Oto Graph is a unique Business Behavioral Analysis (BBA) machine learning software.
Our system is based on counterterrorism AI technology, commonly used by western intelligence and law enforcement agencies.
By extracting and analyzing data from all company’s endpoint devices.
We are able to determine the normal digital behavior baseline of each individual in the organization.
And to detect anomalies from this baseline, anomalies that might indicate a potential breach of trust, ethical or negligent misbehavior.
Our software is a “trust machine” that enables business leaders to verify if the people they mostly trust are deserved to be trusted.
We extracting data from all endpoint devices, that are connected to the company’s network – whether physically, wirelessly or remotely.
The data is processed and analyzed to learn and to reveal the unique digital behavioral pattern of the organization, as a whole and of every individual.
Once characterized, OTOGRAPH sets baselines of normal patterns for each, and constantly searches for anomalies – deviations from those patterns.
The anomalies are detected automatically and instantly, categorized by their type of risk and being pushed as alerts to the business leader’s dashboard.
Our Program is constantly learning and calibrating the normal patterns and their thresholds, to minimize the number of false alarms.
Many types of organizational risks can be detected in advance by identifying their preliminary typical signs on people devices.
Many of those risks are existential to the business. If realized before being thwarted, they might bring its collapse.
Our software extracting and analyzing data from all endpoint devices that are connected to the company’s network – whether physically, wirelessly or remotely.
That means office and home workstations, laptops, tablets, smartphones and servers.
Employees are using their devices all day long, mixing work with personal use.
They install all kind of apps, open files from many sources and share information while jumping over between their professional apps and their private ones. While being connected sometimes to remote unsecure Wi-Fi networks.
OTOGRAPH can extract and analyze everything that is activated, utilized, transferred and measured through those devices, to provide maximum protection to the business.
The business leader has full control to select which data to track and which to exclude, which is analyzed anonymously and which is identified.
It is all based on the company’s policy, state regulation and employee’s consent.
OTOGRAPH is presenting spectrum of alerts accordingly and in any event, provides sufficient tools to enable business leaders to decide if to go into deeper scrutiny.
The OTOGRAPH system is comprised of three components:
Unique BBA unit can be set-up on customer servers (Virtual Machine set-up) or on cloud storage (whether customer’s cloud or OTOGRAPH’s cloud).
Customer special rules, if required, are determined in advance and uploaded by service teams.
Implementation, education and training are all part of the set-up process, led by our service teams.
All the data stored on the server is encrypted and only authorized executives, named by the customer, can get access to the data and the dashboard.
As specified above, the business leader has full control to select which data to track and which to exclude, which is analyzed anonymously and which is identified.
Also it is all based on the company’s policy, state regulation and employee’s consent.
All the Data is stored as long as the customer might need it and in accordance with company’s policy, state regulation and employee’s consent.
Our service teams are helping administrators and IT teams at the customer side, to set-up and implement the software.
Ongoing service support
is provided by email
or by telephone +1(561) 870-0440
Mon-Thu between 9am to 5pm GMT.
The software will be automatically updated as long as the contract is valid.
The payment is based on a SaaS pricing model.
Meaning that customer is monthly charged per analyzed user.
Implementation and set-up fees are also charged according to the number of analyzed users.
Customers have full control to select which data to track and which to exclude.
Which is analyzed anonymously and which is identified.
It is all based on the company’s policy, state regulation and employee’s consent, wherever it is mandatory required.
Presenting spectrum of alerts accordingly and in any event.
Provides sufficient tools to enable business leaders to decide if to go into deeper scrutiny, based on legal advisory.
All legal precedents recognize the right of employers to take some measures to ensure, that the company interests and reputation are not compromised by their employees.
Whether intentionally or unintentionally.