IP-guard www.ip-guard.com.

Slides:



Advertisements
Similar presentations
This course is designed for system managers/administrators to better understand the SAAZ Desktop and Server Management components Students will learn.
Advertisements

Confidential Information Disclosure Movable Storage · Instant Message · P2P Dialup · Printout Security Challenge of Computerized Corporation Stealing.
NetWatcher NetGuarder NetWatcher Introduction - Boost Enterprise Efficiency Dramatically
Outpost Office Firewall Product presentation. What is Outpost Office Firewall? Software firewall solution designed especially to meet small and medium.
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
Page 1 / 18 Internet Traffic Monitor IM Page 2 / 18 Outline Product Overview Product Features Product Application Web UI.
Welcome to the Award Winning Easiest to Use & Most Advanced View, Manage, and Control Security, Access Control, Video, Energy & Lighting Systems, & Critical.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
ESafe Reporter V3.0 eSafe Learning and Certification Program February 2007.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Optimizing Windows Vista Performance Lesson 10. Skills Matrix Technology SkillObjective DomainObjective # Introducing ReadyBoostTroubleshoot performance.
Operating System Customization
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 11: Monitoring Server Performance.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
Maintaining and Updating Windows Server 2008
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
Norman SecureSurf Protect your users when surfing the Internet.
Welcome To. Improving Remote File Transfer Speeds By The Solution For: %
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
SOE and Application Delivery Gwenael Moreau, Abbotsleigh.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
eScan Total Security Suite with Cloud Security
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in We create innovative software solutions for SharePoint,
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Surveillance Equipment For Internet Activities It is a Internet activities surveillance equipment designed for sniffer package from networking, converter.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 5 Windows XP Professional McGraw-Hill.
Managing and Monitoring Windows 7 Performance Lesson 8.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Module 7: Fundamentals of Administering Windows Server 2008.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
Windows Vista Inside Out Chapter 22 - Monitoring System Activities with Event Viewer Last modified am.
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
Module 9: Preparing to Administer a Server. Overview Introduction to Administering a Server Configuring Remote Desktop to Administer a Server Managing.
The ProactiveWatch Monitoring Service. Are These Problems For You? Your business gets disrupted when your IT environment has issues Your employee and.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
Network Security & Accounting
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
NetTech Solutions Protecting the Computer Lesson 10.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Cyberoam.
ITMT 1371 – Window 7 Configuration 1 ITMT Windows 7 Configuration Chapter 8 – Managing and Monitoring Windows 7 Performance.
Maintaining and Updating Windows Server 2008 Lesson 8.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Information Technology Acceptable Use An Overview
Managing Windows Security
Trend Micro Consumer 2010 Easy. Fast. Smart.
Securing the Network Perimeter with ISA 2004
Security Challenge form Computerized Corporation
Chapter 6 Purchasing and Maintaining a Computer
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
Outline Overview Development Tools
PpT宝藏制作最新科技模版设计图案.
Security Challenge of Computerized Corporation
Part 3.
Designing IIS Security (IIS – Internet Information Service)
Comodo Dome Data Protection
Presentation transcript:

IP-guard www.ip-guard.com

Contents Brief Introduction 1 14 Modules of IP-guard 2 Solutions 3 Components and Basic System Architecture 4

Security Challenges form Computerized Corporation Data-Stealing spyware, illegal intrusion, hacker… Data Disclosure Removable storage device, email, P2P Application, printing… Security Risks system vulnerability, virus attack, malicious deletion or modification Creative design, VIP customer information, sensitive financial data …

Drawbacks of Information Technology Play games · Trade Stocks · Chat Online Browse Web Pages · Print Personal Stuffs Online Movies · Radio · Download Music Cannot Troubleshoot Remote Computer Cannot Track Computer Assets Changes Administrator Faces Heavy Workload

The significance of Protecting Intranet Security To resist external risks To prevent internal breaches Virus Intranet Security Management Firewall Hacker Firewall Corporation Intranet Security Management Anti-virus Software Malware

The Core Values of IP-guard Protect data security; Safeguard intellectual property. Effective and Comprehensive Management Adjust employee behavior; Improve work efficiency. Centrally manage system; Keep system stable.

Contents Brief Introduction 1 14 Modules of IP-guard 2 Solutions 3 Components and Basic System Architecture 4

Be selected optionally. 14 Modules of IP-guard Application Management Website Management Bandwidth Management Network Management Screen Monitoring Remote Maintenance IT Asset Management Basic Management Document Management Print Management Device Management Removable Storage Management Email Management Instant Messaging Management IP-guard Be composed freely; Be selected optionally.

