SlideShare a Scribd company logo
INTRODUCING
powered by
The Problem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Risks ,[object Object],[object Object],[object Object],[object Object],[object Object]
What is FAF? ,[object Object],[object Object],[object Object]
Features All controls on a single panel for  EASE-OF-USE . Controls  set to standard settings – user just needs to hit the Start Scan button.
Features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],*Note the MD5# feature is not currently available on the commercial release of FAF.
Features Flexible - able to select path from where to begin the scan. Flexible – able to specify the threshold for pornography.  The higher the threshold the lower the number of false positives.
Features Thumbnails displayed in reports Different categories Reports saved to thumbdrive for action
Features Result summary Hard drive serial number, time and notes captured Detailed reports and thumbnails Evidence….?
Technology ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],What is CMMI?
Awards and   Recognition PIKOM Computimes ICT Awards 2004 -  WINNER “ ICT Product of the Year” MSC - Asia Pacific ICT Awards 2004 - WINNER “ Best of Applications and Infrastructure Tools” International Asia Pacific ICT Awards 2004 Hong Kong - MERIT AWARD “ Best of Applications and Infrastructure Tools” MSC - APICTA 2003 - MERIT AWARD “ Best of R&D” Asian Innovation Awards 2004  -  FINALIST  Far East Economic Review “ Improving Productivity, Efficiency & Quality of Life” Asian Conference on Computer Vision 2004  28-30 January 2004, Juju Island, Korea. Detecting Pornographic Images MSC-APICTA 2005,  Malaysia - WINNER URLChecker   "Best of Application and Infrastructure Tools " . “ Surprisingly, perhaps, it works brilliantly” 4 out of 5 Stars
Decision Skin Tone Detection Texture Detection Edge Detection Blob Detection Limb Detection Face Detection Image Processing Neural Network Content-based image processing engine can analyse 100 images per second. Fast filter whilst decoding for speed Image Analysis Achieved by analysing image and video files without need of fully decoding them.  Deploys proprietary, International Award winning technology
Pornography ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Webpages ,[object Object],[object Object],[object Object],[object Object],[object Object]
Music Files ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Marketing ,[object Object],4 stars out of 5 “ In our tests, the software could find and detect all of the objectionable content we purposely placed on our test machine ” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
A Selection of Existing Customers
The Extended Product Suite Enterprise - Client / Server application:  Captures and analyses everything displayed on the screen and stored within the hard-drive for pornographic material. Text string analysis against forensically sound and proven threat libraries, management of productivity & GCR issues Customizable to suit the needs of organizations. Remote management and viewing of incidences via the Internet. Browser plug-in: Replaces pornographic images in web-pages with a neutral image. Records URLs of pornographic pages visited. Enables user  White / Black listing of sites  ™ Standalone: Captures and analyses everything displayed on the screen and stored within the hard-drive for pornographic and other unwanted material on a standalone machine. Also controls Internet and application usage and access. URL Checker A robot application that automatically searches out and categorizes websites as being i) highly likely to be pornographic, ii) highly likely to be non-pornographic, or iii) boundary (requiring manual categorisation). It maintains a database of previously categorized websites, allowing the entries to be edited using a web interface and the contents to be exported into a suitably structured file for uploading to third party URL blocking solutions. Designed for ISP & Large Corporate / Educational installation
The Extended Product Suite e-safe insurance – specialist insurance :  e-safe recognizes that cyber risk impacts materialize in the physical world – e-safe insurance delivers a range of bespoke and specialist insurance products that dove tail with e-safe software solutions – making sure that all bases and risks are answered. More details at  www.esafeinsurance.co.uk   e-safe law – specialist legal support: As with insurance e-safe recognizes that there are times when quality legal support is essential. e-safe law  dove tails quality legal services and support with e-safe software solutions Forensic Services There are times when prevention fails or the problem requires deep investigation – this is where our partnership with Zentek Forensics comes into play;  Zentek are the only company in the UK to have both ISO 9001 ISO 27001 and ISO 29001 certification for 'Expert Forensic Examination of Digital Media‘, enabling Zentek to deliver mobile phone forensics and digital forensics, offline and online, as well as computer examination., The Zentek team consists of world class investigators who are experienced expert witnesses, all with judicial experience.
Demonstration and Questions THANK YOU

More Related Content

Viewers also liked

Llibre ksandra
Llibre ksandraLlibre ksandra
Llibre ksandra
guest554a5d
 
Va\\lue of e-safebusiness solutions
Va\\lue of e-safebusiness solutionsVa\\lue of e-safebusiness solutions
Va\\lue of e-safebusiness solutions
iansadler
 
