                       away”


                                  © Pawaa Software                                   15
Sharing Data over the Web

          Traditional DLP Products


 Only covers this scenario:                              Many common situations where you must
        Trusted user, only using…                        share sensitive data within a context that is
        Fully trusted machine, as long as…               not so “locked down”
        Under org’s full control, only within..          These use cases are often vital to a business
        Intranet environment                             being able to operate and compete!


 But what about…                                         Only Pawaa has the technology for sharing
       Cloud/ SaaS /ASP                                  sensitive information:
       Franchises and branches                             Over the browser, even in…
       Extranets                                           Non-intranet situations, even with…
       Shared computers
                                                           Unknown computers to
       Mobile staff with no VPN access
                                                           Protect information accessed




                                              © Pawaa Software                                           16
Other Key Issues

       Traditional DLP Products



   Agent can be disabled
   Agent must be pre-installed on machine            Solves these serious protection issues
   before protection starts
   Huge logs    practically unusable
   Proving compliance = pull logs from               Solves these serious workload issues
   multiple products and correlate them
   Pre-classify data (very time consuming)
   Agent must run all the time                       Solves these serious usability issues
   24x7 monitoring intrudes on user privacy




                                          © Pawaa Software                                    17
Our Innovative Approach


   Implements as a browser wrapper                      Un-hackable (up to 4 keys)
   Downloaded once, 1st time user tries to              Patented file format “wrapper”, works with
   access sensitive data                                any native format
   Works on un-trusted computers                        Preset IRM policies are auto-applied to any
   accessing in multiple types of                       file created/downloaded
   authentification
                                                        IRM enforces who, where, when and how
   Agent is the conduit -- so data not                  the file can be consumed
   available if the agent is “disabled”
                                                        File can only be consumed after policies are
   Only log relevant into, so easy to detect            enforced
   suspicious activity
                                                        Even for files already created:
                                                              Policies can be modified
                                                              Content itself can be updated

         Jointly protect against unauthorized access and unauthorized use

                                           © Pawaa Software                                            18
Demonstration



                          For this demonstration…

       Non “locked down” scenario
           • No Intranet, no VPN
           • Everything is accessing web apps via a browser
           • Machine unknown to the enterprise

       PawaaWEBB has been deployed for the web application that
       needs protection




                              © Pawaa Software                    19
Demonstration




                         Demonstration
     • PawaaWEBB – deploys as a browser wrapper
     • Acts as the required conduit – no access if not running
     • To access a secure URL – user downloads & installs once
           Instant protection
           No army of install engineers




                                    © Pawaa Software             20
Demonstration


                                Desktop Client
            Only required while accessing secure URLs
            • Users – minimizes machine “overhead” (agent not
              running all the time)

                Demonstration
            • Admins – logs capture relevant activity (not logging
              “all activity for all users all the time”)




                           © Pawaa Software                          21
Demonstration
                                   Authentication
          Goes beyond just username and password
          • Communicates with server
          • Can work with many authentication methods (i.e., AD,
            SAML, OpenID, etc.)
          • Updates all policies
          • Rechecks components for tampering – config files, DLLs,
            registry entries, etc.




                               © Pawaa Software                       22
PawaaWEBB Screenshots




                  © Pawaa Software   23
PawaaWEBB Screenshots




    File Download                        PawaaFILE Conversion             Local File System Monitoring


                Application Monitoring                          Hardware Monitoring    Network Monitoring




                                         © Pawaa Software                                                24
Demonstration




                © Pawaa Software   25
“View Policy” – Selected Highlights
               Can monitor individual fields (detect, alert, block)
               Can monitor click behavior within the browser




                       “View Policy” – Selected Highlights
               Configure upload/download permissions by URL
               (including allowable file types)
               Data masking within the browser views




© Pawaa Software                                                  26
Demonstration




                                   Patented file format “wrapper”, works
                                   with any native format
                                   Un-hackable, but not just encrypting…
                                   Pre-set IRM policies are auto-applied to
                                   any file created/downloaded
                                   IRM enforces every aspect of consuming
                                   the file



                © Pawaa Software                                              27
Demonstration




                PawaaFILE wraps around any native format
                Displayed as a .paw file format
                Logo can carry client branding




                      © Pawaa Software                     28
PawaaFILE Screenshots




                    © Pawaa Software   29
Demonstration
                File checks with server, when opened
                This allows updates to be applied, even on files
                “in the wild”
                    IRM policy changes
                    Even content can be updated




