Network GRC Delivery

259 views
230 views

Published on

Guardware GRC software explained

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
259
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
8
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • As society becomes increasingly connected so professional service firms have to adapt to and take advantage of the business benefits of online communication, connectivity and collaboration.
  • This change is accelerating, its scope is broadening and its impact is global. Clients are more demanding, regulatory pressures are escalating, competition is fierce and recruitment is increasingly difficult.
  • Our society is hooked on all-pervasive, always-on connectivity. The boundaries between work, social and leisure time are becoming nonexistent. The Internet, camera phones, VOIP, instant messaging, social networking and PDAs are used by an increasing number of us in our daily lives for work, social and leisure activities.
  • For most of us, not having online access would severely impact our productivity. For a growing percentage, full time, instant, multi-device connectivity is mission critical. For law firms connectedness provides a huge competitive advantage particularly if governed by an ITC Acceptable Use Policy which is integrated into its business vision and strategy.
  • At the same time workplace demographics are changing as less Internet savvy baby boomers retire and a new generation of knowledge workers, who have never known a world without the internet, Google, Facebook, YouTube, text messaging and camera phones join and progress through the workforce.
  • In order to compete for this valuable talent base law firms have to offer an always on, connected, collaborative environment which supports the way in which the “everyone, everything, everywhere connected” generation live and work.
  • More than half of all knowledge workers use social networking sites and online communities for business communications. Whilst no one doubts that connectivity, communication and collaboration tools dramatically increase knowledge worker productivity there is the realisation that these same tools increase business risks for the employer.
  • It’s this “credit score” and the trends contained within the score which could impact on a firms insurance costs and possibly even its ability to recruit talent. There is therefore a direct link between a clearly written Acceptable Use Policy, compliance and profit.
  • These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to manage the behaviour of users whilst balancing security and network reliability with employee productivity and safety.
  • These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to manage the behaviour of users whilst balancing security and network reliability with employee productivity and safety.
  • These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to manage the behaviour of users whilst balancing security and network reliability with employee productivity and safety.
  • These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to manage the behaviour of users whilst balancing security and network reliability with employee productivity and safety.
  • These risks fall into two main categories: (1) The risk of reputational damage as a result of, for example, the loss of client data or IP contravention. (2) HR issues, in particular the employees’ right to work within a secure, regulated and protected online environment together with developing policies and strategies which help connected employees maintain a work/life balance.
  • These risks fall into two main categories: (1) The risk of reputational damage as a result of, for example, the loss of client data or IP contravention. (2) HR issues, in particular the employees’ right to work within a secure, regulated and protected online environment together with developing policies and strategies which help connected employees maintain a work/life balance.
  • Like it or not alongside its undoubted benefits the Internet delivers access to a range of undesirable diversions from productive educational output. At the top of the list must be the instant access delivered to Sex sites and Pornography. Pure curiosity can draw even the most honest and up right to explore and even the most innocent of word combinations can lead to Internet sites that offer Pornography far far worse than anything available in Soho or a Licensed Sex Shop. Once such images are downloaded onto your PC network the problem faced becomes acute - as do the legal responsibilities you carry , both as guardian to your students and as an employer.
  • These risks fall into two main categories: (1) The risk of reputational damage as a result of, for example, the loss of client data or IP contravention. (2) HR issues, in particular the employees’ right to work within a secure, regulated and protected online environment together with developing policies and strategies which help connected employees maintain a work/life balance.
  • The ScreenShield product suite has won awards throughout Asia and is acknowledged as the leading solution to the management and control of visual pornography
  • Network GRC Delivery

    1. 1. ensuring the responsible use of IT the value of
    2. 2. e-Safe Business : Powered by Guardware Email Mobile Phone Social Networking Web Conferencing Instant Messaging The Organization VOIP As society becomes increasingly connected so organizations of all types and sizes have to adapt to, and take advantage of, the business benefits of online communication, connectivity and collaboration . Balancing Productivity and Compliance
    3. 3. e-Safe Business : Powered by Guardware This change is accelerating, its scope is broadening and its impact is global. Competition is fierce and recruitment is increasingly difficult Regulatory pressures are escalating Clients are more demanding Acceptable Use Policies Balancing Productivity and Compliance
    4. 4. e-Safe Business : Powered by Guardware Web Conferencing Social Networking PDAs E-mail Internet Mobile Phone VOIP I.M. Society is hooked on all-pervasive, always-on connectivity. The boundaries between work, social and leisure time are becoming nonexistent .
