0% found this document useful (0 votes)
173 views30 pages

IP-guard Presentation Slides

The document summarizes an IP-guard desktop management system that provides information security solutions and behavior management solutions for corporations. It protects confidential information in documents and monitors computer usage to control company resources. The basic system has agent modules, console modules, and server modules. It supports multi-language and flexible policies. Major clients are in government, Hong Kong, and China across various industries.

Uploaded by

Rendy Aldo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
173 views30 pages

IP-guard Presentation Slides

The document summarizes an IP-guard desktop management system that provides information security solutions and behavior management solutions for corporations. It protects confidential information in documents and monitors computer usage to control company resources. The basic system has agent modules, console modules, and server modules. It supports multi-language and flexible policies. Major clients are in government, Hong Kong, and China across various industries.

Uploaded by

Rendy Aldo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 30

Security Challenge of Computerized Corporation

Stealing
Information
Confidential Information
Potential Security Risks
Disclosure Spy ware
Illegal Access
Hacker tools System patches and
Movable Storage · Email
vulnerabilities
Instant Message · P2P
Virus
Dialup · Printout
Malice delete and changes

Core Product Design


Key Customer
Information
Sensitive Financial
Information
Drawbacks of Information Technology

Play games · Trade Stocks · Chat Online

Browse Web Pages · Print Personal Stuffs

Online Movies · Radio · Download Music

Cannot Troubleshoot Remote Computer

Cannot Track Computer Assets Changes

Administrator Faces Heavy Workload


IP-guard Desktop Management System

Protect Information

IP-guard Limit Activities


Core Value
Control Information

Plan Resources
Different Modules Suit for Different Corporations Needs

Document Operation Printing Management Device Management


Management

Network Control Application Management Website Management

E-Mail Management Instant Message Screen Snapshots


Management

Bandwidth Asset Management Remote


Management Maintenance

Removable Storage
Management
Document Operation Management
• Document Operation Logs
• Record document operations including create, access, Edit, Copy, Move,
Delete

• Record document operations on movable storages and network paths

• Record document operations of other computers on documents in local


shares

• Document Policy
• Control access of key documents

• Prevent illegal copy to movable storages and network

• Backup important document after edit or delete


Removable Storage Management
• Removable Storage device File/Full Disk
Encryption / Decryption

• Removable Storage devices Authorization


uses

• only the authorized devices can encrypt


and decrypt the files

• computers without authorization cannot


open the encrypted file properly
Application Management
• Application logs and statistic
• Record application startup and shut down

• Record window changes and title changes to track


computer usage

• Application statistic to estimate staffs efficiency

• Application Policy
• Stop games and chat programs

• Stop malice programs


Website Management
• Web Statistic
• Summarized types of website visited to estimate
Internet usage

• Web Logs
• Record website URL and title in detail

• Web Policy
• Block websites irrelevant to work

• Block websites with harmful messages


EMail Management
• EMail Record
• Record normal email, webmail, exchange, and Lotus Notes mail.

• Record complete email message and attachments

• EMail Policy
• Limit sender accounts

• Block specific recipients

• Block email with attachment of specific file name or exceed


certain size
Instant Message Management
• Instant Message Record
• Record full content of the IM session

Instant message
• IM File Policy
• Limit outgoing file name or file type

• Limit outgoing file size

• Backup outgoing files


Printing Management
• Print Logs

• Record information on printing application, printer, user and


document name

• Record pages printed to estimate usage

• Printing Policy

• Block Illegal application from printing

• Block printing on specific printer

• Backup printed out document in JPEG format


Screen Snapshot
• Real Time Monitoring
• View agent screen in real time

• Support multi-monitors

• Multi-screen function to view several computer at one time

• Snapshot History
• Completely record screen history for future analyze

• Set different snapshot frequency on different application to


focus on some sensitive information

• Optimized storage by compression


Device Management
• Storage Control
• Control usage of storage

(Floppy· CD· USB· Movable storage· Memory card ...)

