SlideShare una empresa de Scribd logo
1 de 71
ensuring the responsible use of IT the value of
e-Safe Business : Powered by Guardware  Email Mobile Phone Social Networking Web Conferencing Instant Messaging The  Organization VOIP As society becomes increasingly connected so organizations of all types and sizes have to adapt to, and take advantage of, the business benefits of online communication, connectivity and collaboration . Balancing Productivity and Compliance
e-Safe Business : Powered by Guardware  This change is accelerating, its scope is broadening and its impact is global. Competition is fierce and recruitment is increasingly difficult Regulatory pressures are escalating Clients are more demanding Acceptable Use Policies Balancing Productivity and Compliance
e-Safe Business : Powered by Guardware  Web Conferencing Social Networking PDAs E-mail Internet Mobile Phone VOIP I.M. Society is hooked on all-pervasive, always-on connectivity. The boundaries between work, social and leisure time are becoming nonexistent .
e-Safe Business : Powered by Guardware  For most of us, not having online access would severely impact our productivity . Productivity For a growing percentage, full time, instant, multi-device connectivity is mission critical. Connectedness For any organization connectedness provides a huge competitive advantage particularly if governed by an ITC Acceptable Use Policy which is integrated into its business vision and strategy. The Organization
e-Safe Business : Powered by Guardware  At the same time workplace demographics are changing Demographics Existing staff members are being replaced by a new generation of knowledge workers Connectedness They have never known a world without the internet, Google, Facebook, YouTube, text messaging and camera phones, they are naturally collaborative and connected. The Organization
e-Safe Business : Powered by Guardware  At the same time workplace demographics are changing Demographics In order to compete for this valuable talent base organizations have to offer an always on, connected, collaborative environment  Connectedness It has to support the way in which the “everyone, everything, everywhere, connected” generation, live and work. The Organization
e-Safe Business : Powered by Guardware  10% 5% 60% 25% 60% use social  networking sites at work More than half of all knowledge workers use social networking sites and online communities for business communications Whilst no one doubts that connectivity, communication and collaboration tools dramatically increase knowledge worker productivity there is the realisation that these same tools increase business risks for the employer. VOIP Web Conferencing Text Messaging
e-Safe Business : Powered by Guardware  How an organization manages these issues and trends could (will) impact on its costs and possibly even its ability to attract clients and recruit talent. There is, therefore, a direct link between a clearly written and applied Acceptable Use Policy, Pro-active HR activity, continuous compliance monitoring and bottom line profit. So What?
e-Safe Business : Powered by Guardware  Manage the behaviour of users These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to:
e-Safe Business : Powered by Guardware  balance security and network reliability These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to: Manage the behaviour of users
e-Safe Business : Powered by Guardware  Maintain  employee productivity and safety These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to: balance security and network reliability Manage the behaviour of users
e-Safe Business : Powered by Guardware  Ensure compliance With  Regulatory rules and guidelines. These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to: Maintain  employee productivity and safety balance security and network reliability Manage the behaviour of users
The risks fall into two main categories: e-Safe Business : Powered by Guardware  ,[object Object],for example lost hours, green computing  issues,  negative media, investor & client consequence ,[object Object],In particular the employees’ right to work within a secure,  regulated and protected online environment together with developing policies and strategies which  help connected employees maintain a work/life balance.
The risks fall into two main categories: e-Safe Business : Powered by Guardware  ,[object Object],In particular the employees’ right to work within a secure,  regulated and protected online environment together with developing policies and strategies which  help connected employees maintain a work/life balance.
[object Object],[object Object],[object Object],[object Object],“ 70% of porn traffic occurs between  9- 5” The Industry Standard “ Worker Internet misuse ‘a problem’: two-thirds of companies have disciplined employees” CBS Marketwarch "The employer is vicariously liable. An employer should make sure that the people it employs know how to behave and if they're causing offence to others then they should do something about it,"  Sarah Veale of the TUC – on BBC Radio "Today's change will force employers to take their responsibilities towards providing a harassment-free working environment more seriously. “ TUC general secretary Brendan Barber
A Personal Threat
Responsible use of IT ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ensuring the responsible use of IT Introducing
Screen Shield™ v3 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],    
Image Analysis ,[object Object],[object Object],[object Object],[object Object],[object Object],Decision Skin Tones Skin Textures Edges Blobs Limbs Faces
Text Analysis ,[object Object],[object Object],[object Object],[object Object]
Webpage Analysis ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Drive Scanning Scan the Hard Drive for pornographic image, file types  and video files
Server clustering ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cascade Management
Features ,[object Object]
WITHOUT  Screen Shield WITH  Screen Shield
[object Object],[object Object],[object Object],Features
 