    5. 5. e-Safe Business : Powered by Guardware For most of us, not having online access would severely impact our productivity . Productivity For a growing percentage, full time, instant, multi-device connectivity is mission critical. Connectedness For any organization connectedness provides a huge competitive advantage particularly if governed by an ITC Acceptable Use Policy which is integrated into its business vision and strategy. The Organization
    6. 6. e-Safe Business : Powered by Guardware At the same time workplace demographics are changing Demographics Existing staff members are being replaced by a new generation of knowledge workers Connectedness They have never known a world without the internet, Google, Facebook, YouTube, text messaging and camera phones, they are naturally collaborative and connected. The Organization
    7. 7. e-Safe Business : Powered by Guardware At the same time workplace demographics are changing Demographics In order to compete for this valuable talent base organizations have to offer an always on, connected, collaborative environment Connectedness It has to support the way in which the “everyone, everything, everywhere, connected” generation, live and work. The Organization
    8. 8. e-Safe Business : Powered by Guardware 10% 5% 60% 25% 60% use social networking sites at work More than half of all knowledge workers use social networking sites and online communities for business communications Whilst no one doubts that connectivity, communication and collaboration tools dramatically increase knowledge worker productivity there is the realisation that these same tools increase business risks for the employer. VOIP Web Conferencing Text Messaging
    9. 9. e-Safe Business : Powered by Guardware How an organization manages these issues and trends could (will) impact on its costs and possibly even its ability to attract clients and recruit talent. There is, therefore, a direct link between a clearly written and applied Acceptable Use Policy, Pro-active HR activity, continuous compliance monitoring and bottom line profit. So What?
    10. 10. e-Safe Business : Powered by Guardware Manage the behaviour of users These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to:
    11. 11. e-Safe Business : Powered by Guardware balance security and network reliability These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to: Manage the behaviour of users
    12. 12. e-Safe Business : Powered by Guardware Maintain employee productivity and safety These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to: balance security and network reliability Manage the behaviour of users
    13. 13. e-Safe Business : Powered by Guardware Ensure compliance With Regulatory rules and guidelines. These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to: Maintain employee productivity and safety balance security and network reliability Manage the behaviour of users
    14. 14. The risks fall into two main categories: e-Safe Business : Powered by Guardware <ul><li>Productivity & Reputational Damage </li></ul>for example lost hours, green computing issues, negative media, investor & client consequence <ul><li>HR Issues </li></ul>In particular the employees’ right to work within a secure, regulated and protected online environment together with developing policies and strategies which help connected employees maintain a work/life balance.
    15. 15. The risks fall into two main categories: e-Safe Business : Powered by Guardware <ul><li>HR Issues </li></ul>In particular the employees’ right to work within a secure, regulated and protected online environment together with developing policies and strategies which help connected employees maintain a work/life balance.