Protection for Single PCs
Protection for Single PCsProtection for Single PCs
Protection for Single PCs
iansadler
 
Präs baujournal
Präs baujournalPräs baujournal
Präs baujournalTom Treber
 
Boses Ng Kabataan Competition Paper
Boses Ng Kabataan Competition PaperBoses Ng Kabataan Competition Paper
Boses Ng Kabataan Competition Paper
guest6b6bedc
 
Präs plank
Präs plankPräs plank
Präs plank
Tom Treber
 
Regio alueyhteistyömalli 2012
Regio alueyhteistyömalli 2012Regio alueyhteistyömalli 2012
Regio alueyhteistyömalli 2012Vesa Sarmia
 
大學生之於吃
大學生之於吃大學生之於吃
大學生之於吃songla
 
Komm 2.0
Komm 2.0Komm 2.0
Komm 2.0
Tom Treber
 
Lenguajes programacionalternativos
Lenguajes programacionalternativosLenguajes programacionalternativos
Lenguajes programacionalternativos
seravb
 
Free software
Free softwareFree software
Free software
seravb
 
Presentation1
Presentation1Presentation1
Presentation1Rasha.g
 
Network GRC Delivery
Network GRC DeliveryNetwork GRC Delivery
Network GRC Delivery
iansadler
 
C:\Fakepath\Impress
C:\Fakepath\ImpressC:\Fakepath\Impress
C:\Fakepath\Impress
Gaia Mariotti
 
Hk yhdessäolon taidot ja toimivan ryhmäytymisen kor2802
Hk yhdessäolon taidot ja toimivan ryhmäytymisen kor2802Hk yhdessäolon taidot ja toimivan ryhmäytymisen kor2802
Hk yhdessäolon taidot ja toimivan ryhmäytymisen kor2802Vesa Sarmia
 
19271931 dove-final-presentation-1
19271931 dove-final-presentation-119271931 dove-final-presentation-1
19271931 dove-final-presentation-1
suraj333
 
X ray diffraction
X ray diffractionX ray diffraction
X ray diffraction
Praveen Kumar
 

Viewers also liked (17)

Llibre ksandra
Llibre ksandraLlibre ksandra
Llibre ksandra
 
Va\\lue of e-safebusiness solutions
Va\\lue of e-safebusiness solutionsVa\\lue of e-safebusiness solutions
Va\\lue of e-safebusiness solutions
 
Protection for Single PCs
Protection for Single PCsProtection for Single PCs
Protection for Single PCs
 
Präs baujournal
Präs baujournalPräs baujournal
Präs baujournal
 
Boses Ng Kabataan Competition Paper
Boses Ng Kabataan Competition PaperBoses Ng Kabataan Competition Paper
Boses Ng Kabataan Competition Paper
 
Präs plank
Präs plankPräs plank
Präs plank
 
Regio alueyhteistyömalli 2012
Regio alueyhteistyömalli 2012Regio alueyhteistyömalli 2012
Regio alueyhteistyömalli 2012
 
大學生之於吃
大學生之於吃大學生之於吃
大學生之於吃
 
Komm 2.0
Komm 2.0Komm 2.0
Komm 2.0
 
Lenguajes programacionalternativos
Lenguajes programacionalternativosLenguajes programacionalternativos
Lenguajes programacionalternativos
 
Free software
Free softwareFree software
Free software
 
Presentation1
Presentation1Presentation1
Presentation1
 
Network GRC Delivery
Network GRC DeliveryNetwork GRC Delivery
Network GRC Delivery
 
C:\Fakepath\Impress
C:\Fakepath\ImpressC:\Fakepath\Impress
C:\Fakepath\Impress
 
Hk yhdessäolon taidot ja toimivan ryhmäytymisen kor2802
Hk yhdessäolon taidot ja toimivan ryhmäytymisen kor2802Hk yhdessäolon taidot ja toimivan ryhmäytymisen kor2802
Hk yhdessäolon taidot ja toimivan ryhmäytymisen kor2802
 
19271931 dove-final-presentation-1
19271931 dove-final-presentation-119271931 dove-final-presentation-1
19271931 dove-final-presentation-1
 