                         © Pawaa Software                          30
“HotDoc” Examples

 John and Eric (mobile salesmen)
 download the confidential price
 list to their notebooks


                                             John                 Eric


           Later: 1) headquarters updates the price list and 2) Eric quits.
           Admin makes both changes on the server



                  When John next opens the                                Eric can’t use
                  document, the price list                                the file, in
                  content is auto-updated                                 any way




                                      © Pawaa Software                                     31
Demonstration


                            Server Console
                                   Only log relevant info, so easy to perform
                                   detection, forensics, and audits
                                   Even capture activity on files “in the
                                   wild”




                © Pawaa Software                                                32
Solutions with PawaaWEBB & PawaaFILE


                                           Index


  Control        Protection
              © Pawaa Software   Freedom           33
Integration with Cloud Applications

                         Advantages of Cloud based Applications

                               No Hardware
                               No Software
                               Huge cost savings

                         PawaaWEBB & PawaaFILE Integration

                             Complete audit trail on user behavior
                             Control and security for the
                             downloaded files and reports.
                             Control over the user desktop and user
                             activities such as print, screenshot,
                             clipboard and other activities.
                             Fills the missing web and file security
                             for cloud applications


                         © Pawaa Software                              34
Integration with Open Source Apps

                        Advantages of Open Source Applications

                              Open Source Software benefits
                              Widely popular

                        PawaaWEBB & PawaaFILE Integration

                            Complete audit trail on user behavior
                            Control and security for the
                            downloaded files and reports.
                            Control over the user desktop and user
                            activities such as print, screenshot,
                            clipboard and other activities.
                            Increases the adoption of Open source
                            software and adoption of Pawaa
                            products.

                        © Pawaa Software                             35
Integration with Smart Cards

                         PawaaFILE with Proximity Cards

                             Can eliminate the need for authentication
                             Will open only the files that are authorized
                             for the card holder
                             Can carry the file policies on the card
                             Will open .paw files faster and enforce the
                             policies quicker
                             Ideal for hospital and clinical environments

                         PawaaFILE On Smart Health Cards

                             Only authorized users can open the files
                             Privacy, confidentiality and security
                             guaranteed.



                         © Pawaa Software                                   36
Hot Doc Feature of PawaaFILE

                        PawaaFILE Solutions

                            PawaaFILE knows the source, knows the
                            user and so can automatically update the
                            contents.
                            Applications: Credit card statements,
                            mutual fund statements, bank account
                            statements, telephone or utility
                            statements
                            Eliminates the need for the user to
                            frequently visit the web site to download
                            Ensures constant interaction with the bank
                            and the customer
                            Customized ads for the users
                            Increases the brand identity of the owner


                        © Pawaa Software                                 37
PawaaDOCS – SaaS application




                       © Pawaa Software   38
Thank you.
             Prakash Baskaran
           prakash@pawaa.com




Control        Protection
            © Pawaa Software    Freedom   39

More Related Content

PPTX
Check Point75 Makes3 D Security A Reality Q22011
PDF
It's 2012 and My Network Got Hacked - Omar Santos
PDF
Guard Era Corp Brochure 2008
PDF
Datasheet stonegate ips-allinone
PPSX
MBM's InterGuard Security Suite
PDF
Datasheet stonegate fw-allinone
PDF
Cat6500 Praesentation
PDF
CNISP - Platform Introduction 071511pks
Check Point75 Makes3 D Security A Reality Q22011
It's 2012 and My Network Got Hacked - Omar Santos
Guard Era Corp Brochure 2008
Datasheet stonegate ips-allinone
MBM's InterGuard Security Suite
Datasheet stonegate fw-allinone
Cat6500 Praesentation
CNISP - Platform Introduction 071511pks

What's hot (17)

PPTX
Hh 2012-mberman-sds2
PDF
HTLV - DSS @Vilnius 2010
PPT
Refense Security Risk Briefing July 2009
PDF
Preventing The Next Data Breach Through Log Management
PDF
Mobile Security
PPTX
Hp Fortify Pillar
PDF
Gigamon U - Eye Of The Fire, Network Malware Control System
PDF
RSA 2010 Kevin Rowney
PDF
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
PDF
Cloud Security: Perception Vs. Reality
PPTX
BYOD - Ruckus way. Right way.
PPTX
Gtb Dlp & Irm Solution Product And Deployment Overview
PDF
2012 Data Center Security
PDF
Nebezpecny Internet Novejsi Verze
PDF
Advanced infrastructure as foundation for e-democracy solutions - Daniel Dani...
PDF
Architecting Secure Web Systems
Hh 2012-mberman-sds2
HTLV - DSS @Vilnius 2010
Refense Security Risk Briefing July 2009
Preventing The Next Data Breach Through Log Management
Mobile Security
Hp Fortify Pillar
Gigamon U - Eye Of The Fire, Network Malware Control System
RSA 2010 Kevin Rowney
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Cloud Security: Perception Vs. Reality
BYOD - Ruckus way. Right way.
Gtb Dlp & Irm Solution Product And Deployment Overview
2012 Data Center Security
Nebezpecny Internet Novejsi Verze
Advanced infrastructure as foundation for e-democracy solutions - Daniel Dani...
Architecting Secure Web Systems
Ad