    16. 16. <ul><li>Consequences of breaches of Acceptable Use Policies: </li></ul><ul><ul><li>Resource misuse costs. </li></ul></ul><ul><ul><li>Reduced employee productivity. </li></ul></ul><ul><ul><li>Exposure to legal liabilities. . </li></ul></ul>“ 70% of porn traffic occurs between 9- 5” The Industry Standard “ Worker Internet misuse ‘a problem’: two-thirds of companies have disciplined employees” CBS Marketwarch &quot;The employer is vicariously liable. An employer should make sure that the people it employs know how to behave and if they're causing offence to others then they should do something about it,&quot; Sarah Veale of the TUC – on BBC Radio &quot;Today's change will force employers to take their responsibilities towards providing a harassment-free working environment more seriously. “ TUC general secretary Brendan Barber
    17. 17. A Personal Threat
    18. 18. Responsible use of IT <ul><li>Blocking inappropriate material. </li></ul><ul><ul><li>Pornography, drugs, racial discrimination. </li></ul></ul><ul><li>Blocking unproductive material. </li></ul><ul><ul><li>Personal websites, games, gambling, chat. </li></ul></ul><ul><li>Ensuring proper use of facilities. </li></ul><ul><ul><li>PC usage (PCs little used / PCs left on) </li></ul></ul><ul><ul><li>Application usage (What users actual do) </li></ul></ul><ul><ul><li>Disk usage (music and video files) </li></ul></ul><ul><ul><li>Network usage (downloads) </li></ul></ul><ul><ul><li>Green Computing CO 2 management </li></ul></ul><ul><li>Optimal usage of hardware / software </li></ul><ul><ul><li>Lack of or too many licenses. </li></ul></ul><ul><ul><li>Tracking assets. </li></ul></ul><ul><ul><li>Under or over powered PCs. </li></ul></ul>
    19. 19. Ensuring the responsible use of IT Introducing
    20. 20. Screen Shield™ v3 <ul><li>Only solution that prevents all misuse of IT infrastructure and resources. </li></ul><ul><li>Enables middle managers to control the usage of PCs in their departments. </li></ul><ul><ul><li>Middle managers know what applications their staff use and are responsible for ensuring productivity. </li></ul></ul><ul><li>Overcomes limitations of competitors. </li></ul><ul><ul><li>Unlimited clients. </li></ul></ul><ul><ul><li>Web-based </li></ul></ul><ul><ul><ul><li>HTTP protocol so no firewall issues. </li></ul></ul></ul><ul><ul><ul><li>Administration of system via web-pages. </li></ul></ul></ul><ul><ul><ul><li>Modular design – </li></ul></ul></ul><ul><ul><ul><ul><li>Image </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Text </li></ul></ul></ul></ul><ul><ul><ul><ul><li>End Point Management (USB) </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Productivity & Green </li></ul></ul></ul></ul>    
    21. 21. Image Analysis <ul><li>Decoding of video files. </li></ul><ul><ul><li>Analysis of DVDs as they are being played. </li></ul></ul><ul><li>Fast image filter. </li></ul><ul><ul><li>Up to 100 images per second. No need to fully decode. </li></ul></ul><ul><li>Full Analysis </li></ul>Decision Skin Tones Skin Textures Edges Blobs Limbs Faces
    22. 22. Text Analysis <ul><li>Bayesian network classifier was developed and implemented in Screen Shield™: </li></ul><ul><ul><li>Words / phrases considered in the context of other words / phrases. </li></ul></ul><ul><ul><li>Supports Arabic, Thai, Russian, French & German. </li></ul></ul><ul><li>More accurate than the simplistic keyword approach implemented in most filters. </li></ul>
    23. 23. Webpage Analysis <ul><li>Metadata in the webpage header. </li></ul><ul><ul><li>Analysis of text in Title, Keywords and Description. </li></ul></ul><ul><ul><li>Checking of Internet Rating Labels </li></ul></ul><ul><ul><ul><li>RSACi, SafeSurf, PICS amongst others </li></ul></ul></ul><ul><ul><li>Fast and confident decision if useful information. </li></ul></ul><ul><li>Body of the webpage: </li></ul><ul><ul><li>Analysis of text within the webpage. </li></ul></ul><ul><ul><li>Analysis of images within the webpage. </li></ul></ul><ul><ul><li>Analysis of links in the webpage. </li></ul></ul><ul><ul><li>Analysis of webpage structure. </li></ul></ul>