Basic Management Module Basic and essential module of IP-guard. It’s a mandatory module. Basic Events Log Record computer startup, logon, logoff, shutdown to check when do your employee start working and what time do they leave their workstations Basic Control Remotely lock, log off, restart and turn off agent computers to manage computers or stop illegal operations Basic Policy Block users from randomly modify system setting in order to prevent accidental and intentional destruction and improve system security. test

Basic Management Module - Basic Policy Control Panel Computers Management System Network IP/Mac Binding ActiveX Others

Document Management Module Control and monitor document actions to safeguard intellectual property Document Control Effectively control document actions to prevent unauthorized actions, malicious modification and deletion. Document Backup Back up documents before they are modified or deleted to make sure the security of important documents Document Logging Record document actions in detail Record document actions of any computer on shared documents

Document Management Module – Document Policy Document Control By file name By operation type By disk type By application

Print Management Print Control Print Logging Print Backup Monitor file printing to prevent data leakage Print Control Control printing permission to prevent data leakage Reasonably assign print resource to stop wasting print resource Print Logging Record print actions in detail for administrator to evaluate the effective usage of print resource Print Backup Back up the image of printed file

Print Management - Print Control By printer type By application By Printer name

Device Management Device Control Control and monitor the usage of various devices to prevent data leakage Device Control Block external devices from connecting to the intranet to protect data security and stop data breaches Detailed and specific control

Device Management - List of Controlled Device Storage Devices Floppy, CDROM, Burning Device, Tape, Removable Storage Device Communications Devices COM, LTP, Bluetooth, Infrared, SCSI Controller, etc. Dialup Dial-up Connection USB Devices USB hard disk, USB CDROME、USB LAN Adapter, USB Image Device, etc. Network Devices Wireless LAN Adapter, Virtual LAN Adapter, PnP Adapter (USB, PCAMCIA) Others Audio device, Virtual LAN Adapter Any added new devices

Removable Storage Management Authorize and encrypt removable storage device to protect your valuable data anywhere at anytime. Permission Control Strictly control file in motion to protect data Automatic Encryption & Decryption Automatically encrypt data when files are written to any removable storage device to enhance the security level of data in motion Whole Disk Encryption Format corporate removable storage device as encrypted removable storage device. Automatically encrypt and decrypt data stored on the encrypted removable storage device within the corporate environment. * NOTE: Encrypted removable storage device only can be used within the corporate environment

Email Management Email Control Email Logging Control and monitor incoming and outgoing emails to prevent data leakage Email Control Block sending specified POP3/SMTP emails or Exchanges emails out of the organization via email to prevent data leakage Email Logging Fully record sender, recipient, subject, text and attachment Support POP3/SMTP email, Exchange email, webmail, and Lotus email

Instant Messaging Management Control and monitor instant messaging to safeguard data security and improve work efficiency IM Logging Completely record instant messages, participants, time to prevent data leaking out via IM applications File Transfer Control Block sending files out of the corporation over limited size or with limited file names File Backup Back up transferred file

Application Management Control and monitor application usage to improve work efficiency Application Statistics Gather statistics by category, name, detail and group to let you know your employee’s work performance Application Control Filter non-work related applications to make your employees concentrate on work business Block malicious application to protect computer security Application Log Record application start, stop, window switch to track the application activity of staff

Application Management – Application Statistics Gather statistics by category Gather statistics by name Gather statistics by detail Gather statistics by group

Website Management Website Statistics Website Management Website Log Record staff’s web browsing activities; limit web site access right to regulate staff’s online activity Website Statistics Gather statistics by different ways to let you know your staff’s web browsing activity Website Management Filter non-work related websites during a specified time period Block malicious and inappropriate websites Website Log Record the URL, caption, and time of the visited websites to track what your staff were browsing during office hours

Website Management – Website Statistics Gather statistics by category Gather statistics by detail Gather statistics by group

Bandwidth Management Traffic Statistics Bandwidth Control Limit and control bandwidth to avoid any bandwidth abuse Traffic Statistics Gather statistics by different ways to assist administrator to analyze traffic consumption Bandwidth Control Limit bandwidth by IP address or port to help administrator reasonably assign various bandwidth to different users Limit BT download, online video watching to make sure that you have sufficient bandwidth for business use

Bandwidth Management -Traffic Statistics

Network Management Network Control Network Intrusion Detection Prevent unauthorized external computers from accessing internal network Network Control Offer firewall function and block unauthorized computer from communication with internal computers in order to protect intranet security Network Intrusion Detection Scan the whole network to immediately stop unauthorized computers from connecting to the internal network so as to safeguard information security

Screen Monitoring Screen Monitoring Screen Record Record and replay screen snapshot to let you know what your employees do step by step Screen Monitoring View the real-time desktop screen of any computer Monitor computers with multi displays Centrally monitor multi computers at one time Screen Record Completely record screen history for your latter review Set different intervals to capture screen snapshot when different application are being used so as to pay attention to risky applications Can save a lot of screen snapshots due to effective compression Screen history can be exported to wmv format.

