SlideShare a Scribd company logo
1 of 51
1
Take control of your IT Infra-structure.
OwnyIT is an easy to deploy and use IT Infrastructure Management
system for:
 Cyber Security Audit,
 Desktops Monitoring,
 Policy enforcement ,
 IT Inventory,
 Security Incident and Event Management,
 Remote Access and Management
2
ABOUT OWNYIT CSAT
A simple system to address your complete IT infrastructure needs.
Central Console for…
 Monitoring
 Reporting
 Remote Access
 Manage applications
 Hardware & Software Inventory
 Monitoring system logs like event log and syslog
3
Benefits to your organization
4
Asset & Change Management Cyber Security Audit
Desired Configuration Management Data leak Protection and Audit
Software License Monitoring Policy Enforcement
Application Management Network Access Control (NAC)
System User Management Security Incident and Event Management
(SIEM)
System Log/Syslog Monitoring Secure Remote Audit and Management
Rule based Monitoring and Controlling Service Level Agreement (SLA) Management
Print Management Reports
Asset and Change Management
 Real time view of hardware and software assets .
 Allows you to know where the hardware assets are deployed and what these
are being used for.
 Microsoft software with its license key information.
 Checks the actual software licenses installed against purchased.
 Identify assets which are not available or operational, due to:
o Theft
o Failure
o Obsolescence
5
Assets Inventory
6
Change Management
 Detect the changes in Hardware Assets due to theft, failure or non availability,
immediately.
 Detect the Changes in software (install/uninstall) immediately.
 Repository of the change available for the future.
 Typical Benefits:
o Reduce the response time and hence the affect of the changes is
reduced.
o Immediate notification on authorized Hardware/Software
installation/removal.
7
Change Management
8
Desired Configuration Management
 Define desired hardware/software configuration of Desktops/ Servers
 Allows authorized Hardware/ Software configured/installed on the machine.
 If unauthorized software/hardware found:
o Make the machine to non-comply,
o The machine will not communicate with other machines in the network.
9
Desired Configuration Management
10
Software License Monitoring
 Get exact information of where the licensed software is deployed and which
systems are not registered.
 Licensing information (Product Key + CD Key) for the Microsoft’s softwares
installed in the network.
 Typical Benefits:
o Checks the actual software licenses installed in the network against
purchased.
o Reduce the cost through efficient software license usage and monitoring.
11
Software License Monitoring
12
Application Monitoring
 Monitor and Manage application usage on a single or a number of
systems/servers.
 Provides location of installed applications.
 Identify and stop non-essential processes.
 Identify malicious processes.
 Typical Benefits:
o Action can be taken based on the violation of the policy.
13
Application Monitoring
14
Data Leakage Protection
 Notification/Alert on the data communication happening with external storage
devices/media.
 Get information about files (Not content) transferred to/from machine to/from
external media.
 Blocking of USB Ports, external storage devices, CD Drives, Printer, Wi-Fi,
Bluetooth devices, USB Modem/Data Card and etc to protect the data.
 On demand file enumeration report to get media files, photographs, Word/Excel/
PowerPoint files and other files exists in the machine.
 Typical Benefits:
o Protect the data from spreading outside the organization.
o Closely monitor data communication happening across organization.
15
Data Leakage Protection
16
Data Leakage Protection
17
 USB Media usage Report
Policy Enforcement
 Enabling and disabling of external devices for protecting data like:
o USB Ports/ Storage Devices/ Printer,
o Dialup Modem,
o Printer,
o Floppy Drive,
o CD/DVD Drive,
o Bluetooth,
o Wi-Fi,
o Other external devices
 Policy for monitoring/managing authorized software installed on the
machine.
 Restrict user from changing IP Address of the machine.
18
Policy Enforcement
19
Security
 Hardware blocking and set access permissions:
o Blocking of USB modem for connecting to Internet.
o Blocking of USB, CD and other external Media.
 Report of add/remove of media like USB, CD drive.
 Communication from/to Removal Media.
 Immediate alarm and report on usage of removable media.
 Facility to prohibit every removable media and set selective permission.
 Report of removable media used in machine including the file
transferred with size, type, and etc without vision in to contents.
20
Security (Contd …)
 Anti Virus:
o Status of Anti Virus upgrade like successful /failure.
o Virus found with name of virus and other details.
 OS Patches information.
 Unauthorized access/attempt to OS utilities to be monitored and
reported (e.g. Control Panel, System32 Folder, Registry access and etc)
 System Firewall Status (On/Off)
21
Security
22
Security
23
User Management
 Report on all Guest/ Normal /Administrator user accounts configured on
each machine:
o List of Users, which has administrative privileges.
 Policy for disabling/deleting users from the central console.
 Report of:
o User wise Login-Logout details,
o System Start-up shutdown details,
o User Activities while network is off or machines goes out off
network.
24
User Management (Contd …)
 Password Management:
 Provides report on weak password set by the user
 Provides information about Screen Saver password
 Report of unsuccessful login attempts by the user
25
User Management
26
Network Security
 Real time report on if a machine has accessed internet using
modem, dial up connection, data card and etc.
 Generates notification/alert when a machine has
connected/accessed unauthorized IP Address/machine.
 Block access of unauthorized IP Address and network port.
 History of all network operations like which application
used/opened network ports and etc..
 Reporting of offline violations immediately on connection.
27
Network Security
28
Network Access Control (NAC)
 Define network policy for only Group of PCs or selected PCs should
communicate with each other.
 Newly added/discovered device/PC should not communicate with any other
PC in the network, untill Admistrator authorized it.
 Facilities block/deny access of selected devices/PCs in the network.
29
Network Access Control (NAC)
30
System Events/Logs Monitoring
 Monitors various system events/logs like:
o Application Events,
o Security Events,
o System Events
 Check whether any security incident/event is generated
 Incorporate the system logs, events and alerts into a single data store, so
consolidated data analysis can be done later.
31
System Log/Event Monitoring
32
Security Incident/Event Monitoring (SIEM)
 System should take one or multiple security incidents or events from the
multiple sources/devices.
 To generate a single Security Incident Event based on single/ multiple
security incidents or events.
 The Security Incident Event will categories based on the categories/sub-
categories defined in the organization.
 Automatically generates notification/service requests/ tickets when any
security event/incident occurred.
33
Security Incident/Event Monitoring (SIEM)
34
Service Level Agreement Management (SLA)
 Define time period needed for Security Request/Tickets to be handled or
closed by the engineer.
 If the Security Request/Ticket is not closed, then:
o It will be automatically escalated to the next level of expert/engineer,
o Suitable emails/SMS will be send to the Admin and the higher
authorities (as defined by the Security incident handling policy).
35
Service Level Agreement Management (SLA)
36
Software/Patch Management
 Deploy software and software patches from central console.
 Any MSI based Software/Patch deployment, which does not required user
interaction.
 Command line supported any EXE based software/patch deployment.
 Command line based Registry update/Script file execution.
 Typical Benefits:
o Reduce the time of deploying software at scattered locations.
37
Software/Patch Management
38
Secure Power Management
 Apply network, group or PC wise following policies for those machines,
which have been idle for specific time:
o Turn OFF,
o Hibernate,
o Standby
 Single console for achieving the Green Computing needs of IT infrastructure.
39
Secure Power Management
40
Secure Remote Audit & Management
 Single console for comprehensive remote management.
 Secure remote access of Desktop/Servers for trouble-shooting, provisioning
and management.
 Typical Benefits:
o Faster problem identification and resolution,
o Facility to record actions taken by the engineer,
o Clear responsibility allocation and track of action taken by IT support
staff. Resulting in less blame-game involving the IT Support Team,
o Lower training time and cost for new IT Support Team members
41
Secure Remote Audit & Management
42
Secure Remote Audit & Management
43
Print Management
 Tracking of all files with name, size, path and etc being printed by the
user.
44
Reports
 Inventory Reports like:
o Desktop Assets like …
 Hard disk ID,
 BIOS information,
 Motherboard,
 no. of HDD ,
 RAM slot
o Create and maintain Inventory of storage media, Laptops, Desktop and etc.
o Report of hardware and software changes are made.
o Detects and stores the make, model, serial number etc. of hardware assets.
 Reports of product keys of installed Microsoft’s software.
45
Reports (Contd …)
 Provides report:
o Agent installation,
o Shared Resources,
o Printing information,
o Processes and services running on the machine,
o Activities performed by the User.
 All reports are provided on a single console.
 Reporting to address your complete IT Infrastructure reporting needs.
 Export to Excel/ PDF format for further analysis and sharing.
46
Reports
47
Reports
48
Conclusion
 Simple to Implement and easy to use.
 Get control of your IT Infrastructure spread across different departments
and locations.
 Enforce IT policy
 Made in India for Indian IT Environment.
49
Our valued Customers
50
THANK YOU
51
23,N.S.ROAD
KOLKATA- 700001
Cont.Dets.: Manoj Singh
Cont.No: 09331230629/03366336500/24
E-mail: manoj.singh@ncs.net.in / sales@ncs.net.in

