Confidential Information Disclosure Movable Storage · Email Instant Message · P2P

  • Upload
    unity

  • View
    31

  • Download
    0

Embed Size (px)

DESCRIPTION

Stealing Information Spy ware Illegal Access Hacker tools. Confidential Information Disclosure Movable Storage · Email Instant Message · P2P Dialup · Printout. Potential Security Risks System patches and vulnerabilities Virus Malice delete and changes. Core Product Design - PowerPoint PPT Presentation

Citation preview

  • Security Challenge of Computerized Corporation

  • Drawbacks of Information Technology

  • IP-guard Desktop Management System IP-guardCore Value

  • Different Modules Suit for Different Corporations Needs

  • Document Operation Management Document Operation Logs Record document operations including create, access, Edit, Copy, Move, Delete Record document operations on movable storages and network paths Record document operations of other computers on documents in local shares Document Policy Control access of key documents Prevent illegal copy to movable storages and network Backup important document after edit or delete

  • Removable Storage Management Removable Storage device File/Full Disk Encryption / Decryption Removable Storage devices Authorization uses only the authorized devices can encrypt and decrypt the files computers without authorization cannot open the encrypted file properly

  • Application Management Application logs and statistic Record application startup and shut down Record window changes and title changes to track computer usage Application statistic to estimate staffs efficiency Application Policy Stop games and chat programs Stop malice programs

  • Website ManagementWeb StatisticSummarized types of website visited to estimate Internet usageWeb LogsRecord website URL and title in detailWeb PolicyBlock websites irrelevant to workBlock websites with harmful messages

  • EMail Management EMail Record Record normal email, webmail, exchange, and Lotus Notes mail. Record complete email message and attachments EMail Policy Limit sender accounts Block specific recipients Block email with attachment of specific file name or exceed certain size

  • Instant Message ManagementInstant Message RecordRecord full content of the IM sessionIM File PolicyLimit outgoing file name or file typeLimit outgoing file size Backup outgoing files

  • Printing Management Print Logs Record information on printing application, printer, user and document name Record pages printed to estimate usage Printing Policy Block Illegal application from printing Block printing on specific printer Backup printed out document in JPEG format

  • Screen Snapshot Real Time Monitoring View agent screen in real time Support multi-monitors Multi-screen function to view several computer at one time Snapshot History Completely record screen history for future analyze Set different snapshot frequency on different application to focus on some sensitive information Optimized storage by compression

  • Device Management Storage Control Control usage of storage (Floppy CD USB Movable storage Memory card ...) Communication Device Control Control data transfer to external ports or devices (Serial port Parallel port MODEM Infrared Bluetooth Direct connection Dialup) Other Device Control Control USB devices, Wireless card, or other new devices.

  • Network Control Network Communication Control Provide firewall functions to control communication of specific address and port Eliminate the use of specific port and communicate with unauthorized computers IP/MAC BindingPrevent users from changing network setting Intrusion DetectionScan the whole network and prevent illegal access to the network

  • Bandwidth Management Network Traffic Statistic Show network traffic statistic by IP Show network traffic statistic by ports Analyze data in specific time zone Network Traffic Policy Assign different bandwidth to different IP and ports Prevent BTP2Pnetwork media, and download tools to use up network resources

  • Asset Management Manage Hardware and Software Complete hardware and software information Detail asset change history Self defined properties to add additional information to the asset Self defined asset to add non-computer assets for standardize management

  • Remote Maintenance Real Time Maintenance View agents system messages in real time Remote diagnostic agents problems and check system status Remote Control Easy assist users and demonstrate system operation to users Remote File Transfer Remote file transfer help administrators to collect and update files more efficiently

  • IP-guardMulti-LanguageEasy ManagementFlexible PolicyClasses SystemCan be managed by computer or by user. Each with multi-level grouping and audit trailPolicies are set with combination of group inherited policy, normal policy, and offline policyCustom defined classes to be used throughout the system

  • Information Security Solution & Behavior Management SolutionMonitor and control computer usage of employees. Plan network resources accordingly to ensure company resources are effectively used.Confidential information such as source codes, chemical formulas, and design blue prints are saved in documents. Therefore, document security is the core of information security.

  • Basic ArchitectureServer ModuleConsole ModuleAgent ModuleAgent Module

  • Common System Architecture Deployment

  • Minimum Requirement

  • Major Clients in Government & Related OrganizationIndependent Commission Against Corruption Hong Kong Jewellery and Jade Manufacturers AssociationThe Treasury The Government of the Hong Kong Special Administrative Region

  • Major Clients in Hong Kong

  • Major Clients in Hong KongJohn Manufacturing Ltd Defond Group IDT International Limited Nine Dragons Paper (Holdings) Limited VTech Holdings Ltd China Aerospace International Holdings Ltd. Kowloon Engineering Ltd.GAM Hong Kong Limited NAM TAI ELECTRONIC & ELECTRICAL PRODUCTS LIMITED

  • Major Clients in ChinaChina Mobile Ltd.China Telecom Corporation Limited China UnicomPetro China Company Limited Hangzhou Wahaha Group Co., Ltd. China Aerospace Science and Technology Corporation (CASC)

  • Major Clients in ChinaKao (China) Holding Company Ltd.LIBY Group Co. Ltd.Shandong Xinhua Pharmaceutical Co., Ltd.

  • Major Clients in ChinaShanghai Metersbonwe Fashion and Accessories Co.,Ltd Beyond Home Textile

  • Thank YouThank you for your interest and support to our productYou are welcome to raise any suggestions www.ip-guard.comContact email: [email protected]