    24. 24. Drive Scanning Scan the Hard Drive for pornographic image, file types and video files
    25. 25. Server clustering <ul><li>Cluster contains four server types: </li></ul><ul><ul><li>Database Server, Web Admin Server, File Server and Report Server. </li></ul></ul><ul><ul><li>Need to support 50,000+ clients. </li></ul></ul><ul><li>Support for Apache and Microsoft IIS. </li></ul><ul><ul><li>WinXP, Win2003, </li></ul></ul><ul><ul><li>Planned: Win2008, Linux (Susie, Fedora and RedHat). </li></ul></ul><ul><li>Cascading server architecture. </li></ul><ul><ul><li>Designed for hierarchical organisations spread over a number of countries. </li></ul></ul><ul><ul><li>Three types of server (Branch / Area / HQ) implemented. </li></ul></ul>
    26. 26. Cascade Management
    27. 27. Features <ul><ul><li>Blocking pornographic images in WebPages </li></ul></ul>
    28. 28. WITHOUT Screen Shield WITH Screen Shield
    29. 29. <ul><ul><li>Blocking pornographic images in WebPages </li></ul></ul><ul><ul><li>Capture of pornography at point of display </li></ul></ul><ul><ul><ul><li>Independent of source of pornography and application </li></ul></ul></ul>Features
    30. 32. Features <ul><ul><li>Blocking pornographic images in WebPages </li></ul></ul><ul><ul><li>Capture of pornography at point of display </li></ul></ul><ul><ul><ul><li>Independent of source of pornography and application </li></ul></ul></ul><ul><ul><li>Blocking of inappropriate WebPages (Gambling, hacking etc) </li></ul></ul>
    31. 33. Features <ul><ul><li>Blocking pornographic images in webpages </li></ul></ul><ul><ul><li>Capture of pornography at point of display </li></ul></ul><ul><ul><ul><li>Independent of source of pornography and application </li></ul></ul></ul><ul><ul><li>Blocking of inappropriate webpages (gambling) </li></ul></ul>
    32. 34. Categories Monitored
    33. 35. Features <ul><ul><li>Blocking pornographic images in WebPages </li></ul></ul><ul><ul><li>Capture of pornography at point of display </li></ul></ul><ul><ul><ul><li>Independent of source of pornography and application </li></ul></ul></ul><ul><ul><li>Blocking of inappropriate WebPages (Gambling, hacking etc) </li></ul></ul><ul><ul><li>All inappropriate incidences are logged. </li></ul></ul>
    34. 36. Detailed Reports Thumb nail view for easy administration Who? How? When?
    35. 37. Directing Attention Accidental Addictive
    36. 38. Features <ul><ul><li>Blocking pornographic images in WebPages </li></ul></ul><ul><ul><li>Capture of pornography at point of display </li></ul></ul><ul><ul><ul><li>Independent of source of pornography and application </li></ul></ul></ul><ul><ul><li>Blocking of inappropriate WebPages (gambling) </li></ul></ul><ul><ul><li>All inappropriate incidences are logged. </li></ul></ul><ul><ul><li>Not just inappropriate usage, but all PC usage. </li></ul></ul><ul><ul><ul><li>Monitoring of text with special emphasis on chat clients </li></ul></ul></ul><ul><ul><ul><ul><li>MSN, YAHOO!, MS Messenger </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Key word logging of input by user and document analysis </li></ul></ul></ul></ul>
    37. 39. Text Monitoring Number of Chat Violations By user Each chat session can be viewed by the administrator
    38. 40. Features <ul><ul><li>Blocking pornographic images in WebPages </li></ul></ul><ul><ul><li>Capture of pornography at point of display </li></ul></ul><ul><ul><ul><li>Independent of source of pornography and application </li></ul></ul></ul><ul><ul><li>Blocking of inappropriate WebPages (gambling) </li></ul></ul><ul><ul><li>All inappropriate incidences are logged. </li></ul></ul><ul><ul><li>Not just inappropriate usage, but all PC usage. </li></ul></ul><ul><ul><ul><li>Monitoring of text with special emphasis on chat clients </li></ul></ul></ul><ul><ul><ul><ul><li>MSN, YAHOO!, MS Messenger. </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Key word logging of input by user and document analysis </li></ul></ul></ul></ul><ul><ul><ul><li>User productivity monitoring </li></ul></ul></ul>