 
Features ,[object Object],[object Object],[object Object],[object Object]
Features ,[object Object],[object Object],[object Object],[object Object]
Categories  Monitored
Features ,[object Object],[object Object],[object Object],[object Object],[object Object]
Detailed Reports Thumb nail view for easy administration  Who? How? When?
Directing Attention Accidental Addictive
Features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Text Monitoring Number of Chat Violations  By user Each chat session can  be viewed by the administrator
Features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The risks fall into two main categories: e-Safe Business : Powered by Guardware  ,[object Object],for example lost hours, green computing  issues,  negative media, investor & client consequence ,[object Object]
Working Environment  Policies System tray icon
Features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Productivity Reports User productivity measured in percentage
Productivity Report Detailed productivity analysis by time
Features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network Usage Per user network load  Peek network activity break down
Features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hardware Audit Organization wide PC  Hardware resource  captured and categorized PCs recognized by using  MAC addresses Detailed specification of the PCs captured
Detecting HW Misuse Actively monitoring all PC  hardware resources  for changes Detailed description of the changes recorded
Software Audit Organization wide PC software resources captured and categorized Report on illegal software  usage in the organization
Detecting SW Change Detailed description per PC on the licensed and un licensed software Available licenses can be are categorized in to groups for easy management Detecting software changes per user
Features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Drive Scanning Break down of Harddrive usage by each employee
Features ,[object Object],[object Object],[object Object],[object Object],[object Object]
Working Environment  Policies Configurable thresholds for different type of users Enable or disable internet surfing for different users Thumb drive blocking  PC hibernation and shutdown settings Green Computing Benefit – average Office work station can create over 200Kg of  C0 2  per  year  Equal to a passenger flight from London to Paris! www.fixgaia.com
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Working Environment  Policies Configurable application usage for different type of users
Features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Tree Structure for easy PC grouping and administration
Different groups of profiles targeted at different set of users
Features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Application of different profiles for different timings Night hours Working hours  After working hours
Features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary – Uniqueness ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary – Quality ,[object Object],[object Object],[object Object]
Awards & Recognition PIKOM Computimes ICT Awards 2004 -  WINNER “ ICT Product of the Year” MSC - Asia Pacific ICT Awards 2004 - WINNER “ Best of Applications and Infrastructure Tools” International Asia Pacific ICT Awards 2004 Hong Kong - MERIT AWARD “ Best of Applications and Infrastructure Tools” MSC - APICTA 2003 - MERIT AWARD “ Best of R&D” Asian Innovation Awards 2004  -  FINALIST  Far East Economic Review “ Improving Productivity, Efficiency & Quality of Life” Asian Conference on Computer Vision 2004  28-30 January 2004, Juju Island, Korea. Detecting Pornographic Images MSC-APICTA 2005,  Malaysia – WINNER URLChecker   "Best of Application and Infrastructure Tools” APICTA 2008, SS3 - WINNER “ e-Community & e-Inclusion' category” “ Surprisingly, perhaps, it works brilliantly”
[object Object],[object Object],[object Object],[object Object],[object Object],Closing So What
[object Object],[object Object],[object Object],[object Object],[object Object],Closing So What
Questions? [email_address] Ensuring the responsible use of IT

Más contenido relacionado

La actualidad más candente

Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBsGFI Software
 
Web Application Security Trends Report by Cenzic
Web Application Security Trends Report by Cenzic Web Application Security Trends Report by Cenzic
Web Application Security Trends Report by Cenzic diTii
 
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text MiningIRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text MiningIRJET Journal
 
Social Networking In The Workplace Public Version
Social Networking In The Workplace Public VersionSocial Networking In The Workplace Public Version
Social Networking In The Workplace Public VersionBolin Digital
 
EveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidenceEveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidencePaul Richards
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSchleighS
 
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us SolarWinds
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYODJim Sutter
 
An overview of web security
An overview of web securityAn overview of web security
An overview of web securityBee_Ware
 
Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application SecuritySaadSaif6
 
Social Media & Enterprise Security Presentation
Social Media & Enterprise Security PresentationSocial Media & Enterprise Security Presentation
Social Media & Enterprise Security PresentationSchleighS
 
