SECURE YOUR WORKFORCE,

SECURE YOUR FUTURE

Security  .  Productivity  .  Responsibility.

Where Security and Compliance matters…

Established in 2013, E Safe Synergy was created to offer Malaysian businesses and corporations with top of the range Insider Threats - Organisational IT Behavioural Analytics services. 


Having experienced first-hand cases of information leakages from within the organisation itself, we understands the gravity of the situation and we are committed to E Safe Synergy’s mission “to create a safer and ethical digital workplace for everyday working life of everyone.” 


Referred by our contacts in the Defence and Security Department of the British High Commission Malaysia, we were introduced to a unique one-of-a-kind IT security solution which specialises in preventing data and information leakages, enforcing and defining the rules of and regulations of everyday Organisational IT usage.


With a track record of successful collaborations between various parties spanning a wide variety of industries and authoritative bodies including Government agencies, enforcement agencies, financial institutions, insurance agencies, automotive industries, Government link entities and private corporations.


We fills in the gaps and ensures complete corporate compliance at the end point by monitoring all forms of information and communication whether it comes from any online sources (corporate internet, 3G modems, Social media, chat, blogs etc) or offline sources (documents, USB drives, file sharing etc).

We pride ourselves on the knowledge, skills and expertise of our people who work together as a team delivering successful projects. Valuing the importance of relationships, we have a collaborative approach that is flexible and can respond quickly to the needs of our clients.

The Art of Security

Most existing IT security solutions focus on corporate compliance by concentrating only on the server or network level through gateway and firewall systems. The problem with this is, the end point machines are mostly left unmonitored.


This technique of monitoring at server level is insufficient at several levels :


  • It only concentrates on protecting against external threats such as hacking and sniffing and have no way to determine if the staff are using the machines for their personal use instead.


  • Blockers, filters and other server-based monitoring solutions fail when the laptop leaves the corporate network. The employee can easily take any confidential data he likes or access any website of his choice from his home or any public Wi-Fi location.


  • Employing a unique user centric approach which relies on identifying and educating offender at the source of the problem hence acting as the perfect deterrent to any infringement of company’s policies.
  • • 
  • There is no defence against encrypted and coded data and staff can easily circumvent data by going to “proxy sites”.

The Insider Threats

The park contains natural as well as cultural monuments, and is also oriented at ecotourism. A number of trails have been opened in the park.


There are several wooden architecture monuments. One of them is Porzhensky Pogost in the western part of the park, which is the ensemble of St. George church with the bell-tower (both from the 18th century) surrounded by the wooden wall with gates and towers (1789). The villages adjacent to Porzhensky Pogost have been deserted, and there is no road heading to it, so that the Pogost is only accessible via a pedestrian trail.


There are two roads into the park. In the southern part, south of Lake Lyokshmozero, there is an unpaved road connecting Kargopol and Pudozh. Another road in the northern part of the park branches off from the Onezhsky Trakt, connecting Kargopol via Plesetsk to Yemetsk. This road runs to the village on Pershlakhta on Lake Kenozero and then connects to the other villages on and around Lake Kenozero.

Behavioral Analytics

Ensuring workplace compliance


In today’s world, people and data are a company’s greatest assets. But people can also be a company’s weakest link when it comes to the DATA security. 


There should be no compromise when it comes to IT security. Losing data is a costly business. It can be devastating to any Organisation’s reputation, financials, and ultimately, survival. It is therefore imperative to prevent unauthorised access to your websites, database and computers as well as protect the datas from being corrupted or compromised.


Our protection capabilities can minimise your financial loss while maintaining high levels of productivity: 


  • 1. A purpose-built compliance solution that covers all the criteria of major regulations to make sure datas and information privacy is completely safe.
  • 2. Ensuring the company’s productivity remains high while maintaining optimum security through monitoring user behaviour and data movement to detect risks and using encryption to protect data.
  • 3. A One-Stop Solution on information leakage, information data classifications security, and productive use of IT resources and compliance. It achieves this through a unique philosophy of modifying human behaviour by monitoring and protecting information at its source. We trust them but verify. 


Insider threat management is the process of preventing, combating, detecting, and monitoring employees, remote vendors and contractors, to fortify an organization's data from theft, fraud and damage.

Securing Informations

Improves information security by monitoring end users


  • 1. Monitors sensitive information by allowing the definition of sensitive words and phrases. This allows the management to monitor what their staff are saying about the organisation when they are on social media and chat rooms or monitor secret information such as tender bids. 
  • 2. Monitors and alerts when sensitive document is accessed by a person without legitimate access.
  • 3. Using keystroke to monitor social networking sites and enable the Management will be sent reports on a breach when specific sensitive information is leaked on these social media sites.
  • 4. Monitoring chat applications and reports on when sensitive information is being leaked for further investigation on the breach, complete chat logs are maintained along with any specific violation.
  • 5. Monitors thumb drives for file changes and also provides complete audit trail in the case of sensitive documents being copied on them.
  • 6. Restricted use of thumb drive to only office document hence preventing people from copying from the company’s database files.
  • 7. Implements two factor authentications on employees in strategic positions via the system authenticated thumb drive along with the user name and password, hence preventing unlawful access to their machines.
  • 8. Sets specific information security rules per employee, user group department etc. Rules can be fine tuned by defining which sensitive information should be monitored in which areas such as chat, web, keystroke and documents.

Measuring Productivity

Enhancing Productive Use of IT Resources


  • 1. Amount of time spent by an employee/department/branch on productive vs non-productive applications, able to generate report on the employee productive and unproductive time.
  • 2. Top most visited websites within the organisation along with the details of the people visiting them to block unproductive sites. 
  • 3. Chat and social media usage such as Facebook, Twitter, Skype and blogs; and whether these are used for work or personal. Restrictions of usage of these applications.
  • 4. Visits to illegal sites like gambling and pornography A report is generated and sent to the server which can be used by the management to take further action.
  • 5. Audit of network machines To locate an unproductive and illegal material such as pornographic images and videos, personal photos and songs etc in the network.
  • 6. Productive use software licences Management can then remove access of those unproductive licences from certain employees or cancel those licences for the whole company.
  • 7. A map of the network bandwidth and reports on who uploads/downloads the largest amount of data in peak periods Transferring large amount of data over the network during peak time slows the network resulting in loss in productivity.

Verifying Responsibilities

Enhancing productive use of IT resources in many-many ways


  • 1. Prevents or Blockings the misuse of the corporate network for non-work purposes or worse, such as going to adultery, gambling, hate, racial discrimination, violence and other inappropriate sites.
  • 2. Detects online and offline pornographic activities hence safeguards the organisation from sexual harassment in the workplace which involves images and offensive emails.
  • 3. Identifying workplace bullying where the organisation can be sued for “constructive dismissal” if nothing is done to stop it.
  • 4. Alerting users on sensitive data movements, therefore ensuring people are responsible for the privacy of the data they keep as underlined by the new privacy laws.
  • 5. Locating unlicensed softwares, illegal music and videos that are stored within the users PC and network to avoid legal issues.
  • 6. Audits hardware and software to ensure that all assets are accounted for along with reports on changes in configuration for any asset.

Principal Range (M) Sdn Bhd 2022. For more info, please e-mail us at info@principalrange.com