Audit PC content


Published on

Guarware self contained PC audit solution

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • The ScreenShield product suite has won awards throughout Asia and is acknowledged as the leading solution to the management and control of visual pornography
  • Audit PC content

    2. 2. powered by
    3. 3. The Problem <ul><li>Preventing inappropriate or illegal material on computers from entering an environment or being transported (knowingly or accidentally) into a country where they would be illegal or offensive . </li></ul><ul><li>Stumbled on issue when marketing person detained in Saudi Arabia whilst promoting range of anti-porn filters. </li></ul><ul><li>No software available to combat Child Pornography </li></ul><ul><li>Standard pornography filters not useful </li></ul><ul><ul><li>Do not have ownership of the laptop / PC. </li></ul></ul><ul><ul><li>Investigating PC after the material has entered it. </li></ul></ul><ul><ul><li>No evidence. </li></ul></ul><ul><li>Not just a government issue, but also a business issue </li></ul>
    4. 4. The Risks <ul><li>We live in a world where everyone, everything, everywhere is connected. This hyper connectivity brings significant business benefits but also entails considerable risk. </li></ul><ul><li>The risk of breaching legal requirements and regulatory compliance. These are serious matters, affecting your suppliers, clients, employees, investors, partners and regulators. The impact on reputation can be catastrophic as an increasing number of organisations, companies and their key staff and officers have found to their cost. </li></ul><ul><li>The risk that an organisation or company is discovered holding offensive or pornographic images, media or software that breaches copyright on their system (knowingly or not) the ultimate responsibility is with the IT Manager, Partners and Directors. </li></ul><ul><li>The risk of unauthorized staff downloads of music, offensive image files, video and movies is a major cause of non-compliance and a danger to the integrity of any network. No one is safe from the threat; private business, education, local and central government, health authorities and their key management can all face prosecution as the result of illegally downloaded or stored files. </li></ul><ul><li>FACT; On 26th January 2009 the UK law changed with Sections 62 to 67 of the Criminal Justice Act 2008 coming into effect. Passed in May of 2008, the Act make it a criminal offence, punishable by up to three years in prison, to possess material that is deemed inappropriate and of an extreme adult nature – more than ever the consequences of the downloading and storage of pornography, music and video clips onto computers are real business and legal compliance issues that result in serious personal and corporate exposures </li></ul>
    5. 5. What is FAF? <ul><li>F ile A udit F acility ( FAF ) is a thumbdrive application that scans a target PC for files containing inappropriate and illegal content. </li></ul><ul><li>FAF allows officials to conduct an audit of a PC quickly and efficiently, whereas previously they would not have been able to do so. </li></ul><ul><li>FAF is designed for border custom officials, police forces, forensic experts, business IT security and human resource personnel . </li></ul>
    6. 6. Features All controls on a single panel for EASE-OF-USE . Controls set to standard settings – user just needs to hit the Start Scan button.
    7. 7. Features <ul><li>Choice of what to scan for: </li></ul><ul><li>Detection of pornographic images & videos. </li></ul><ul><li>Detection of inappropriate web-pages. </li></ul><ul><li>Detection of music files. </li></ul><ul><li>*MD5# Scanning; </li></ul><ul><li>Detection of scheduled pornography. </li></ul><ul><li>Detection of pirated software. </li></ul><ul><li>Detection regardless of file extension. </li></ul>*Note the MD5# feature is not currently available on the commercial release of FAF.
    8. 8. Features Flexible - able to select path from where to begin the scan. Flexible – able to specify the threshold for pornography. The higher the threshold the lower the number of false positives.
    9. 9. Features Thumbnails displayed in reports Different categories Reports saved to thumbdrive for action
    10. 10. Features Result summary Hard drive serial number, time and notes captured Detailed reports and thumbnails Evidence….?
    11. 11. Technology <ul><li>Developed using CMMI Level 3 Software Processes and Practices. </li></ul><ul><li>Implementation of proprietary Image Processing and Artificial Intelligence algorithms that have won International awards and recognition. </li></ul><ul><li>Deploys anti-piracy component to tie software to single thumbdrive. </li></ul><ul><li>Product enhancement and development roadmap – future utility and performance enhancements will create additional upgrade sales opportunities </li></ul>
    12. 12. <ul><li>Capability Maturity Model® Integration (CMMI) is a process improvement approach that provides organizations with the essential elements of effective processes. </li></ul><ul><li>CMMI helps integrate traditionally separate organizational functions, set process improvement goals and priorities, provide guidance for quality processes, and provide a point of reference for appraising current processes. </li></ul><ul><li>Worldwide Adoption; CMMI is being adopted worldwide, including North America, Europe, Asia, Australia, South America, and Africa. </li></ul><ul><li>Benefits of Process Improvement; The quality of a system is highly influenced by the quality of the process used to acquire, develop, and maintain it. Process improvement increases product and service quality as organizations apply it to achieve their business objectives. </li></ul><ul><li>CMMI Benefits </li></ul><ul><li>The CMMI Product Suite is at the forefront of process improvement because it provides the latest best practices for product and service development and maintenance. The CMMI models improve the best practices of previous models in many important ways. CMMI best practices enable organizations to do the following: </li></ul><ul><li>1. more explicitly link management and engineering activities to their business objectives </li></ul><ul><li>2 .expand the scope of and visibility into the product lifecycle and engineering activities to ensure that the product or service meets customer expectations </li></ul><ul><li>3. incorporate lessons learned from additional areas of best practice (e.g., measurement, risk management, and supplier management </li></ul><ul><li>4. implement more robust high-maturity practices </li></ul><ul><li> 5. address additional organizational functions critical to their products and services </li></ul><ul><li>© 2009 Carnegie Mellon University </li></ul>What is CMMI?