Similar to Pawaa OCC Presentation (20)

PDF
Bulding Soc In Changing Threat Landscapefinal
PDF
S series presentation
PPTX
Enterprise API Security & Data Loss Prevention - Intel
PDF
RSA 2012 Virtualization Security February 2012
PDF
Real-Time Protection From Every Malware Infection
PDF
Symantec Endpoint Protection 12
PPTX
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
PDF
Data Access Network for Monitoring and Troubleshooting
PPTX
Sådan undgår du misbrug af kundedata og fortrolig information
PPTX
Vfm palo alto next generation firewall
PDF
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
PPTX
Retail IT 2013: Data Security & PCI Compliance Briefing
PDF
DirectAccess
PPTX
Endpoint Protection
PPTX
Network penetration testing
PDF
Sccm 2012 overview - chris_estonina
PPT
Panda Cloud Protection - protectie maxima, costuri reduse
PDF
Microsoft System Center 2012 Delivering better IT Management
PDF
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
PDF
Intel Cloud Summit: Greg Brown McAfee
Bulding Soc In Changing Threat Landscapefinal
S series presentation
Enterprise API Security & Data Loss Prevention - Intel
RSA 2012 Virtualization Security February 2012
Real-Time Protection From Every Malware Infection
Symantec Endpoint Protection 12
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
Data Access Network for Monitoring and Troubleshooting
Sådan undgår du misbrug af kundedata og fortrolig information
Vfm palo alto next generation firewall
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Retail IT 2013: Data Security & PCI Compliance Briefing
DirectAccess
Endpoint Protection
Network penetration testing
Sccm 2012 overview - chris_estonina
Panda Cloud Protection - protectie maxima, costuri reduse
Microsoft System Center 2012 Delivering better IT Management
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
Intel Cloud Summit: Greg Brown McAfee
Ad

Recently uploaded (20)

PPTX
sales presentation، Training Overview.pptx
PDF
NewBase 12 August 2025 Energy News issue - 1812 by Khaled Al Awadi_compresse...
PDF
How to Get Funding for Your Trucking Business
PDF
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
PDF
Technical Architecture - Chainsys dataZap
PPTX
svnfcksanfskjcsnvvjknsnvsdscnsncxasxa saccacxsax
PDF
NEW - FEES STRUCTURES (01-july-2024).pdf
PPTX
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
PPTX
Sales & Distribution Management , LOGISTICS, Distribution, Sales Managers
PDF
Keppel_Proposed Divestment of M1 Limited
PDF
Tata consultancy services case study shri Sharda college, basrur
PDF
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
PPTX
Principles of Marketing, Industrial, Consumers,
PPTX
Astra-Investor- business Presentation (1).pptx
PDF
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)
PPTX
3. HISTORICAL PERSPECTIVE UNIIT 3^..pptx
PDF
Module 2 - Modern Supervison Challenges - Student Resource.pdf
PPTX
TRAINNING, DEVELOPMENT AND APPRAISAL.pptx
PDF
Cours de Système d'information about ERP.pdf
PPTX
Slide gioi thieu VietinBank Quy 2 - 2025
sales presentation، Training Overview.pptx
NewBase 12 August 2025 Energy News issue - 1812 by Khaled Al Awadi_compresse...
How to Get Funding for Your Trucking Business
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
Technical Architecture - Chainsys dataZap
svnfcksanfskjcsnvvjknsnvsdscnsncxasxa saccacxsax
NEW - FEES STRUCTURES (01-july-2024).pdf
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
Sales & Distribution Management , LOGISTICS, Distribution, Sales Managers
Keppel_Proposed Divestment of M1 Limited
Tata consultancy services case study shri Sharda college, basrur
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
Principles of Marketing, Industrial, Consumers,
Astra-Investor- business Presentation (1).pptx
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)
3. HISTORICAL PERSPECTIVE UNIIT 3^..pptx
Module 2 - Modern Supervison Challenges - Student Resource.pdf
TRAINNING, DEVELOPMENT AND APPRAISAL.pptx
Cours de Système d'information about ERP.pdf
Slide gioi thieu VietinBank Quy 2 - 2025

