Confidential Information Disclosure Movable Storage · Email Instant Message · P2P Dialup · Printout Security Challenge of Computerized Corporation Stealing.

Slides:



Advertisements
Similar presentations
This course is designed for system managers/administrators to better understand the SAAZ Desktop and Server Management components Students will learn.
Advertisements

SMB8000 Communication Analyst UNIVERGE®SV8100
Introduction to Computers Lecture By K. Ezirim. What is a Computer? An electronic device –Desktops, Notebooks, Mobile Devices, Calculators etc. Require.
Meganet Corporation VME Office Meganet Corporation Meganet Corporation is a leading worldwide provider of data security to Governments, Military,
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
Presentation. Contemporary Communication Fast – connects us quickly without delays Reliable – works always Global – connects us with the whole world Low.
Page 1 / 18 Internet Traffic Monitor IM Page 2 / 18 Outline Product Overview Product Features Product Application Web UI.
IP-guard
ESafe Reporter V3.0 eSafe Learning and Certification Program February 2007.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Operating System Customization
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Chapter 5 System Software.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Security Guidelines and Management
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
New Data Regulation Law 201 CMR TJX Video.
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
Copyright Security-Assessment.com 2004 New Technology Enforcement Strategies by Peter Benson.
Managing Local and Network Printer Chapter 11 powered by dj.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in We create innovative software solutions for SharePoint,
PayDox Corporate Document Management System Rotech AB Interface Ltd Business Software Integration.
Surveillance Equipment For Internet Activities It is a Internet activities surveillance equipment designed for sniffer package from networking, converter.
LANDesk Endpoint Security Audit 2.5
Module 4: Add Client Computers and Devices to the Network.
ShareTech 2015 Next-Gen UTM.
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Module 7: Fundamentals of Administering Windows Server 2008.
IMonitor EAM Employee Computer Surveillance Solution iMonitor Soft Co. Ltd., Tel: Skype : imonitor.support
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
The ProactiveWatch Monitoring Service. Are These Problems For You? Your business gets disrupted when your IT environment has issues Your employee and.
CSCI 1033 Computer Hardware Course Overview. Go to enter TA in the “Enter Promotion Code” box on the bottom right corner.
Network Security & Accounting
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Introduction TO Network Administration
Computer Security By Duncan Hall.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
OsMonitor Wangya Computer Co., Ltd. Employee Monitoring Software.
Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Cyberoam.
GFI LANguard Matt Norris Dave Hone Chris Gould. GFI LANguard: Description Through the performances of the three (3) cornerstones of vulnerability management:
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
HUAWEI TECHNOLOGIES CO., LTD. Huawei Storage ISM Management Pre-sales Product Training Materials Easy and Efficient WEU IT Solution Team.
«My future profession»
Securing Information Systems
Working at a Small-to-Medium Business or ISP – Chapter 8
Security Challenge form Computerized Corporation
PpT宝藏制作最新科技模版设计图案.
Security Challenge of Computerized Corporation
Designing IIS Security (IIS – Internet Information Service)
G061 - Network Security.
Comodo Dome Data Protection
IT Management, Simplified
IT Management, Simplified
Presentation transcript:

Confidential Information Disclosure Movable Storage · Instant Message · P2P Dialup · Printout Security Challenge of Computerized Corporation Stealing Information Spy ware Illegal Access Hacker tools Potential Security Risks System patches and vulnerabilities Virus Malice delete and changes Core Product Design Key Customer Information Sensitive Financial Information

Drawbacks of Information Technology Play games · Trade Stocks · Chat Online Browse Web Pages · Print Personal Stuffs Online Movies · Radio · Download Music Cannot Track Computer Assets Changes Administrator Faces Heavy Workload Cannot Troubleshoot Remote Computer

IP-guard Core Value IP-guard Desktop Management System Protect Information Limit Activities Plan Resources Control Information

Different Modules Suit for Different Corporations Needs Document Operation Management Management Bandwidth Management Network Control Printing Management Application Management Instant Message Management Asset Management Device Management Screen Snapshots Remote Maintenance Website Management Removable Storage Management

Document Operation Management Document Operation Logs Record document operations including create, access, Edit, Copy, Move, Delete Record document operations on movable storages and network paths Record document operations of other computers on documents in local shares Document Policy Control access of key documents Prevent illegal copy to movable storages and network Backup important document after edit or delete

Removable Storage Management Removable Storage device File/Full Disk Encryption / Decryption Removable Storage devices Authorization uses only the authorized devices can encrypt and decrypt the files computers without authorization cannot open the encrypted file properly