Allow is the New Block
Allow is the New BlockAllow is the New Block
Allow is the New BlockSean Dickson
 
The state of privacy and data security compliance
The state of privacy and data security complianceThe state of privacy and data security compliance
The state of privacy and data security complianceFindWhitePapers
 
The growing hacking threat to websites
The growing hacking threat to websitesThe growing hacking threat to websites
The growing hacking threat to websitesBee_Ware
 

La actualidad más candente (16)

Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 
Web Application Security Trends Report by Cenzic
Web Application Security Trends Report by Cenzic Web Application Security Trends Report by Cenzic
Web Application Security Trends Report by Cenzic
 
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text MiningIRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text Mining
 
Social Networking In The Workplace Public Version
Social Networking In The Workplace Public VersionSocial Networking In The Workplace Public Version
Social Networking In The Workplace Public Version
 
Hybrid Technology
Hybrid TechnologyHybrid Technology
Hybrid Technology
 
The Top Ten Insider Threats And How To Prevent Them
The Top Ten Insider Threats And How To Prevent ThemThe Top Ten Insider Threats And How To Prevent Them
The Top Ten Insider Threats And How To Prevent Them
 
EveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidenceEveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidence
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security Whitepaper
 
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYOD
 
An overview of web security
An overview of web securityAn overview of web security
An overview of web security
 
Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application Security
 
Social Media & Enterprise Security Presentation
Social Media & Enterprise Security PresentationSocial Media & Enterprise Security Presentation
Social Media & Enterprise Security Presentation
 
Allow is the New Block
Allow is the New BlockAllow is the New Block
Allow is the New Block
 
The state of privacy and data security compliance
The state of privacy and data security complianceThe state of privacy and data security compliance
The state of privacy and data security compliance
 
The growing hacking threat to websites
The growing hacking threat to websitesThe growing hacking threat to websites
The growing hacking threat to websites
 

Destacado

Chap 5 online security and payment systems
Chap 5   online security and payment systemsChap 5   online security and payment systems
Chap 5 online security and payment systemsNorisuwanah Jaffar
 
What kind of confidential information can i protect with an nda
What kind of confidential information can i protect with an ndaWhat kind of confidential information can i protect with an nda
What kind of confidential information can i protect with an ndavakilsearch_tutorial
 
Information Risk and Protection
Information Risk and ProtectionInformation Risk and Protection
Information Risk and Protectionxband
 
Bit torrent Technology ppt
Bit torrent Technology pptBit torrent Technology ppt
Bit torrent Technology pptAkshay K Sajan
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security Lokender Yadav
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Benelux
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacyJernej Virag
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technologyabhipesit
 
Using Canary Honeypots for Network Security Monitoring
Using Canary Honeypots for Network Security MonitoringUsing Canary Honeypots for Network Security Monitoring
Using Canary Honeypots for Network Security Monitoringchrissanders88
 
Lecture 8 mail security
Lecture 8 mail securityLecture 8 mail security
Lecture 8 mail securityrajakhurram
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacyPawan Arya
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securityNagendra Um
 
Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 
Network Security Applications
Network Security ApplicationsNetwork Security Applications
Network Security ApplicationsHatem Mahmoud
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network SecurityDr. Rupa Ch
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 

Destacado (19)

Chap 5 online security and payment systems
Chap 5   online security and payment systemsChap 5   online security and payment systems
Chap 5 online security and payment systems
 
What kind of confidential information can i protect with an nda
What kind of confidential information can i protect with an ndaWhat kind of confidential information can i protect with an nda
What kind of confidential information can i protect with an nda
 
Information Risk and Protection
Information Risk and ProtectionInformation Risk and Protection
Information Risk and Protection
 
Bit torrent Technology ppt
Bit torrent Technology pptBit torrent Technology ppt
Bit torrent Technology ppt
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technology
 
Using Canary Honeypots for Network Security Monitoring
Using Canary Honeypots for Network Security MonitoringUsing Canary Honeypots for Network Security Monitoring
Using Canary Honeypots for Network Security Monitoring
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Lecture 8 mail security
Lecture 8 mail securityLecture 8 mail security
Lecture 8 mail security
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Big Data Security and Governance
Big Data Security and GovernanceBig Data Security and Governance
Big Data Security and Governance
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network Security Applications
Network Security ApplicationsNetwork Security Applications
Network Security Applications
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network Security
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 