    39. 41. The risks fall into two main categories: e-Safe Business : Powered by Guardware <ul><li>Reputational Damage </li></ul>for example lost hours, green computing issues, negative media, investor & client consequence <ul><li>Management Reporting & Feature Controls </li></ul>
    40. 42. Working Environment Policies System tray icon
    41. 43. Features <ul><li>Implementation organizational working environment policies </li></ul><ul><ul><li>Configurable detection threshold settings </li></ul></ul><ul><ul><li>Limiting internet surfing time </li></ul></ul><ul><ul><li>PC hibernation, log-off, shutdown if not in use. </li></ul></ul><ul><ul><li>Thumbdrive blocking. </li></ul></ul><ul><ul><li>Use-of-facilities policy and system tray icon. </li></ul></ul><ul><ul><li>Limiting application usage </li></ul></ul><ul><li>Easy Administration of large numbers of PCs. </li></ul><ul><ul><li>Full configurable profiles </li></ul></ul><ul><ul><li>Scheduling of Profiles </li></ul></ul><ul><ul><li>User access control for different </li></ul></ul><ul><ul><li>Auto-emailed Summary Reports </li></ul></ul>
    42. 44. Productivity Reports User productivity measured in percentage
    43. 45. Productivity Report Detailed productivity analysis by time
    44. 46. Features <ul><ul><li>Blocking pornographic images in WebPages </li></ul></ul><ul><ul><li>Capture of pornography at point of display </li></ul></ul><ul><ul><ul><li>Independent of source of pornography and application </li></ul></ul></ul><ul><ul><li>Blocking of inappropriate WebPages (gambling) </li></ul></ul><ul><ul><li>All inappropriate incidences are logged. </li></ul></ul><ul><ul><li>Not just inappropriate usage, but all PC usage. </li></ul></ul><ul><ul><ul><li>Monitoring of text with special emphasis on chat clients </li></ul></ul></ul><ul><ul><ul><ul><li>MSN, YAHOO!, MS Messenger </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Key word logging of input by user and document analysis </li></ul></ul></ul></ul><ul><ul><ul><li>User productivity monitoring </li></ul></ul></ul><ul><ul><ul><li>Network usage </li></ul></ul></ul>
    45. 47. Network Usage Per user network load Peek network activity break down
    46. 48. Features <ul><ul><li>Blocking pornographic images in WebPages </li></ul></ul><ul><ul><li>Capture of pornography at point of display </li></ul></ul><ul><ul><ul><li>Independent of source of pornography and application </li></ul></ul></ul><ul><ul><li>Blocking of inappropriate WebPages (gambling) </li></ul></ul><ul><ul><li>All inappropriate incidences are logged. </li></ul></ul><ul><ul><li>Not just inappropriate usage, but all PC usage. </li></ul></ul><ul><ul><ul><li>Monitoring of text with special emphasis on chat clients </li></ul></ul></ul><ul><ul><ul><ul><li>MSN, YAHOO!, MS Messenger </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Key word logging of input by user and document analysis </li></ul></ul></ul></ul><ul><ul><ul><li>User productivity monitoring </li></ul></ul></ul><ul><ul><ul><li>Network usage </li></ul></ul></ul><ul><ul><ul><li>Hardware and software audit </li></ul></ul></ul>
    47. 49. Hardware Audit Organization wide PC Hardware resource captured and categorized PCs recognized by using MAC addresses Detailed specification of the PCs captured
    48. 50. Detecting HW Misuse Actively monitoring all PC hardware resources for changes Detailed description of the changes recorded
    49. 51. Software Audit Organization wide PC software resources captured and categorized Report on illegal software usage in the organization
    50. 52. Detecting SW Change Detailed description per PC on the licensed and un licensed software Available licenses can be are categorized in to groups for easy management Detecting software changes per user