    13. 13. Awards and Recognition PIKOM Computimes ICT Awards 2004 - WINNER “ ICT Product of the Year” MSC - Asia Pacific ICT Awards 2004 - WINNER “ Best of Applications and Infrastructure Tools” International Asia Pacific ICT Awards 2004 Hong Kong - MERIT AWARD “ Best of Applications and Infrastructure Tools” MSC - APICTA 2003 - MERIT AWARD “ Best of R&D” Asian Innovation Awards 2004 - FINALIST Far East Economic Review “ Improving Productivity, Efficiency & Quality of Life” Asian Conference on Computer Vision 2004 28-30 January 2004, Juju Island, Korea. Detecting Pornographic Images MSC-APICTA 2005, Malaysia - WINNER URLChecker &quot;Best of Application and Infrastructure Tools &quot; . “ Surprisingly, perhaps, it works brilliantly” 4 out of 5 Stars
    14. 14. Decision Skin Tone Detection Texture Detection Edge Detection Blob Detection Limb Detection Face Detection Image Processing Neural Network Content-based image processing engine can analyse 100 images per second. Fast filter whilst decoding for speed Image Analysis Achieved by analysing image and video files without need of fully decoding them. Deploys proprietary, International Award winning technology
    15. 15. Pornography <ul><li>FAF partners Zentek Forensics – BSi 29000 accredited forensic experts who work for Police, MOD and other agencies </li></ul><ul><li>Maintain a large database of porn images for law enforcement purposes. </li></ul><ul><li>FAF product road map will add MD5 hash scanning ability </li></ul><ul><li>To check for scheduled porn images MD5 hash values (file identifiers) are used. </li></ul><ul><ul><li>Fast processing speed with no loss in accuracy. </li></ul></ul><ul><ul><li>Prevents circulation of the actual images. </li></ul></ul><ul><li>FAF is able to scan an entire hard drive for images, videos and HTML page files in minutes. </li></ul>
    16. 16. Webpages <ul><li>For the analysis of webpages a Bayesian network classifier was developed and implemented in FAF : </li></ul><ul><ul><li>Words / phrases considered in the context of other words / phrases. </li></ul></ul><ul><ul><li>Able to take metadata (information about number of images / links) into account. </li></ul></ul><ul><ul><li>Unicode development; Supports multiple language sets including; Arabic, Thai, Turkish, Russian, French & German. </li></ul></ul><ul><ul><li>More accurate than the simplistic keyword approach implemented in most filters. </li></ul></ul>
    17. 17. Music Files <ul><li>Most common form of piracy. </li></ul><ul><li>Difficult to prove piracy as users are allowed to make own copy if have CD. </li></ul><ul><li>FAF locates files with known music (mp3, wav, etc) extensions. </li></ul><ul><li>Rational for inclusion </li></ul><ul><ul><li>music files major source of disk space usage. </li></ul></ul><ul><ul><li>exposure to FACT sanction & penalties </li></ul></ul>
    18. 18. Marketing <ul><li>Media endorsement </li></ul>4 stars out of 5 “ In our tests, the software could find and detect all of the objectionable content we purposely placed on our test machine ” <ul><li>Pricing </li></ul><ul><ul><li>RRP £140 for 12 month license </li></ul></ul><ul><ul><li>Reseller margin of up to 50% </li></ul></ul><ul><ul><li>Includes; </li></ul></ul><ul><ul><ul><li>Confiscation Insurance (unique – world wide) </li></ul></ul></ul><ul><ul><ul><li>2 Hours free legal support &; </li></ul></ul></ul><ul><ul><ul><li>Discount on subscription to </li></ul></ul></ul>
    19. 20. A Selection of Existing Customers
    20. 21. The Extended Product Suite Enterprise - Client / Server application: Captures and analyses everything displayed on the screen and stored within the hard-drive for pornographic material. Text string analysis against forensically sound and proven threat libraries, management of productivity & GCR issues Customizable to suit the needs of organizations. Remote management and viewing of incidences via the Internet. Browser plug-in: Replaces pornographic images in web-pages with a neutral image. Records URLs of pornographic pages visited. Enables user White / Black listing of sites ™ Standalone: Captures and analyses everything displayed on the screen and stored within the hard-drive for pornographic and other unwanted material on a standalone machine. Also controls Internet and application usage and access. URL Checker A robot application that automatically searches out and categorizes websites as being i) highly likely to be pornographic, ii) highly likely to be non-pornographic, or iii) boundary (requiring manual categorisation). It maintains a database of previously categorized websites, allowing the entries to be edited using a web interface and the contents to be exported into a suitably structured file for uploading to third party URL blocking solutions. Designed for ISP & Large Corporate / Educational installation
    21. 22. The Extended Product Suite e-safe insurance – specialist insurance : e-safe recognizes that cyber risk impacts materialize in the physical world – e-safe insurance delivers a range of bespoke and specialist insurance products that dove tail with e-safe software solutions – making sure that all bases and risks are answered. More details at e-safe law – specialist legal support: As with insurance e-safe recognizes that there are times when quality legal support is essential. e-safe law dove tails quality legal services and support with e-safe software solutions Forensic Services There are times when prevention fails or the problem requires deep investigation – this is where our partnership with Zentek Forensics comes into play; Zentek are the only company in the UK to have both ISO 9001 ISO 27001 and ISO 29001 certification for 'Expert Forensic Examination of Digital Media‘, enabling Zentek to deliver mobile phone forensics and digital forensics, offline and online, as well as computer examination., The Zentek team consists of world class investigators who are experienced expert witnesses, all with judicial experience.
    22. 23. Demonstration and Questions THANK YOU