LANDesk Endpoint Security Audit 2.5

Slides:



Advertisements
Similar presentations
Confidential Information Disclosure Movable Storage · Instant Message · P2P Dialup · Printout Security Challenge of Computerized Corporation Stealing.
Advertisements

Auditing Microsoft Active Directory
Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in Acceleratio specializes in developing high-quality enterprise.
MICROSOFT PLATFORM  Microsoft is a platform company is committed to providing a rich ecosystem for building and managing connected systems.  Microsoft.
Access 2007 Product Review. With its improved interface and interactive design capabilities that do not require deep database knowledge, Microsoft Office.
Centrix Software Application discovery and management 8 November 2012 Richard Pegden Director of Product Marketing.
Secure Private Cloud Storage for Business. The Market Trend File Sharing Any Device Any Where Public clouds are good enough to personal users but security.
A Product of Corporate Instant Messenger Enterprise Communication and Collaboration with Secure Instant Messaging Copyright © ANGLER.
Sharepoint Portal Server Basics. Introduction Sharepoint server belongs to Microsoft family of servers Integrated suite of server capabilities Hosted.
SharePoint Portal Server 2003 JAMES WEIMHOLT WEIDER HAO JUAN TURCIOS BILL HUERTA BRANDON BROWN JAMES WEIMHOLT INTRODUCTION OVERVIEW IMPLEMENTATION CASE.
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
How Microsoft Office 2010 Works with Cloud Computing and Social Media.
Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in We create innovative software solutions for SharePoint,
Best Practices in Moodle Administration Best Practices in Moodle Administration A variety of topics from technical to practical Jonathan Moore Vice President.
Module 10 Configuring and Managing Storage Technologies.
AnyShare File Synchronization and Sharing for Enterprise
IT Academy Benefit Overview
systemhound © Raxco Software Belgium systemhound PC inventory software.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
AtomPark Software is founded in The head office is located in Saint-Petersburg, Russia. Company is officially registered in the United States. AtomPark.
SharePoint Services Indiana University Cory P. Retherford May 9 th, 2011.
Green Computing Sharing files to reduce printing.
70+ enterprise customers Customers in 15+ industry segments 6 million+ work hours analyzed alerts generated daily.
IMonitor EAM Employee Computer Surveillance Solution iMonitor Soft Co. Ltd., Tel: Skype : imonitor.support
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
Product Presentation. SysKit By Acceleratio Acceleratio Ltd. is a software development company based in Zagreb, Croatia, Europe founded in Technology.
Log in screen: Log into you class and log off at the end.
Jorke Odolphi Product Technology Specialist WebCentral Using Microsoft Operations Manager To Monitor And Maintain Your Farm.
Introduction TO Network Administration
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
Microsoft Partner Conference Integrated Innovation Don Kerr Partner Technology Specialist.
LDMS10 Preview. Ben Hall.
VITALE, CATURANO & COMPANY LTD Microsoft SharePoint Databases Overview VITALE, CATURANO & COMPANY LTD SharePoint Developer Series – SharePoint Database.
Chris Louloudakis Solution Specialist Identity & Access Management Microsoft Corporation SVR302.
OsMonitor Wangya Computer Co., Ltd. Employee Monitoring Software.
Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Cyberoam.
LANDesk Software Confidential Data Analytics LANDESK Day 5. March 2014 Jan Pisarik Technical Presales Manager.
Office Introduction BERNARD DADY Bernard Dady.
Office 365 Upsell Paths.
The Ultimate SharePoint Admin Tool
The time to address enterprise mobility is now
How Microsoft Office 2010 Works with Cloud Computing and Social Media
Microsoft Certification Paths
Upsell Small Business Customers to an Office 365 plan
Get to know SQL Manager SQL Server administration done right 
Unit 12 Using the Internet & Browsing the Web
What is SharePoint and why you should care
Soft1 Open Enterprise Edition Allows Customers to Easily Synchronize Files Using Microsoft Office 365 and Seamlessly Store Any Information in SharePoint.
Power BI Security Best Practices
RBS Remote Business Support System
Smart Org Charts in Microsoft Office 365: Securely Create, Collaborate, Edit, and Share Org Charts in PowerPoint and Online with OrgWeaver Software OFFICE.
Security Challenge form Computerized Corporation
Office 365 Enterprise Value
SPDocKit.
Office 365 September 07, 2016.
From home to business, from desktop to web and the devices in between, Office 2016 delivers the tools you need to get the work done, and you can get it.
Quick Comparison of workspaces
Get to know SysKit Monitor
Get Enterprise-Grade Call Handling and Control for Microsoft Office 365 and Skype for Business with the Bridge Boss-Admin Executive Console OFFICE 365.
PpT宝藏制作最新科技模版设计图案.
Encryption in Office 365 Shobhit Sahay Technical Product Manager
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
Security Challenge of Computerized Corporation
Microsoft Certification Paths
SPO Demos to Business Value Discussion Pillar Mapping
Employee Monitoring Solution
Comodo Dome Data Protection
IT Management, Simplified
IT Management, Simplified
Presentation transcript:

LANDesk Endpoint Security Audit 2.5 Danny Huang LANDesk Jan 2014

Increase Productivity What Endpoint Security Audit can do for you? IT Security Audit for enterprises Data Loss Tracking Critical file leak: Copy Print Email IM … Monitoring & Controlling Enforce Security Policy: USB Block Unsafe APP … User Behavior Checking Unrelated to work things Game Surf web IM chatting Stock trading Reduce Risks Enforce Policy Increase Productivity