    51. 53. Features <ul><ul><li>Blocking pornographic images in WebPages </li></ul></ul><ul><ul><li>Capture of pornography at point of display </li></ul></ul><ul><ul><ul><li>Independent of source of pornography and application </li></ul></ul></ul><ul><ul><li>Blocking of inappropriate WebPages (gambling) </li></ul></ul><ul><ul><li>All inappropriate incidences are logged. </li></ul></ul><ul><ul><li>Not just inappropriate usage, but all PC usage. </li></ul></ul><ul><ul><ul><li>Monitoring of text with special emphasis on chat clients </li></ul></ul></ul><ul><ul><ul><ul><li>MSN, YAHOO!, MS Messenger </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Key word logging of input by user and document analysis </li></ul></ul></ul></ul><ul><ul><ul><li>User productivity monitoring </li></ul></ul></ul><ul><ul><ul><li>Network usage </li></ul></ul></ul><ul><ul><ul><li>Hardware and software auditing </li></ul></ul></ul><ul><ul><ul><li>Drive auditing </li></ul></ul></ul>
    52. 54. Drive Scanning Break down of Harddrive usage by each employee
    53. 55. Features <ul><li>Implementation of organizational working environment policies </li></ul><ul><ul><li>Configurable detection threshold settings </li></ul></ul><ul><ul><li>Limiting internet surfing time </li></ul></ul><ul><ul><li>Thumbdrive blocking. </li></ul></ul><ul><ul><li>PC hibernation, log-off, shutdown if not in use. </li></ul></ul>
    54. 56. Working Environment Policies Configurable thresholds for different type of users Enable or disable internet surfing for different users Thumb drive blocking PC hibernation and shutdown settings Green Computing Benefit – average Office work station can create over 200Kg of C0 2 per year Equal to a passenger flight from London to Paris! www.fixgaia.com
    55. 57. <ul><li>What are the environmental benefits? </li></ul><ul><li>‘ Businesses are currently responsible for half of all the UK’s carbon emissions; even small offices can emit three to five tonnes of carbon dioxide a year. Unless they reduce their carbon emissions, businesses will start paying the price of climate change through more expensive energy supplies and higher insurance premiums. a drop in business, with customers looking elsewhere for a more socially responsible supplier’ </li></ul><ul><li>consider; </li></ul><ul><li>One workstation can produce the annual CO 2 equivalent of a passenger flying from London to Paris. </li></ul><ul><li>The Internet, Computing and their supporting environmental services (air conditioning, lighting & buildings) are one of the worlds largest sources of GHG creation – Greater than air travel </li></ul><ul><li>All businesses can reduce their Carbon footprint by proactive management of their IT equipment and power consumption plus the implementation and effective monitoring of an Acceptable Use Policy (AUP) which governs the use of company infrastructure and which is backed up by both effective tools, regular monitoring and comprehensive training” using proactive system and activity management. </li></ul>
    56. 58. Features <ul><li>Implementation organizational working environment policies </li></ul><ul><ul><li>Configurable detection threshold settings </li></ul></ul><ul><ul><li>Limiting internet surfing time </li></ul></ul><ul><ul><li>PC hibernation, log-off, shutdown if not in use. </li></ul></ul><ul><ul><li>Thumbdrive blocking. </li></ul></ul><ul><ul><li>Use-of-facilities policy and system tray icon. </li></ul></ul><ul><ul><li>Limiting application usage </li></ul></ul>
    57. 59. Working Environment Policies Configurable application usage for different type of users
    58. 60. Features <ul><li>Implementation organizational working environment policies </li></ul><ul><ul><li>Configurable detection threshold settings </li></ul></ul><ul><ul><li>Limiting internet surfing time </li></ul></ul><ul><ul><li>PC hibernation, log-off, shutdown if not in use. </li></ul></ul><ul><ul><li>Thumbdrive blocking. </li></ul></ul><ul><ul><li>Use-of-facilities policy and system tray icon. </li></ul></ul><ul><ul><li>Limiting application usage </li></ul></ul><ul><li>Easy Administration of large numbers of PCs. </li></ul><ul><ul><li>Fully configurable profiles </li></ul></ul><ul><ul><li>Different profiles for different users and PCs </li></ul></ul>
    59. 61. Tree Structure for easy PC grouping and administration