X ray diffraction
X ray diffractionX ray diffraction
X ray diffraction
 

Similar to Audit PC content

Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
centralohioissa
 
Proposal to Manage the Upgrade of the IT Infrastructure for PPESA
Proposal to Manage the Upgrade of the IT Infrastructure for PPESAProposal to Manage the Upgrade of the IT Infrastructure for PPESA
Proposal to Manage the Upgrade of the IT Infrastructure for PPESA
Federico Schiavio
 
Anajli_Synopsis
Anajli_SynopsisAnajli_Synopsis
Anajli_Synopsis
Anjali Arora
 
The Ohio State University Law Enforcement Agencies and Emerging Technology.docx
The Ohio State University Law Enforcement Agencies and Emerging Technology.docxThe Ohio State University Law Enforcement Agencies and Emerging Technology.docx
The Ohio State University Law Enforcement Agencies and Emerging Technology.docx
write5
 
Emerging Issues Risk Analysis ReportScenarioThe Entertai.docx
Emerging Issues Risk Analysis ReportScenarioThe Entertai.docxEmerging Issues Risk Analysis ReportScenarioThe Entertai.docx
Emerging Issues Risk Analysis ReportScenarioThe Entertai.docx
christinemaritza
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarket
Finite Moments
 
Research Report #2 Emerging Issues Risk Analysis and Report.docx
Research Report #2 Emerging Issues Risk Analysis and Report.docxResearch Report #2 Emerging Issues Risk Analysis and Report.docx
Research Report #2 Emerging Issues Risk Analysis and Report.docx
gholly1
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
Zernike College
 
IntroductionThe capstone project is a �structured walkthrough� pen.pdf
IntroductionThe capstone project is a �structured walkthrough� pen.pdfIntroductionThe capstone project is a �structured walkthrough� pen.pdf
IntroductionThe capstone project is a �structured walkthrough� pen.pdf
fantasiatheoutofthef
 
DevOps for Highly Regulated Environments
DevOps for Highly Regulated EnvironmentsDevOps for Highly Regulated Environments
DevOps for Highly Regulated Environments
DevOps.com
 
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Editor IJMTER
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008
tswong
 
BlackDuck Suite
BlackDuck SuiteBlackDuck Suite
BlackDuck Suite
jeff cheng
 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013
Turvallisuus2013
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Mobodexter
 
An update to software testing trends
An update to software testing trendsAn update to software testing trends
An update to software testing trends
BugRaptors
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
Laurent Daudré-Vignier
 
Software development
Software developmentSoftware development
Software development
Rudi Hartono
 
Proxy For employee monitoring
Proxy  For employee monitoringProxy  For employee monitoring
Proxy For employee monitoring
Proxies Rent
 
FaceTime Web 2.0
FaceTime Web 2.0FaceTime Web 2.0
FaceTime Web 2.0
Chris Sparshott
 

Similar to Audit PC content (20)

Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
 
Proposal to Manage the Upgrade of the IT Infrastructure for PPESA
Proposal to Manage the Upgrade of the IT Infrastructure for PPESAProposal to Manage the Upgrade of the IT Infrastructure for PPESA
Proposal to Manage the Upgrade of the IT Infrastructure for PPESA
 
Anajli_Synopsis
Anajli_SynopsisAnajli_Synopsis
Anajli_Synopsis
 
The Ohio State University Law Enforcement Agencies and Emerging Technology.docx
The Ohio State University Law Enforcement Agencies and Emerging Technology.docxThe Ohio State University Law Enforcement Agencies and Emerging Technology.docx
The Ohio State University Law Enforcement Agencies and Emerging Technology.docx
 
Emerging Issues Risk Analysis ReportScenarioThe Entertai.docx
Emerging Issues Risk Analysis ReportScenarioThe Entertai.docxEmerging Issues Risk Analysis ReportScenarioThe Entertai.docx
Emerging Issues Risk Analysis ReportScenarioThe Entertai.docx
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarket
 
Research Report #2 Emerging Issues Risk Analysis and Report.docx
Research Report #2 Emerging Issues Risk Analysis and Report.docxResearch Report #2 Emerging Issues Risk Analysis and Report.docx
Research Report #2 Emerging Issues Risk Analysis and Report.docx
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
IntroductionThe capstone project is a �structured walkthrough� pen.pdf
IntroductionThe capstone project is a �structured walkthrough� pen.pdfIntroductionThe capstone project is a �structured walkthrough� pen.pdf
IntroductionThe capstone project is a �structured walkthrough� pen.pdf
 
DevOps for Highly Regulated Environments
DevOps for Highly Regulated EnvironmentsDevOps for Highly Regulated Environments
DevOps for Highly Regulated Environments
 