Similar a Network GRC Delivery

Audit PC content
Audit PC content Audit PC content
Audit PC content iansadler
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessGreg Wartes, MCP
 
Proxy For employee monitoring
Proxy  For employee monitoringProxy  For employee monitoring
Proxy For employee monitoringProxies Rent
 
IRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat ApplicationIRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat ApplicationIRJET Journal
 
Protection for Single PCs
Protection for Single PCsProtection for Single PCs
Protection for Single PCsiansadler
 
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)ChristopherAntonius
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...Dana Gardner
 
Web Application Security - Everything You Should Know
Web Application Security - Everything You Should KnowWeb Application Security - Everything You Should Know
Web Application Security - Everything You Should KnowNarola Infotech
 
Faster In The Cloud
Faster In The CloudFaster In The Cloud
Faster In The CloudPeter Coffee
 
10 web application security best practices for 2020
10 web application security best practices for 202010 web application security best practices for 2020
10 web application security best practices for 2020developeronrents
 
Enterprise Mobile: The Prosumer Impact On Business
Enterprise Mobile: The Prosumer Impact On BusinessEnterprise Mobile: The Prosumer Impact On Business
Enterprise Mobile: The Prosumer Impact On BusinessJonathan Stark
 
Cyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityCyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityRahul Tyagi
 
Rc corporate profile_ss
Rc corporate profile_ssRc corporate profile_ss
Rc corporate profile_ssSeema Abhilash
 

Similar a Network GRC Delivery (20)

Cyber Security for Financial Institutions
Cyber Security for Financial InstitutionsCyber Security for Financial Institutions
Cyber Security for Financial Institutions
 
Audit PC content
Audit PC content Audit PC content
Audit PC content
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 
Proxy For employee monitoring
Proxy  For employee monitoringProxy  For employee monitoring
Proxy For employee monitoring
 
BPOS sales deck
BPOS sales deckBPOS sales deck
BPOS sales deck
 
IRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat ApplicationIRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat Application
 
Protection for Single PCs
Protection for Single PCsProtection for Single PCs
Protection for Single PCs
 
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
 
Web Application Security - Everything You Should Know
Web Application Security - Everything You Should KnowWeb Application Security - Everything You Should Know
Web Application Security - Everything You Should Know
 
Proxy
ProxyProxy
Proxy
 
FaceTime Web 2.0
FaceTime Web 2.0FaceTime Web 2.0
FaceTime Web 2.0
 
Proxy
ProxyProxy
Proxy
 
Faster In The Cloud
Faster In The CloudFaster In The Cloud
Faster In The Cloud
 
10 web application security best practices for 2020
10 web application security best practices for 202010 web application security best practices for 2020
10 web application security best practices for 2020
 
Enterprise Mobile: The Prosumer Impact On Business
Enterprise Mobile: The Prosumer Impact On BusinessEnterprise Mobile: The Prosumer Impact On Business
Enterprise Mobile: The Prosumer Impact On Business
 
Cyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityCyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe Security
 
Presentation at Chase 2010 by John Martinez Shocklogic
Presentation at Chase 2010 by John Martinez ShocklogicPresentation at Chase 2010 by John Martinez Shocklogic
Presentation at Chase 2010 by John Martinez Shocklogic
 
Rc corporate profile_ss
Rc corporate profile_ssRc corporate profile_ss
Rc corporate profile_ss
 