• Communication Device Control


• Control data transfer to external ports or devices

(Serial port· Parallel port· MODEM· Infrared· Bluetooth· Direct


connection· Dialup)

• Other Device Control


Control USB devices, Wireless card, or other new devices.
Network Control
• Network Communication Control
• Provide firewall functions to control communication of specific
address and port

• Eliminate the use of specific port and communicate with


unauthorized computers

• IP/MAC Binding
•Prevent users from changing network setting

• Intrusion Detection
•Scan the whole network and prevent illegal access to the
network
Bandwidth Management
• Network Traffic Statistic
• Show network traffic statistic by IP

• Show network traffic statistic by ports

• Analyze data in specific time zone

• Network Traffic Policy


• Assign different bandwidth to different IP and ports

• Prevent BT,P2P,network media, and download tools to


use up network resources
Asset Management
• Manage Hardware and Software
• Complete hardware and software
information

• Detail asset change history

• Self defined properties to add additional


information to the asset

• Self defined asset to add non-computer


assets for standardize management
Remote Maintenance
• Real Time Maintenance
• View agents’ system messages in real time

• Remote diagnostic agent’s problems and check


system status

• Remote Control
• Easy assist users and demonstrate system
operation to users

• Remote File Transfer


• Remote file transfer help administrators to collect
and update files more efficiently
IP-guard

Multi- Easy Flexible Classes


Language Management Policy System

Support Multi- Can be managed by Policies are set with Custom


Language for computer or by user. combination of defined classes
multi-national Each with multi-level group inherited to be used
corporation grouping and audit policy, normal policy, throughout the
trail and offline policy system
Information Security Solution &
Behavior Management Solution
Confidential information such as source codes, chemical formulas, and
design blue prints are saved in documents. Therefore, document
security is the core of information security.

Monitor and control computer usage of


employees. Plan network resources
accordingly to ensure company resources
are effectively used.
Basic Architecture

Server
Module

Agent Agent Console


Module Module Module
Common System Architecture Deployment
Minimum Requirement

Agent Module Console Module Server Module

• Pentium III 500 • Pentium III 1G • Pentium 4 2G


• 128MB Memory • 256MB Memory • 512MB Memory
• 1G HDD • 4G HDD • 200GB HDD
• OS • OS • OS
Win NT4 Win2000 / XP Win2000 SP4 / XP SP2
Win2000 / XP Win2003 / Vista / Win2003 SP1 / Win 2008
Win2003 / Vista / Win 7 • Database
Win 7 SQL Server 2000 SP4 /
2005 SP1 / MSDE /
2005 /2008R2(Express)
Major Clients in Government & Related Organization

Independent Commission Hong Kong Jewellery and Jade


Against Corruption Manufacturers Association

The Treasury
The Government of the Hong Kong Special
Administrative Region
Major Clients in Hong Kong
Major Clients in Hong Kong

Defond Group John Manufacturing Ltd

Nine Dragons Paper


IDT International Limited
(Holdings) Limited

VTech Holdings Ltd Kowloon Engineering Ltd.

China Aerospace International Holdings Ltd.

GAM Hong Kong Limited

NAM TAI ELECTRONIC & ELECTRICAL PRODUCTS LIMITED


Major Clients in China
China Telecom Corporation
China Mobile Ltd.
Limited

China Unicom Petro China Company Limited

Hangzhou Wahaha Group Co., Ltd.

China Aerospace Science and Technology Corporation (CASC)


Major Clients in China

Shandong Xinhua Pharmaceutical Co., Ltd.

Kao (China) Holding Company Ltd. LIBY Group Co. Ltd.


Major Clients in China
Shanghai Metersbonwe Fashion and Accessories Co.,Ltd

Beyond Home Textile


Thank you for your interest and support to
our product

Thank You!

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy