PowerPoint Template - IP

Download Report

Transcript PowerPoint Template - IP

Security Challenge of Computerized Corporation
Confidential Information
Disclosure
Movable Storage · Email
Instant Message · P2P
Dialup · Printout
Stealing
Information
Spy ware
Illegal Access
Hacker tools
Core Product Design
Key Customer
Information
Sensitive Financial
Information
Potential Security Risks
System patches and
vulnerabilities
Virus
Malice delete and changes
Drawbacks of Information Technology
Play games · Trade Stocks · Chat Online
Browse Web Pages · Print Personal Stuffs
Online Movies · Radio · Download Music
Cannot Troubleshoot Remote Computer
Cannot Track Computer Assets Changes
Administrator Faces Heavy Workload
IP-guard Desktop Management System
Protect Information
IP-guard
Core Value
Limit Activities
Control Information
Plan Resources
Different Modules Suit for Different Corporations Needs
Document Operation
Management
Printing Management
Network Control
Application Management
Website Management
Instant Message
Management
Screen Snapshots
E-Mail Management
Bandwidth
Management
Asset Management
Removable Storage
Management
Device Management
Remote
Maintenance
Document Operation Management
• Document Operation Logs
• Record document operations including create, access, Edit, Copy, Move,
Delete
• Record document operations on movable storages and network paths
• Record document operations of other computers on documents in local
shares
• Document Policy
• Control access of key documents
• Prevent illegal copy to movable storages and network
• Backup important document after edit or delete
Removable Storage Management
• Removable Storage device File/Full Disk
Encryption / Decryption
• Removable Storage devices Authorization
uses
• only the authorized devices can encrypt
and decrypt the files
• computers without authorization cannot
open the encrypted file properly
Application Management
• Application logs and statistic
• Record application startup and shut down
• Record window changes and title changes to track
computer usage
• Application statistic to estimate staffs efficiency
• Application Policy
• Stop games and chat programs
• Stop malice programs
Website Management
• Web Statistic
• Summarized types of website visited to estimate
Internet usage
• Web Logs
• Record website URL and title in detail
• Web Policy
• Block websites irrelevant to work
• Block websites with harmful messages
EMail Management
• EMail Record
• Record normal email, webmail, exchange, and Lotus Notes mail.
• Record complete email message and attachments
• EMail Policy
• Limit sender accounts
• Block specific recipients
• Block email with attachment of specific file name or exceed
certain size
Instant Message Management
• Instant Message Record
• Record full content of the IM session
• Limit outgoing file name or file type
• Limit outgoing file size
• Backup outgoing files
Instant message
• IM File Policy
Printing Management
• Print Logs
• Record information on printing application, printer, user and
document name
• Record pages printed to estimate usage
• Printing Policy
• Block Illegal application from printing
• Block printing on specific printer
• Backup printed out document in JPEG format
Screen Snapshot
• Real Time Monitoring
• View agent screen in real time
• Support multi-monitors
• Multi-screen function to view several computer at one time
• Snapshot History
• Completely record screen history for future analyze
• Set different snapshot frequency on different application to
focus on some sensitive information
• Optimized storage by compression
Device Management
• Storage Control
• Control usage of storage
(Floppy· CD· USB· Movable storage· Memory card ...)
• Communication Device Control
• Control data transfer to external ports or devices
(Serial port· Parallel port· MODEM· Infrared· Bluetooth· Direct
connection· Dialup)
• Other Device Control
Control USB devices, Wireless card, or other new devices.
Network Control
• Network Communication Control
• Provide firewall functions to control communication of specific
address and port
• Eliminate the use of specific port and communicate with
unauthorized computers
• IP/MAC Binding
•Prevent users from changing network setting
• Intrusion Detection
•Scan the whole network and prevent illegal access to the
network
Bandwidth Management
• Network Traffic Statistic
• Show network traffic statistic by IP
• Show network traffic statistic by ports
• Analyze data in specific time zone
• Network Traffic Policy
• Assign different bandwidth to different IP and ports
• Prevent BT,P2P,network media, and download tools to
use up network resources
Asset Management
• Manage Hardware and Software
• Complete hardware and software
information
• Detail asset change history
• Self defined properties to add additional
information to the asset
• Self defined asset to add non-computer
assets for standardize management
Remote Maintenance
• Real Time Maintenance
• View agents’ system messages in real time
• Remote diagnostic agent’s problems and check
system status
• Remote Control
• Easy assist users and demonstrate system
operation to users
• Remote File Transfer
• Remote file transfer help administrators to collect
and update files more efficiently
IP-guard
MultiLanguage
Support MultiLanguage for
multi-national
corporation
Easy
Management
Flexible
Policy
Classes
System
Can be managed by
computer or by user.
Each with multi-level
grouping and audit
trail
Policies are set with
combination of
group inherited
policy, normal policy,
and offline policy
Custom
defined classes
to be used
throughout the
system
Information Security Solution &
Behavior Management Solution
Confidential information such as source codes, chemical formulas, and
design blue prints are saved in documents. Therefore, document
security is the core of information security.
Monitor and control computer usage of
employees. Plan network resources
accordingly to ensure company resources
are effectively used.
Basic Architecture
Server
Module
Agent
Module
Agent
Module
Console
Module
Common System Architecture Deployment
Minimum Requirement
Console Module
Agent Module
•
•
•
•
Pentium III 500
128MB Memory
1G HDD
OS
Win NT4
Win2000 / XP
Win2003 / Vista /
Win 7
•
•
•
•
Pentium III 1G
256MB Memory
4G HDD
OS
Win2000 / XP
Win2003 / Vista /
Win 7
Server Module
•
•
•
•
Pentium 4 2G
512MB Memory
200GB HDD
OS
Win2000 SP4 / XP SP2
Win2003 SP1 / Win 2008
• Database
SQL Server 2000 SP4 /
2005 SP1 / MSDE /
2005 /2008R2(Express)
Major Clients in Government & Related Organization
Independent Commission
Against Corruption
The Treasury
The Government of the Hong Kong Special
Administrative Region
Hong Kong Jewellery and Jade
Manufacturers Association
Major Clients in Hong Kong
Major Clients in Hong Kong
Defond Group
John Manufacturing Ltd
Nine Dragons Paper
(Holdings) Limited
IDT International Limited
VTech Holdings Ltd
Kowloon Engineering Ltd.
China Aerospace International Holdings Ltd.
GAM Hong Kong Limited
NAM TAI ELECTRONIC & ELECTRICAL PRODUCTS LIMITED
Major Clients in China
China Mobile Ltd.
China Telecom Corporation
Limited
China Unicom
Petro China Company Limited
Hangzhou Wahaha Group Co., Ltd.
China Aerospace Science and Technology Corporation (CASC)
Major Clients in China
Shandong Xinhua Pharmaceutical Co., Ltd.
Kao (China) Holding Company Ltd.
LIBY Group Co. Ltd.
Major Clients in China
Shanghai Metersbonwe Fashion and Accessories Co.,Ltd
Beyond Home Textile
Thank you for your interest and support to
our product
You are welcome to raise any suggestions
www.ip-guard.com
Thank You!
Contact email: [email protected]