Network GRC Delivery

  • 1. ensuring the responsible use of IT the value of
  • 2. e-Safe Business : Powered by Guardware Email Mobile Phone Social Networking Web Conferencing Instant Messaging The Organization VOIP As society becomes increasingly connected so organizations of all types and sizes have to adapt to, and take advantage of, the business benefits of online communication, connectivity and collaboration . Balancing Productivity and Compliance
  • 3. e-Safe Business : Powered by Guardware This change is accelerating, its scope is broadening and its impact is global. Competition is fierce and recruitment is increasingly difficult Regulatory pressures are escalating Clients are more demanding Acceptable Use Policies Balancing Productivity and Compliance
  • 4. e-Safe Business : Powered by Guardware Web Conferencing Social Networking PDAs E-mail Internet Mobile Phone VOIP I.M. Society is hooked on all-pervasive, always-on connectivity. The boundaries between work, social and leisure time are becoming nonexistent .
  • 5. e-Safe Business : Powered by Guardware For most of us, not having online access would severely impact our productivity . Productivity For a growing percentage, full time, instant, multi-device connectivity is mission critical. Connectedness For any organization connectedness provides a huge competitive advantage particularly if governed by an ITC Acceptable Use Policy which is integrated into its business vision and strategy. The Organization
  • 6. e-Safe Business : Powered by Guardware At the same time workplace demographics are changing Demographics Existing staff members are being replaced by a new generation of knowledge workers Connectedness They have never known a world without the internet, Google, Facebook, YouTube, text messaging and camera phones, they are naturally collaborative and connected. The Organization
  • 7. e-Safe Business : Powered by Guardware At the same time workplace demographics are changing Demographics In order to compete for this valuable talent base organizations have to offer an always on, connected, collaborative environment Connectedness It has to support the way in which the “everyone, everything, everywhere, connected” generation, live and work. The Organization
  • 8. e-Safe Business : Powered by Guardware 10% 5% 60% 25% 60% use social networking sites at work More than half of all knowledge workers use social networking sites and online communities for business communications Whilst no one doubts that connectivity, communication and collaboration tools dramatically increase knowledge worker productivity there is the realisation that these same tools increase business risks for the employer. VOIP Web Conferencing Text Messaging
  • 9. e-Safe Business : Powered by Guardware How an organization manages these issues and trends could (will) impact on its costs and possibly even its ability to attract clients and recruit talent. There is, therefore, a direct link between a clearly written and applied Acceptable Use Policy, Pro-active HR activity, continuous compliance monitoring and bottom line profit. So What?
  • 10. e-Safe Business : Powered by Guardware Manage the behaviour of users These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to:
  • 11. e-Safe Business : Powered by Guardware balance security and network reliability These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to: Manage the behaviour of users
  • 12. e-Safe Business : Powered by Guardware Maintain employee productivity and safety These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to: balance security and network reliability Manage the behaviour of users
  • 13. e-Safe Business : Powered by Guardware Ensure compliance With Regulatory rules and guidelines. These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to: Maintain employee productivity and safety balance security and network reliability Manage the behaviour of users
  • 14.
  • 15.
  • 16.
  • 18.
  • 19. Ensuring the responsible use of IT Introducing
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. Drive Scanning Scan the Hard Drive for pornographic image, file types and video files
  • 25.
  • 27.
  • 28. WITHOUT Screen Shield WITH Screen Shield
  • 29.
  • 30.  
  • 31.  
  • 32.
  • 33.
  • 35.
  • 36. Detailed Reports Thumb nail view for easy administration Who? How? When?
  • 38.
  • 39. Text Monitoring Number of Chat Violations By user Each chat session can be viewed by the administrator
  • 40.
  • 41.
  • 42. Working Environment Policies System tray icon
  • 43.
  • 44. Productivity Reports User productivity measured in percentage
  • 45. Productivity Report Detailed productivity analysis by time
  • 46.
  • 47. Network Usage Per user network load Peek network activity break down
  • 48.
  • 49. Hardware Audit Organization wide PC Hardware resource captured and categorized PCs recognized by using MAC addresses Detailed specification of the PCs captured
  • 50. Detecting HW Misuse Actively monitoring all PC hardware resources for changes Detailed description of the changes recorded
  • 51. Software Audit Organization wide PC software resources captured and categorized Report on illegal software usage in the organization
  • 52. Detecting SW Change Detailed description per PC on the licensed and un licensed software Available licenses can be are categorized in to groups for easy management Detecting software changes per user
  • 53.
  • 54. Drive Scanning Break down of Harddrive usage by each employee
  • 55.
  • 56. Working Environment Policies Configurable thresholds for different type of users Enable or disable internet surfing for different users Thumb drive blocking PC hibernation and shutdown settings Green Computing Benefit – average Office work station can create over 200Kg of C0 2 per year Equal to a passenger flight from London to Paris! www.fixgaia.com
  • 57.
  • 58.
  • 59. Working Environment Policies Configurable application usage for different type of users
  • 60.
  • 61. Tree Structure for easy PC grouping and administration
  • 62. Different groups of profiles targeted at different set of users
  • 63.
  • 64. Application of different profiles for different timings Night hours Working hours After working hours
  • 65.
  • 66.
  • 67.
  • 68. Awards & Recognition PIKOM Computimes ICT Awards 2004 - WINNER “ ICT Product of the Year” MSC - Asia Pacific ICT Awards 2004 - WINNER “ Best of Applications and Infrastructure Tools” International Asia Pacific ICT Awards 2004 Hong Kong - MERIT AWARD “ Best of Applications and Infrastructure Tools” MSC - APICTA 2003 - MERIT AWARD “ Best of R&D” Asian Innovation Awards 2004 - FINALIST Far East Economic Review “ Improving Productivity, Efficiency & Quality of Life” Asian Conference on Computer Vision 2004 28-30 January 2004, Juju Island, Korea. Detecting Pornographic Images MSC-APICTA 2005, Malaysia – WINNER URLChecker "Best of Application and Infrastructure Tools” APICTA 2008, SS3 - WINNER “ e-Community & e-Inclusion' category” “ Surprisingly, perhaps, it works brilliantly”
  • 69.
  • 70.
  • 71. Questions? [email_address] Ensuring the responsible use of IT

Notas del editor

  1. As society becomes increasingly connected so professional service firms have to adapt to and take advantage of the business benefits of online communication, connectivity and collaboration.
  2. This change is accelerating, its scope is broadening and its impact is global. Clients are more demanding, regulatory pressures are escalating, competition is fierce and recruitment is increasingly difficult.
  3. Our society is hooked on all-pervasive, always-on connectivity. The boundaries between work, social and leisure time are becoming nonexistent. The Internet, camera phones, VOIP, instant messaging, social networking and PDAs are used by an increasing number of us in our daily lives for work, social and leisure activities.
  4. For most of us, not having online access would severely impact our productivity. For a growing percentage, full time, instant, multi-device connectivity is mission critical. For law firms connectedness provides a huge competitive advantage particularly if governed by an ITC Acceptable Use Policy which is integrated into its business vision and strategy.
  5. At the same time workplace demographics are changing as less Internet savvy baby boomers retire and a new generation of knowledge workers, who have never known a world without the internet, Google, Facebook, YouTube, text messaging and camera phones join and progress through the workforce.
  6. In order to compete for this valuable talent base law firms have to offer an always on, connected, collaborative environment which supports the way in which the “everyone, everything, everywhere connected” generation live and work.
  7. More than half of all knowledge workers use social networking sites and online communities for business communications. Whilst no one doubts that connectivity, communication and collaboration tools dramatically increase knowledge worker productivity there is the realisation that these same tools increase business risks for the employer.
  8. It’s this “credit score” and the trends contained within the score which could impact on a firms insurance costs and possibly even its ability to recruit talent. There is therefore a direct link between a clearly written Acceptable Use Policy, compliance and profit.
  9. These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to manage the behaviour of users whilst balancing security and network reliability with employee productivity and safety.
  10. These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to manage the behaviour of users whilst balancing security and network reliability with employee productivity and safety.
  11. These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to manage the behaviour of users whilst balancing security and network reliability with employee productivity and safety.
  12. These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to manage the behaviour of users whilst balancing security and network reliability with employee productivity and safety.
  13. These risks fall into two main categories: (1) The risk of reputational damage as a result of, for example, the loss of client data or IP contravention. (2) HR issues, in particular the employees’ right to work within a secure, regulated and protected online environment together with developing policies and strategies which help connected employees maintain a work/life balance.
  14. These risks fall into two main categories: (1) The risk of reputational damage as a result of, for example, the loss of client data or IP contravention. (2) HR issues, in particular the employees’ right to work within a secure, regulated and protected online environment together with developing policies and strategies which help connected employees maintain a work/life balance.
  15. Like it or not alongside its undoubted benefits the Internet delivers access to a range of undesirable diversions from productive educational output. At the top of the list must be the instant access delivered to Sex sites and Pornography. Pure curiosity can draw even the most honest and up right to explore and even the most innocent of word combinations can lead to Internet sites that offer Pornography far far worse than anything available in Soho or a Licensed Sex Shop. Once such images are downloaded onto your PC network the problem faced becomes acute - as do the legal responsibilities you carry , both as guardian to your students and as an employer.
  16. These risks fall into two main categories: (1) The risk of reputational damage as a result of, for example, the loss of client data or IP contravention. (2) HR issues, in particular the employees’ right to work within a secure, regulated and protected online environment together with developing policies and strategies which help connected employees maintain a work/life balance.
  17. The ScreenShield product suite has won awards throughout Asia and is acknowledged as the leading solution to the management and control of visual pornography