Manage Security Audit Before Happening After LANDesk Desktop Management / Security / Audit Solutions Manage Security Audit Before Happening After LANDesk Management Suite LANDesk Security Suite LANDesk Security Audit

Logging user all operation Lifecycle Security Audit Turn ON User login Document Create, Edit, Delete… User logout Turn Off Logging user all operation Print, Copy… Game, Surf web, IM…

Document Application Operation Network 360° Security Audit Doc Audit - File operation - Print App Audit - App usage - Active Window Title - Screenshots Security Audit Document Application Operation Network Operation Audit - On/Off Login/Logout - USB Usage - Copy/ Paste Network Audit - Surf web - Email - IM chatting ESA Pro 3.0

Product roadmap ESA 1.x 2011-2012 ESA 2.x 2013-2014 ESA 3.x 2014-2016 Marketing Trial File Opt, Screenshot, Print Log Web Access Log Mail Log Critical File Read Log ESA 1.x 2011-2012 ESA 2.x 2013-2014 ESA 3.x 2014-2016 ESA 4.x 2015-2018 Application, Active Title Log Clipboard, USB Disk Log Logon/logoff, System Change Log Web Access Log (Trail) BYOD / Cloud Clients Mobile Device Audit Log

Get better understand how end user are using software. Software usage logging Get better understand how end user are using software.

Get better understand how end user are using their computers. Turn ON/OFF, Login/Logoff logging Get better understand how end user are using their computers. Work at weekends

Surf web logging Get better understand how end user are using network. Web title, URL, Port, time… Surf web logging, even not in Corp network

File name, folder, operation, time, user… File operation logging File name, folder, operation, time, user…

Get better understand how end user are using printer. Print logging Get better understand how end user are using printer. Doc name, printer name User, IP, Pages

Windows title, process name, time, user… Active window title logging Windows title, process name, time, user…

Application usage logging App name, time, version…

Screenshot logging

Screenshot logging Screenshot can be triggered by time, specified application. For example: only when end user use Skype will do screenshot. Can search picture content, high compressed picture save storage space. Picture can be showed as video, and can be exported. Web eMail IM Word

Screenshot logging Replay IM (Skype / QQ / MSN) chatting.

Screenshot logging Online video

Turn ON/OFF Login/Logout Logging Turn On, Login Lock screen, Login

System information change logging In another network Business trip… In different time zone, abroad… Change: Hostname, IP, Time zone…

USB device usage logging Get better understand how end user are using USB device. USB storage plug in/out Name and Type

Copy files from local and network drives Clipboard logging Copy files from local and network drives Copy Content File name, Content

IM chatting logging Chatting content User: From, To, Group File transfer

High light User abnormity behavior User abnormity behavior logging High light User abnormity behavior

User abnormity behavior logging Search by user, IP, keyword and export to CSV files All behavior relate to the keyword“QQ”

Create queries by different parameters Log query Create queries by different parameters

Alert rule、email template, User abnormity behavior alert Alert rule、email template, Alert admin by email

Watching movie in work time IM Chatting in work time User abnormity behavior alert email Watching movie in work time IM Chatting in work time

Individual enable/disable logging Move to different groups Multiple logging rule for different BU/User Individual enable/disable logging Move to different groups

Up to 10000 nodes, low net work usage Support multiple file servers Use different logging rule to lower net work usage

LANDesk ESA topologic ESA File Servers All log keep in DB/file server PC / NC Notebook logging ESA File Servers Desktop management Audit log Client Core Server All log keep in DB/file server Support up to 10000 clients Desktop management ESA console LDMS console

Supported platforms Server: Client: Support language : Windows Server 2008 R2 or higher SQL Server 2005SP3 / 2008 R2 or higher .NET Framework 4.0 or higher Client: Windows XP / Vista / Windows 7 / 8 Support language : Server:English / Japanese / Chinese Client: English / Japanese / Chinese

Medalsoft Consulting Services Profile: Founded: 2011 CAGR: 25% Shanghai: 25+ people, Shenzhen Branch: 10+ people Tokyo Office: 2+ people Target: To be a top 10 professional solution provider in Cloud Computer area in China. To be listed in OTC SH within 3-5 years Products & Solutions: SharePoint / Office 365 Consulting Services & Apps BPM Consulting Services ESA & ITAM & ITSM Solutions (LANDesk) Clients & Partners: 100+ Clients Customer Satisfaction: 99% Microsoft, LANDesk, Kingsoft (China), FlowPotal BPM (China), Clover-Sun (Japan)

Our Products & Solutions Enterprise Information Portal (SharePoint & SharePoint Online) EIP Medalsoft BPM ITIL IT Asset Management IT Service Management Endpoint Security Audit - PC Operation Logs Business Process Management

Work with LANDesk Endpoint Security Audit: Asset Lifecycle Management: Released ESA 2.x version. Won more than 10+ clients (20000 nodes+) in China. More than RMB2,000,000 revenue contributed indirectly. Technical Support to Japan team & South Asia team. Asset Lifecycle Management: More than 10+ ALM projects delivered. More than RMB3,000,000 revenue contributed indirectly. Delivered Almost 80% ALM projects in China. Management Suite: More than 50+ LDMS projects’ support provided. More than 10+ projects delivered (Customization Development). Technical support to South China & East China teams Service Desk: Started LDSD Consulting Services from 2013 Started one LDSD project in 2013