Remote Maintenance Remote Troubleshooting Remote Control Support remote maintenance so as to let you shorten the downtime and quickly solve the system problem Remote Troubleshooting Check the real-time running processes of client computers Remotely analyze the running status, system fault and device status of client computers Remote Control Perform remote assistance or demonstrate operational instruction Remote File Transfer Remotely transfer files from remote computers to local computer, and from local computer to remote computers in order to quickly gather fault samples to diagnose the problem and update files

Remote Maintenance - Maintenance Centrally view the running status of any remote computer through IP-guard console

IT Asset Management Easily manage IT asset to reduce management cost Asset Information Automatically collect software and hardware information and provide asset inventory to facilitate administrator’s management Offer non-IT asset management function Asset Change Record software and hardware changes in detail Instant alert on asset changes

IT Asset Management Vulnerability Management Patch Management Automatically scan system vulnerability of agent computer and provide easy-to-read report and solutions Patch Management Check Microsoft for new patches at regular intervals Automatically download and deploy new patches to agent computers Software Deployment Deploy files and programs with ease Support breakpoint transmission to facilitate background installation and interactive installation

Contents Brief Introduction 1 14 Modules of IP-guard 2 Solutions 3 Components and Basic System Architecture 4

Data Loss Prevention Solution Instant Messaging Management Email Document Data Security Management Screen Monitoring Network Device Print Removable Storage Management

Data Loss Prevention Solution Pre-Control In-Control Post-Control When unpermitted actions trigger the policies, actions will be immediately blocked so as to protect data security. Based on business and management needs to set specific policies All activities on computer are recorded in logs and in other formats.

Data Loss Prevention Solution Pre-Control Based on business and management needs to set specific policies

Data Loss Prevention Solution General Control Document Management Print Management Email Management Instant Messaging Management Device Management In-Control Offline Control Policies are still effective when computers are offline in order to always protect data security. When unpermitted actions trigger the policies, actions will be immediately blocked so as to protect data security. Document Backup * Back up original files before they are modified or deleted * Back up files before they are sent out of the company Transparent Removable Storage Encryption and Document Encryption Active defense. Maximumly safeguard data security.

Data Loss Prevention Solution Record document actions Record printed files Record print actions Post-Control Record the usage of removable storage device Record email content and attachment Record both incoming and outgoing emails All activities on computer are recorded in logs and in other formats. Back up transferred files Instant message logging Real-time screen snapshot screen snapshot history

Customer Benefits Avoid lawsuit and data leakage risks Raise the core competitive power of enterprise Improve the reputation of enterprise

Employee Activity Management Solution Device Management Application Management Control device usage Control application usage Gather statistics on application usage Record application activity Screen Monitoring Bandwidth Management Activity Management Real-time screen snapshot Screen snapshot history Control bandwidth usage Gather statistics on traffic consumption Website Management Network Management Filter unwanted websites Gather statistics on websites visited Record websites visited Control network communications Detect intrusion

Employee Activity Management Manage employee’s online and computer activity

Employee Activity Management Instant Warning Message Optionally do NOT compulsively block users using gaming applications, browsing shopping websites, sending private emails, and much more. But when they are doing non-work related things, warning messages can be automatically sent to users. Warning messages help them comply with the company policy. Powerful Control Function This solution not only can allow or block specified employees from using specified application, email, removable media and other things, but also can control employees’ activity by customized group during different time periods.

Customer Benefits Adjust employees’ work behavior to improve work efficiency Avoid network abuse and network choking to make sure that there is enough bandwidth to support the smooth development of key business

Systems Management Solution System Management IT Asset Management Remote Control Software & hardware Management Patch Management Vulnerability Management Software Deployment Remote Troubleshooting Remote Control Remote File Transfer

Customer Benefits Get a grip on your IT inventory Make quick response to system faults Greatly improve system administrators’ work efficiency Maintain system stability and enforce system security

Contents Brief Introduction 1 14 Modules of IP-guard 2 Solutions 3 Components and Basic System Architecture 4

Components of IP-guard Console Server View data Set policy Perform real-time maintenance Store data Manage policy Agent Collect data Execute policy

System Architecture

System Requirements Requirements Database Agent Server Console Components Requirements Database SQL Server 2000 SP4, MSDE SP4, SQL Server 2005 SP1, SQL Server 2005 Express SP1 Agent OS Supported Microsoft Vista, 2003, XP, 2000, Me, and 98 Recommended CPU: Pentium® 4 RAM: 512MB Free disk space: 1GB Server Microsoft Windows Vista, 2003 SP1, XP SP2, and 2000 SP4 CPU: Dual Core or Quad Core RAM: 2GB Free space: 60GB Console Microsoft Windows Vista, 2003, XP, and 2000 CPU: Pentium 4 Free space: 1GB

Installation Server Installation Agent Installation Generally, sever is installed on a server-class computer with high performance and a lot of free disk space. The server computer should use the Operating System which IP-guard server is supported. Agent Installation Agents are installed on the computers you want to monitor or manage. * Manually direct installation * Remote Installation * Logon Script Installation Console Installation Consoles are installed on manager and supervisor’s computers.

Conclusion 1 2 3 What is IP-guard? How IP-guard can help corporations? Why choose IP-guard?

Thank You !