Pawaa OCC Presentation

  • 1. OCC Bangalore Presentation Prakash Baskaran prakash@pawaa.com Control Protection © Pawaa Software Freedom 1
  • 2. Industry Pain Points Index Control Protection © Pawaa Software Freedom 2
  • 3. Recent Data Leak News © Pawaa Software 3
  • 4. Recent Data Leak News © Pawaa Software 4
  • 5. Recent Data Leak News © Pawaa Software 5
  • 6. Recent Data Leak News © Pawaa Software 6
  • 7. Recent Data Leak News © Pawaa Software 7
  • 8. Recent Data Leak News © Pawaa Software 8
  • 9. Defences everywhere Network Level Firewalls Content filters Email filters IDS, IPS, UTM Network controls Desktop Level Anti-virus Identity Mgmt Access controls Customers Device locks Suppliers & vendors Encryption Partners & Consultants VPN/WEB Remote Employees but data leaks continue.. © Pawaa Software 9
  • 10. Source of Data Leak: Insiders Traditional Approaches Not Enough Offline activities at endpoints Clipboard and screenshots Privilege abuse Removable media Local configuration changes Logs without context Source: Ponemon Institute Too many point solutions 87% of insider attacks involved authorized User Intents not deciphered persons using legitimate commands. -US Secret Service Insider risk management Through 2008, insiders will account for majority of financial losses from computers needs to start with Endpoint - Gartner Monitoring. © Pawaa Software 10
  • 11. Impacts of Data Leak © Pawaa Software 11
  • 12. Drivers: DLP converging with GRC Key Driver Common thread between all these regulations is to protect information and control endpoints! © Pawaa Software 12
  • 13. Pawaa Innovations & Product Portfolio Index Control Protection © Pawaa Software Freedom 13
  • 14. Defences everywhere Network Level Firewalls Content filters Email filters IDS, IPS, UTM Network DLP Desktop Level Anti-virus Access controls Device locks Web Applications Encryption Customers Host based DLP Suppliers & vendors Partners & Consultants Remote Employees Pawaa Protects.. © Pawaa Software 14
  • 15. Traditional Browser & Files Traditional Web Browsers Can trust but cannot verify. Problems Trusted users access information on Un- trusted computers No visibility beyond typical user authentication Simple user activities cause data leaks Files at Desktop Can easily walk away Clipboard Print Save as No audit trails available and compliance is tricky Files downloaded from web application through typical browsers can easily “walk away” © Pawaa Software 15
  • 16. Sharing Data over the Web Traditional DLP Products Only covers this scenario: Many common situations where you must Trusted user, only using… share sensitive data within a context that is Fully trusted machine, as long as… not so “locked down” Under org’s full control, only within.. These use cases are often vital to a business Intranet environment being able to operate and compete! But what about… Only Pawaa has the technology for sharing Cloud/ SaaS /ASP sensitive information: Franchises and branches Over the browser, even in… Extranets Non-intranet situations, even with… Shared computers Unknown computers to Mobile staff with no VPN access Protect information accessed © Pawaa Software 16
  • 17. Other Key Issues Traditional DLP Products Agent can be disabled Agent must be pre-installed on machine Solves these serious protection issues before protection starts Huge logs practically unusable Proving compliance = pull logs from Solves these serious workload issues multiple products and correlate them Pre-classify data (very time consuming) Agent must run all the time Solves these serious usability issues 24x7 monitoring intrudes on user privacy © Pawaa Software 17
  • 18. Our Innovative Approach Implements as a browser wrapper Un-hackable (up to 4 keys) Downloaded once, 1st time user tries to Patented file format “wrapper”, works with access sensitive data any native format Works on un-trusted computers Preset IRM policies are auto-applied to any accessing in multiple types of file created/downloaded authentification IRM enforces who, where, when and how Agent is the conduit -- so data not the file can be consumed available if the agent is “disabled” File can only be consumed after policies are Only log relevant into, so easy to detect enforced suspicious activity Even for files already created: Policies can be modified Content itself can be updated Jointly protect against unauthorized access and unauthorized use © Pawaa Software 18
  • 19. Demonstration For this demonstration… Non “locked down” scenario • No Intranet, no VPN • Everything is accessing web apps via a browser • Machine unknown to the enterprise PawaaWEBB has been deployed for the web application that needs protection © Pawaa Software 19
