Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security Challenge of Computerized Corporation

Similar presentations


Presentation on theme: "Security Challenge of Computerized Corporation"— Presentation transcript:

1

2 Security Challenge of Computerized Corporation
Stealing Information Spy ware Illegal Access Hacker tools Confidential Information Disclosure Movable Storage · Instant Message · P2P Dialup · Printout Potential Security Risks System patches and vulnerabilities Virus Malice delete and changes Core Product Design Key Customer Information Sensitive Financial Information

3 Drawbacks of Information Technology
Play games · Trade Stocks · Chat Online Browse Web Pages · Print Personal Stuffs Online Movies · Radio · Download Music Cannot Troubleshoot Remote Computer Cannot Track Computer Assets Changes Administrator Faces Heavy Workload

4 IP-guard Desktop Management System
Protect Information Limit Activities IP-guard Core Value Control Information Plan Resources

5 Different Modules Suit for Different Corporations Needs
Document Operation Management Printing Management Device Management Network Control Application Management Website Management Management Instant Message Management Screen Snapshots Bandwidth Management Asset Management Remote Maintenance Removable Storage Management

6 Document Operation Management
Document Operation Logs Record document operations including create, access, Edit, Copy, Move, Delete Record document operations on movable storages and network paths Record document operations of other computers on documents in local shares Document Policy Control access of key documents Prevent illegal copy to movable storages and network Backup important document after edit or delete

7 Removable Storage Management
Removable Storage device File/Full Disk Encryption / Decryption Removable Storage devices Authorization uses only the authorized devices can encrypt and decrypt the files computers without authorization cannot open the encrypted file properly

8 Device Management Storage Control Communication Device Control
Control usage of storage (Floppy· CD· USB· Movable storage· Memory card ...) Communication Device Control Control data transfer to external ports or devices (Serial port· Parallel port· MODEM· Infrared· Bluetooth· Direct connection· Dialup) Other Device Control Control USB devices, Wireless card, or other new devices.

9 Application Management
Application logs and statistic Record application startup and shut down Record window changes and title changes to track computer usage Application statistic to estimate staffs efficiency Application Policy Stop games and chat programs Stop malice programs

10 Website Management Web Statistic Web Logs Web Policy
Summarized types of website visited to estimate Internet usage Web Logs Record website URL and title in detail Web Policy Block websites irrelevant to work Block websites with harmful messages

11 EMail Management EMail Record EMail Policy
Record normal , webmail, exchange, and Lotus Notes mail. Record complete message and attachments Policy Limit sender accounts Block specific recipients Block with attachment of specific file name or exceed certain size

12 Instant Message Management
Instant Message Record Record full content of the IM session IM File Policy Limit outgoing file name or file type Limit outgoing file size Backup outgoing files

13 Printing Management Print Logs Printing Policy
Record information on printing application, printer, user and document name Record pages printed to estimate usage Printing Policy Block Illegal application from printing Block printing on specific printer Backup printed out document in JPEG format

14 Screen Monitoring Real Time Monitoring Snapshot History
View agent screen in real time Support multi-monitors Multi-screen function to view several computer at one time Snapshot History Completely record screen history for future analyze Set different snapshot frequency on different application to focus on some sensitive information Optimized storage by compression

15 Network Control Network Communication Control IP/MAC Binding
Provide firewall functions to control communication of specific address and port Eliminate the use of specific port and communicate with unauthorized computers IP/MAC Binding Prevent users from changing network setting

16 Bandwidth Management Network Traffic Statistic Network Traffic Policy
Show network traffic statistic by IP Show network traffic statistic by ports Analyze data in specific time zone Network Traffic Policy Assign different bandwidth to different IP and ports Prevent BT,P2P,network media, and download tools to use up network resources

17 Asset Management Manage Hardware and Software
Complete hardware and software information Detail asset change history Self defined properties to add additional information to the asset Self defined asset to add non-computer assets for standardize management

18 Remote Maintenance Real Time Maintenance Remote Control
View agents’ system messages in real time Remote diagnostic agent’s problems and check system status Remote Control Easy assist users and demonstrate system operation to users Remote File Transfer Remote file transfer help administrators to collect and update files more efficiently

19 IP-guard Multi-Language Easy Management Flexible Policy Classes System
Support Multi-Language for multi-national corporation Can be managed by computer or by user. Each with multi-level grouping and audit trail Policies are set with combination of group inherited policy, normal policy, and offline policy Custom defined classes to be used throughout the system

20 Information Security Solution & Behavior Management Solution
Confidential information such as source codes, chemical formulas, and design blue prints are saved in documents. Therefore, document security is the core of information security. Monitor and control computer usage of employees. Plan network resources accordingly to ensure company resources are effectively used.

21 Basic Architecture Server Module Agent Module Agent Module
Console Module

22 Common System Architecture Deployment

23 Minimum Requirement Agent Module Console Module Server Module
Pentium III 500 128MB Memory 1G HDD OS Win 2000 / XP Win 2003 / 08 / 12 Vista /Win 7 /8 /10 Console Module Pentium III 1G 256MB Memory 4G HDD OS Win 2000 / XP Win 2003 / 08 12 / Vista / Win 7 / 8 / 10 Server Module Pentium 4 2G 512MB Memory 200GB HDD OS Win2000 / XP / 2003 / 08 12 / Vista / 7 / 8 / 10 Database SQL Server 2000 / MSDE 2005 / 2008 / 2012/ 2014 (Express)

24 Major Clients in Government & Related Organization
Independent Commission Against Corruption Hong Kong Jewellery and Jade Manufacturers Association The Treasury The Government of the Hong Kong Special Administrative Region

25 Major Clients in Hong Kong

26 Major Clients in Hong Kong
Defond Group John Manufacturing Ltd Nine Dragons Paper (Holdings) Limited IDT International Limited VTech Holdings Ltd Kowloon Engineering Ltd. China Aerospace International Holdings Ltd. GAM Hong Kong Limited NAM TAI ELECTRONIC & ELECTRICAL PRODUCTS LIMITED

27 Major Clients in China China Telecom Corporation Limited
China Mobile Ltd. China Unicom Petro China Company Limited Hangzhou Wahaha Group Co., Ltd. China Aerospace Science and Technology Corporation (CASC)

28 Major Clients in China Shandong Xinhua Pharmaceutical Co., Ltd.
Kao (China) Holding Company Ltd. LIBY Group Co. Ltd.

29 Major Clients in China Shanghai Metersbonwe Fashion and Accessories Co.,Ltd Beyond Home Textile

30 Thank you for your interest and support to our product
You are welcome to raise any suggestions Thank You! Contact


Download ppt "Security Challenge of Computerized Corporation"

Similar presentations


Ads by Google