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008
 
BlackDuck Suite
BlackDuck SuiteBlackDuck Suite
BlackDuck Suite
 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
 
An update to software testing trends
An update to software testing trendsAn update to software testing trends
An update to software testing trends
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
Software development
Software developmentSoftware development
Software development
 
Proxy For employee monitoring
Proxy  For employee monitoringProxy  For employee monitoring
Proxy For employee monitoring
 
FaceTime Web 2.0
FaceTime Web 2.0FaceTime Web 2.0
FaceTime Web 2.0
 

Audit PC content

  • 3.
  • 4.
  • 5.
  • 6. Features All controls on a single panel for EASE-OF-USE . Controls set to standard settings – user just needs to hit the Start Scan button.
  • 7.
  • 8. Features Flexible - able to select path from where to begin the scan. Flexible – able to specify the threshold for pornography. The higher the threshold the lower the number of false positives.
  • 9. Features Thumbnails displayed in reports Different categories Reports saved to thumbdrive for action
  • 10. Features Result summary Hard drive serial number, time and notes captured Detailed reports and thumbnails Evidence….?
  • 11.
  • 12.
  • 13. Awards and Recognition PIKOM Computimes ICT Awards 2004 - WINNER “ ICT Product of the Year” MSC - Asia Pacific ICT Awards 2004 - WINNER “ Best of Applications and Infrastructure Tools” International Asia Pacific ICT Awards 2004 Hong Kong - MERIT AWARD “ Best of Applications and Infrastructure Tools” MSC - APICTA 2003 - MERIT AWARD “ Best of R&D” Asian Innovation Awards 2004 - FINALIST Far East Economic Review “ Improving Productivity, Efficiency & Quality of Life” Asian Conference on Computer Vision 2004 28-30 January 2004, Juju Island, Korea. Detecting Pornographic Images MSC-APICTA 2005, Malaysia - WINNER URLChecker "Best of Application and Infrastructure Tools " . “ Surprisingly, perhaps, it works brilliantly” 4 out of 5 Stars
  • 14. Decision Skin Tone Detection Texture Detection Edge Detection Blob Detection Limb Detection Face Detection Image Processing Neural Network Content-based image processing engine can analyse 100 images per second. Fast filter whilst decoding for speed Image Analysis Achieved by analysing image and video files without need of fully decoding them. Deploys proprietary, International Award winning technology
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.  
  • 20. A Selection of Existing Customers
  • 21. The Extended Product Suite Enterprise - Client / Server application: Captures and analyses everything displayed on the screen and stored within the hard-drive for pornographic material. Text string analysis against forensically sound and proven threat libraries, management of productivity & GCR issues Customizable to suit the needs of organizations. Remote management and viewing of incidences via the Internet. Browser plug-in: Replaces pornographic images in web-pages with a neutral image. Records URLs of pornographic pages visited. Enables user White / Black listing of sites ™ Standalone: Captures and analyses everything displayed on the screen and stored within the hard-drive for pornographic and other unwanted material on a standalone machine. Also controls Internet and application usage and access. URL Checker A robot application that automatically searches out and categorizes websites as being i) highly likely to be pornographic, ii) highly likely to be non-pornographic, or iii) boundary (requiring manual categorisation). It maintains a database of previously categorized websites, allowing the entries to be edited using a web interface and the contents to be exported into a suitably structured file for uploading to third party URL blocking solutions. Designed for ISP & Large Corporate / Educational installation
  • 22. The Extended Product Suite e-safe insurance – specialist insurance : e-safe recognizes that cyber risk impacts materialize in the physical world – e-safe insurance delivers a range of bespoke and specialist insurance products that dove tail with e-safe software solutions – making sure that all bases and risks are answered. More details at www.esafeinsurance.co.uk e-safe law – specialist legal support: As with insurance e-safe recognizes that there are times when quality legal support is essential. e-safe law dove tails quality legal services and support with e-safe software solutions Forensic Services There are times when prevention fails or the problem requires deep investigation – this is where our partnership with Zentek Forensics comes into play; Zentek are the only company in the UK to have both ISO 9001 ISO 27001 and ISO 29001 certification for 'Expert Forensic Examination of Digital Media‘, enabling Zentek to deliver mobile phone forensics and digital forensics, offline and online, as well as computer examination., The Zentek team consists of world class investigators who are experienced expert witnesses, all with judicial experience.

Editor's Notes

  1. The ScreenShield product suite has won awards throughout Asia and is acknowledged as the leading solution to the management and control of visual pornography