Predict and prevent information leaks by utilizing "Lit i View EMAIL AUDITOR" that makes full use of UBIC's original artificial intelligence technology

Home » corporate » News » 2014 » Predict and prevent information leaks by utilizing "Lit i View EMAIL AUDITOR" that makes full use of UBIC's original artificial intelligence technology
2014.05.13

--To the press -

Predict and prevent information leaks by utilizing "Lit i View EMAIL AUDITOR" that makes full use of UBIC's original artificial intelligence technology

We will hold a booth exhibition and seminar at the "11th Information Security EXPO [Spring]"

UBIC Co., Ltd.
Masahiro Morimoto, President and CEO
2-12-23 Konan, Minato-ku, Tokyo
(TSE Mothers Code Number: 2158)
(NASDAQ ticker symbol: UBIC)

 UBIC (Headquarters: Minato-ku, Tokyo, President Masahiro Morimoto), which is engaged in big data analysis business that makes full use of artificial intelligence on the listing of Nasdak and TSE Mothers, is a "virtual data scientist" By utilizing "Lit i View EMAIL AUDITOR" equipped with "Lit i View EMAIL AUDITOR", we will start a service to prevent leakage of confidential corporate documents from June 6st.Also, regarding the utilization of this "Lit i View EMAIL AUDITOR", Wednesday, May 1th.~5We will exhibit our booth at the "16th Information Security EXPO [Spring]" to be held at Tokyo Big Sight on Friday, 11th of March. During the EXPO period, we held a seminar in the booth that included an explanation of our unique artificial intelligence technology (patented) by the developer, and explained mainly how this system performs automatic auditing. I will.
 
 As the inflow and outflow of human resources between companies increases, there are many cases in which employees who have retired from a company take out confidential information when they retire and bring it to the company to which they change jobs.And the damage to the companies that allowed the leak is immeasurable.Legislation is being developed to deal with this situation, and in recent years, confidentiality obligations and competition avoidance obligations have been concluded with employees from the aspect of labor contracts, and access authority has been set for internal data as a system response. The number of companies doing this is increasing.However, although these measures have a certain deterrent effect, the reality is that they lack determinism.
 
 Our automatic e-mail audit system "Lit i View EMAIL AUDITOR" breaks through this situation.We believe that information leakage consists of three stages: "cultivation," "preparation," and "execution." In "Lit i View EMAIL AUDITOR", artificial intelligence discovers signs in the "cultivation" stage and audits them, so that the signs of information leakage can be quickly caught in the subsequent stages and lead to effective countermeasure implementation.In order to analyze the communication performed at each stage, this system utilizes our abundant research results over many years, analysis of the huge amount of data cultivated there, and a knowledge base based on the results of research. It is equipped with two functions, "information leakage behavior sign" and "confidential information recognition".

What is "information leakage behavior sign"?
 The first stage of information leakage and the "cultivation" that we regard is the stage where the possibility of information leakage increases.Information leakage is likely to occur due to events such as internal relationships, dissatisfaction with treatment, and job changes. In "Information Leakage Behavior Prediction", the auditor makes a judgment using a knowledge base in which typical behaviors performed in "cultivation" are learned in advance.By learning the auditor's judgment by artificial intelligence, it is possible to automatically create a smarter knowledge base every day.By using this function to analyze communication, you can quickly catch the signs of information leakage.In addition, by investigating the person identified by the analysis, it is possible to identify behaviors that are suspected of being "prepared" for information leakage at an early stage.

What is "confidential information recognition"?
 "Confidential information recognition" is a function to learn files managed as confidential information by artificial intelligence.By registering a confidential file using this function, "Lit i View EMAIL AUDITOR" can automatically learn the contents of the file and extract not only the same file but also similar files that are copied and pasted.In the past, only files that were set as "confidential" were recognized as confidential information, and those that were not set could be overlooked, even if they were confidential information.With this system, artificial intelligence can read the contents of all files 4,000 times faster than humans, and can quickly extract emails with highly confidential files and quoted sentences. Therefore, it is possible to prevent such oversight.
 
 Furthermore, as a result of the audit, we used a function called "Central Linkage" to visualize human relationships for email addresses that needed attention, and by analyzing them, those who were overlooked from the conversation content of the email. It is also possible to find a new one.This feature analyzes not only individual relationships, but also corporate email exchanges with business partners.
Please use "Lit i View EMAIL AUDITOR" to prevent information leakage from your company.
 
[11th Information Security EXPO [Spring] Exhibit Overview]
• Information Security EXPO Details: http://www.ist-expo.jp/
• Our booth number: East 24-19
• Exhibited products: Email audit tool "EMAIL AUDITOR"      
“We will solve the problems of email auditing tools based on conventional keyword searches, such as excessive email extraction and omission of extraction due to complicated keyword settings, by utilizing artificial intelligence with an automatic learning function.”                  
 http://www.ubic.co.jp/products/liv/email-auditor.html

[Outline of mini seminar in our booth]
Holding schedule
■ Seminar XNUMX
• Title: "High-precision, low-cost email / big data auditing method using a system that applies artificial intelligence"
• Summary: Due to the increase in the inflow and outflow of human resources between companies, the company has settled a huge amount of proceedings due to the leakage of confidential information by former employees to the new company, price cartels, fraudulent acts such as bribery, and careless conversations by developers. The increasing number of cases in which we are obliged to pay is a major problem.Many of these cases can be detected early by auditing emails, but traditional auditing methods have been laborious and costly.With the audit system that applies UBIC's artificial intelligence, it is possible to improve audit accuracy and dramatically reduce costs by calculating the importance of emails and package inserts to be audited. I made it.In the seminar, we will mainly explain how this system performs automatic auditing.
•open time: 5/14(水) 13:00~13:20、14:30~14:50
      5/15(木) 11:00~11:20、14:30~14:50
      5/16(金) 11:00~11:20、14:00~14:20

■ Seminar XNUMX
• Title: "Basic technology that supports audit systems that utilize artificial intelligence applied technology"
• Overview: UBIC's "EMAIL AUDITOR" significantly reduces auditing effort and cost with automatic sorting and automatic learning.We will introduce the basic technology that supports an unprecedented audit system using this artificial intelligence application technology, and what kind of research and development team developed it, with a background.
•open time: 5/14 (Wed) 16:00-16:30
      5/15(木) 13:00~13:30、16:00~16:30

[About UBIC]

President Masahiro Morimoto
Address      2-12-23 Konan, Minato-ku, Tokyo Meishan Takahama Building
URL      http://www.ubic.co.jp/

UBIC Co., Ltd. is an e-discovery business that preserves, investigates, and analyzes electronic data required in international cartel investigations, investigations related to the Federal Foreign Anti-Corruption Act (FCPA), IP proceedings, and PL proceedings. In addition to the electronic discovery support project), a behavioral information data analysis company that provides computer forensic investigation services that conduct investigations centered on electronic data.We have the world's highest level of technology for Asian language and the laboratory with the largest processing capacity in Asia. December 2007 Established a US subsidiary.Provided legal proceedings related to Asian companies from both Asia and the United States. At the end of 12, we developed our own eDiscovery support system "Lit i View ®" that enables eDiscovery in international litigation even within companies, and from October 2009, we developed "UBIC" as a cloud service. Started providing "Legal Cloud Service".In March 2011, we developed the world's first "Predictive Coding®" technology for Asian languages ​​and succeeded in putting it into practical use.
Established on August 2003, 8. Listed on TSE Mothers on June 8, 2007. Listed on NASDAQ on May 6, 26.The capital is 2013 yen (as of March 5, 16).