    60. 62. Different groups of profiles targeted at different set of users
    61. 63. Features <ul><li>Implementation organizational working environment policies </li></ul><ul><ul><li>Configurable detection threshold settings </li></ul></ul><ul><ul><li>Limiting internet surfing time </li></ul></ul><ul><ul><li>PC hibernation, log-off, shutdown if not in use. </li></ul></ul><ul><ul><li>Thumbdrive blocking. </li></ul></ul><ul><ul><li>Use-of-facilities policy and system tray icon. </li></ul></ul><ul><ul><li>Limiting application usage </li></ul></ul><ul><li>Easy Administration of large numbers of PCs. </li></ul><ul><ul><li>Fully configurable profiles </li></ul></ul><ul><ul><li>Scheduling of Profiles </li></ul></ul>
    62. 64. Application of different profiles for different timings Night hours Working hours After working hours
    63. 65. Features <ul><li>Implementation organizational working environment policies </li></ul><ul><ul><li>Configurable detection threshold settings </li></ul></ul><ul><ul><li>Limiting internet surfing time </li></ul></ul><ul><ul><li>PC hibernation, log-off, shutdown if not in use. </li></ul></ul><ul><ul><li>Thumbdrive blocking. </li></ul></ul><ul><ul><li>Use-of-facilities policy and system tray icon. </li></ul></ul><ul><ul><li>Limiting application usage </li></ul></ul><ul><li>Easy Administration of large numbers of PCs. </li></ul><ul><ul><li>Full configurable profiles </li></ul></ul><ul><ul><li>Scheduling of Profiles </li></ul></ul><ul><ul><li>User access control for different </li></ul></ul><ul><ul><li>Auto-emailed Summary Reports </li></ul></ul>
    64. 66. Summary – Uniqueness <ul><li>Approach to detecting inappropriate material. </li></ul><ul><ul><li>Captures at point of display not at gateway level. </li></ul></ul><ul><ul><li>Detection of encrypted chat, DVDs and applications. </li></ul></ul><ul><li>Designed for middle managers not IT staff. </li></ul><ul><ul><li>Ensure proper usage of PCs in their departments. </li></ul></ul><ul><ul><li>Intuitive and interactive Web 2.0 interface. </li></ul></ul><ul><ul><li>Support for very large hierarchical organisations. </li></ul></ul><ul><ul><li>Server clustering with support for linux </li></ul></ul>
    65. 67. Summary – Quality <ul><li>Developed using CMMI Level 3 Software Processes and Practices. </li></ul><ul><li>Latest Web 2.0 Technologies for speed, interactivity and usability. </li></ul><ul><li>Award winning artificial intelligence and image processing analysis engines </li></ul>
    66. 68. Awards & Recognition PIKOM Computimes ICT Awards 2004 - WINNER “ ICT Product of the Year” MSC - Asia Pacific ICT Awards 2004 - WINNER “ Best of Applications and Infrastructure Tools” International Asia Pacific ICT Awards 2004 Hong Kong - MERIT AWARD “ Best of Applications and Infrastructure Tools” MSC - APICTA 2003 - MERIT AWARD “ Best of R&D” Asian Innovation Awards 2004 - FINALIST Far East Economic Review “ Improving Productivity, Efficiency & Quality of Life” Asian Conference on Computer Vision 2004 28-30 January 2004, Juju Island, Korea. Detecting Pornographic Images MSC-APICTA 2005, Malaysia – WINNER URLChecker &quot;Best of Application and Infrastructure Tools” APICTA 2008, SS3 - WINNER “ e-Community & e-Inclusion' category” “ Surprisingly, perhaps, it works brilliantly”
    67. 69. <ul><li>All businesses can improve their </li></ul><ul><li>Productivity </li></ul><ul><li>Compliance and; </li></ul><ul><li>Carbon Footprint </li></ul><ul><li>by implementation of a programme and process of Governance, Compliance and Acceptable Use which governs the use of their infrastructure u sing proactive system and activity management - backed up by effective tools, regular monitoring and comprehensive ongoing training </li></ul>Closing So What
    68. 70. <ul><li>By this action the business will make positive gains in its; </li></ul><ul><li>Staff relationships </li></ul><ul><li>Customer relationships </li></ul><ul><li>Investor & Stakeholder relationships </li></ul><ul><li>Profitability </li></ul>Closing So What
    69. 71. Questions? [email_address] Ensuring the responsible use of IT

    ×