Application Management Application logs and statistic Record application startup and shut down Record window changes and title changes to track computer usage Application statistic to estimate staffs efficiency Application Policy Stop games and chat programs Stop malice programs

Website Management Web Statistic Summarized types of website visited to estimate Internet usage Web Logs Record website URL and title in detail Web Policy Block websites irrelevant to work Block websites with harmful messages

Management Record Record normal , webmail, exchange, and Lotus Notes mail. Record complete message and attachments Policy Limit sender accounts Block specific recipients Block with attachment of specific file name or exceed certain size

Instant Message Management Instant Message Record Record full content of the IM session IM File Policy Limit outgoing file name or file type Limit outgoing file size Backup outgoing files Instant message

Printing Management Print Logs Record information on printing application, printer, user and document name Record pages printed to estimate usage Printing Policy Block Illegal application from printing Block printing on specific printer Backup printed out document in JPEG format

Screen Snapshot Real Time Monitoring View agent screen in real time Support multi-monitors Multi-screen function to view several computer at one time Snapshot History Completely record screen history for future analyze Set different snapshot frequency on different application to focus on some sensitive information Optimized storage by compression

Device Management Storage Control Control usage of storage (Floppy· CD· USB· Movable storage· Memory card...) Communication Device Control Control data transfer to external ports or devices (Serial port· Parallel port· MODEM· Infrared· Bluetooth· Direct connection· Dialup) Other Device Control Control USB devices, Wireless card, or other new devices.

Network Control Network Communication Control Provide firewall functions to control communication of specific address and port Eliminate the use of specific port and communicate with unauthorized computers IP/MAC Binding Prevent users from changing network setting Intrusion Detection Scan the whole network and prevent illegal access to the network

Bandwidth Management Network Traffic Statistic Show network traffic statistic by IP Show network traffic statistic by ports Analyze data in specific time zone Network Traffic Policy Assign different bandwidth to different IP and ports Prevent BT P2P network media, and download tools to use up network resources

Asset Management Manage Hardware and Software Complete hardware and software information Detail asset change history Self defined properties to add additional information to the asset Self defined asset to add non-computer assets for standardize management

Remote Maintenance Real Time Maintenance View agents system messages in real time Remote diagnostic agents problems and check system status Remote Control Easy assist users and demonstrate system operation to users Remote File Transfer Remote file transfer help administrators to collect and update files more efficiently

IP-guard Multi- Language Easy Management Flexible Policy Classes System Support Multi- Language for multi-national corporation Can be managed by computer or by user. Each with multi-level grouping and audit trail Policies are set with combination of group inherited policy, normal policy, and offline policy Custom defined classes to be used throughout the system

Information Security Solution & Behavior Management Solution Monitor and control computer usage of employees. Plan network resources accordingly to ensure company resources are effectively used. Confidential information such as source codes, chemical formulas, and design blue prints are saved in documents. Therefore, document security is the core of information security.

Basic Architecture Server Module Console Module Agent Module

Common System Architecture Deployment

Minimum Requirement Agent Module Pentium III MB Memory 1G HDD OS Win NT4 Win2000 / XP Win2003 / Vista / Win 7 Server Module Pentium 4 2G 512MB Memory 200GB HDD OS Win2000 SP4 / XP SP2 Win2003 SP1 / Win 2008 Database SQL Server 2000 SP4 / 2005 SP1 / MSDE / 2005 /2008R2(Express) Console Module Pentium III 1G 256MB Memory 4G HDD OS Win2000 / XP Win2003 / Vista / Win 7

Major Clients in Government & Related Organization Independent Commission Against Corruption Hong Kong Jewellery and Jade Manufacturers Association The Treasury The Government of the Hong Kong Special Administrative Region

Major Clients in Hong Kong

John Manufacturing LtdDefond Group IDT International Limited Nine Dragons Paper (Holdings) Limited VTech Holdings Ltd China Aerospace International Holdings Ltd. Kowloon Engineering Ltd. GAM Hong Kong Limited NAM TAI ELECTRONIC & ELECTRICAL PRODUCTS LIMITED

Major Clients in China China Mobile Ltd. China Telecom Corporation Limited China Unicom Petro China Company Limited Hangzhou Wahaha Group Co., Ltd. China Aerospace Science and Technology Corporation (CASC)

Major Clients in China Kao (China) Holding Company Ltd. LIBY Group Co. Ltd. Shandong Xinhua Pharmaceutical Co., Ltd.

Major Clients in China Shanghai Metersbonwe Fashion and Accessories Co.,Ltd Beyond Home Textile

Thank You Thank you for your interest and support to our product You are welcome to raise any suggestions Contact