  • 20. Demonstration Demonstration • PawaaWEBB – deploys as a browser wrapper • Acts as the required conduit – no access if not running • To access a secure URL – user downloads & installs once Instant protection No army of install engineers © Pawaa Software 20
  • 21. Demonstration Desktop Client Only required while accessing secure URLs • Users – minimizes machine “overhead” (agent not running all the time) Demonstration • Admins – logs capture relevant activity (not logging “all activity for all users all the time”) © Pawaa Software 21
  • 22. Demonstration Authentication Goes beyond just username and password • Communicates with server • Can work with many authentication methods (i.e., AD, SAML, OpenID, etc.) • Updates all policies • Rechecks components for tampering – config files, DLLs, registry entries, etc. © Pawaa Software 22
  • 23. PawaaWEBB Screenshots © Pawaa Software 23
  • 24. PawaaWEBB Screenshots File Download PawaaFILE Conversion Local File System Monitoring Application Monitoring Hardware Monitoring Network Monitoring © Pawaa Software 24
  • 25. Demonstration © Pawaa Software 25
  • 26. “View Policy” – Selected Highlights Can monitor individual fields (detect, alert, block) Can monitor click behavior within the browser “View Policy” – Selected Highlights Configure upload/download permissions by URL (including allowable file types) Data masking within the browser views © Pawaa Software 26
  • 27. Demonstration Patented file format “wrapper”, works with any native format Un-hackable, but not just encrypting… Pre-set IRM policies are auto-applied to any file created/downloaded IRM enforces every aspect of consuming the file © Pawaa Software 27
  • 28. Demonstration PawaaFILE wraps around any native format Displayed as a .paw file format Logo can carry client branding © Pawaa Software 28
  • 29. PawaaFILE Screenshots © Pawaa Software 29
  • 30. Demonstration File checks with server, when opened This allows updates to be applied, even on files “in the wild” IRM policy changes Even content can be updated © Pawaa Software 30
  • 31. “HotDoc” Examples John and Eric (mobile salesmen) download the confidential price list to their notebooks John Eric Later: 1) headquarters updates the price list and 2) Eric quits. Admin makes both changes on the server When John next opens the Eric can’t use document, the price list the file, in content is auto-updated any way © Pawaa Software 31
  • 32. Demonstration Server Console Only log relevant info, so easy to perform detection, forensics, and audits Even capture activity on files “in the wild” © Pawaa Software 32
  • 33. Solutions with PawaaWEBB & PawaaFILE Index Control Protection © Pawaa Software Freedom 33
  • 34. Integration with Cloud Applications Advantages of Cloud based Applications No Hardware No Software Huge cost savings PawaaWEBB & PawaaFILE Integration Complete audit trail on user behavior Control and security for the downloaded files and reports. Control over the user desktop and user activities such as print, screenshot, clipboard and other activities. Fills the missing web and file security for cloud applications © Pawaa Software 34
  • 35. Integration with Open Source Apps Advantages of Open Source Applications Open Source Software benefits Widely popular PawaaWEBB & PawaaFILE Integration Complete audit trail on user behavior Control and security for the downloaded files and reports. Control over the user desktop and user activities such as print, screenshot, clipboard and other activities. Increases the adoption of Open source software and adoption of Pawaa products. © Pawaa Software 35
  • 36. Integration with Smart Cards PawaaFILE with Proximity Cards Can eliminate the need for authentication Will open only the files that are authorized for the card holder Can carry the file policies on the card Will open .paw files faster and enforce the policies quicker Ideal for hospital and clinical environments PawaaFILE On Smart Health Cards Only authorized users can open the files Privacy, confidentiality and security guaranteed. © Pawaa Software 36
  • 37. Hot Doc Feature of PawaaFILE PawaaFILE Solutions PawaaFILE knows the source, knows the user and so can automatically update the contents. Applications: Credit card statements, mutual fund statements, bank account statements, telephone or utility statements Eliminates the need for the user to frequently visit the web site to download Ensures constant interaction with the bank and the customer Customized ads for the users Increases the brand identity of the owner © Pawaa Software 37
  • 38. PawaaDOCS – SaaS application © Pawaa Software 38
  • 39. Thank you. Prakash Baskaran prakash@pawaa.com Control Protection © Pawaa Software Freedom 39