More Related Content

What's hot (20)

Forti cloud
Forti cloudForti cloud
Forti cloud
 
Fortigate fortiwifi-80f-series
Fortigate fortiwifi-80f-seriesFortigate fortiwifi-80f-series
Fortigate fortiwifi-80f-series
 
Fortinet security fabric
Fortinet security fabricFortinet security fabric
Fortinet security fabric
 
Forti wifi
Forti wifiForti wifi
Forti wifi
 
STATE OF ALABAMA Information Technology Guideline
STATE OF ALABAMA Information Technology GuidelineSTATE OF ALABAMA Information Technology Guideline
STATE OF ALABAMA Information Technology Guideline
 
Fortinet sandboxing
Fortinet sandboxingFortinet sandboxing
Fortinet sandboxing
 
Firewall
FirewallFirewall
Firewall
 
Identify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilitiesIdentify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilities
 
Firewall Basing
Firewall BasingFirewall Basing
Firewall Basing
 
Genian NAC Datasheet
Genian NAC Datasheet Genian NAC Datasheet
Genian NAC Datasheet
 
Fortinet
FortinetFortinet
Fortinet
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewalls
FirewallsFirewalls
Firewalls
 
Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix Firewall
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point Firewalls
 
Panda Security - Gatedefender
Panda Security - GatedefenderPanda Security - Gatedefender
Panda Security - Gatedefender
 
Outpost networksecurity
Outpost networksecurityOutpost networksecurity
Outpost networksecurity
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Vpn
VpnVpn
Vpn
 
Inside forti os-v524-r5
Inside forti os-v524-r5Inside forti os-v524-r5
Inside forti os-v524-r5
 

Similar to OwnYIT CSAT + SIEM

Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence SystemJoseph Yosi Margalit
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistNCS Computech Ltd.
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPJavier Arrospide
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPNetwork_security
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1bora.gungoren
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidencerakesh mishra
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
 
USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9Javier Arrospide
 
Absolute Software Governance-Risk-Compliance
Absolute Software Governance-Risk-ComplianceAbsolute Software Governance-Risk-Compliance
Absolute Software Governance-Risk-ComplianceSébastien Roques
 
Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...Lumension
 
Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner
Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner
Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner BusinesstoVirtual
 
Sanctuary Device Control
Sanctuary Device ControlSanctuary Device Control
Sanctuary Device ControlHassaanSahloul
 
Effects of IT on internal controls
Effects of IT on internal controlsEffects of IT on internal controls
Effects of IT on internal controlsLou Foja
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatanceKudzi Chikwatu
 
Security and management
Security and managementSecurity and management
Security and managementArtiSolanki5
 

Similar to OwnYIT CSAT + SIEM (20)

Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence System
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring Featurelist
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9
 
Absolute Software Governance-Risk-Compliance
Absolute Software Governance-Risk-ComplianceAbsolute Software Governance-Risk-Compliance
Absolute Software Governance-Risk-Compliance
 
Absolute grc-
Absolute grc-Absolute grc-
Absolute grc-
 
usb-lock-rp-en
usb-lock-rp-enusb-lock-rp-en
usb-lock-rp-en
 
Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...
 
Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner
Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner
Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner
 
Sanctuary Device Control
Sanctuary Device ControlSanctuary Device Control
Sanctuary Device Control
 
Effects of IT on internal controls
Effects of IT on internal controlsEffects of IT on internal controls
Effects of IT on internal controls
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatance
 
Security and management
Security and managementSecurity and management
Security and management
 
Ch11
Ch11Ch11
Ch11
 
Ch11 system administration
Ch11 system administration Ch11 system administration
Ch11 system administration
 
Windows Security
Windows Security Windows Security
Windows Security
 

More from NCS Computech Ltd. (16)

CRM
CRMCRM
CRM
 
Qnap Brochure
Qnap BrochureQnap Brochure
Qnap Brochure
 
CRM
CRMCRM
CRM
 
Enjay Synapse Mobile
Enjay Synapse MobileEnjay Synapse Mobile
Enjay Synapse Mobile
 
Enjay Synapse features
Enjay Synapse featuresEnjay Synapse features
Enjay Synapse features
 
Sanako study1200-v.-7.10-product-presentation
Sanako study1200-v.-7.10-product-presentationSanako study1200-v.-7.10-product-presentation
Sanako study1200-v.-7.10-product-presentation
 
Enjay NAS
Enjay NASEnjay NAS
Enjay NAS
 
Netis Products
Netis ProductsNetis Products
Netis Products
 
Eset TOP10 USP
Eset TOP10 USPEset TOP10 USP
Eset TOP10 USP
 
NComputing Product Presentation X550
NComputing Product Presentation X550NComputing Product Presentation X550
NComputing Product Presentation X550
 
NComputing product presentation M300
NComputing product presentation M300NComputing product presentation M300
NComputing product presentation M300
 
NComputing Product Presentation
NComputing Product PresentationNComputing Product Presentation
NComputing Product Presentation
 
Smart notebook 2014 software guidlines
Smart notebook 2014 software guidlinesSmart notebook 2014 software guidlines
Smart notebook 2014 software guidlines
 
Smart notebook 2014 software admin guidlines
Smart notebook 2014 software admin guidlinesSmart notebook 2014 software admin guidlines
Smart notebook 2014 software admin guidlines
 
480iv fact sheet education
480iv fact sheet education480iv fact sheet education
480iv fact sheet education
 
Smart board 480
Smart board 480Smart board 480
Smart board 480
 

Recently uploaded

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Recently uploaded (20)

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

OwnYIT CSAT + SIEM

  • 1. 1
  • 2. Take control of your IT Infra-structure. OwnyIT is an easy to deploy and use IT Infrastructure Management system for:  Cyber Security Audit,  Desktops Monitoring,  Policy enforcement ,  IT Inventory,  Security Incident and Event Management,  Remote Access and Management 2
  • 3. ABOUT OWNYIT CSAT A simple system to address your complete IT infrastructure needs. Central Console for…  Monitoring  Reporting  Remote Access  Manage applications  Hardware & Software Inventory  Monitoring system logs like event log and syslog 3
  • 4. Benefits to your organization 4 Asset & Change Management Cyber Security Audit Desired Configuration Management Data leak Protection and Audit Software License Monitoring Policy Enforcement Application Management Network Access Control (NAC) System User Management Security Incident and Event Management (SIEM) System Log/Syslog Monitoring Secure Remote Audit and Management Rule based Monitoring and Controlling Service Level Agreement (SLA) Management Print Management Reports
  • 5. Asset and Change Management  Real time view of hardware and software assets .  Allows you to know where the hardware assets are deployed and what these are being used for.  Microsoft software with its license key information.  Checks the actual software licenses installed against purchased.  Identify assets which are not available or operational, due to: o Theft o Failure o Obsolescence 5
  • 7. Change Management  Detect the changes in Hardware Assets due to theft, failure or non availability, immediately.  Detect the Changes in software (install/uninstall) immediately.  Repository of the change available for the future.  Typical Benefits: o Reduce the response time and hence the affect of the changes is reduced. o Immediate notification on authorized Hardware/Software installation/removal. 7
  • 9. Desired Configuration Management  Define desired hardware/software configuration of Desktops/ Servers  Allows authorized Hardware/ Software configured/installed on the machine.  If unauthorized software/hardware found: o Make the machine to non-comply, o The machine will not communicate with other machines in the network. 9
  • 11. Software License Monitoring  Get exact information of where the licensed software is deployed and which systems are not registered.  Licensing information (Product Key + CD Key) for the Microsoft’s softwares installed in the network.  Typical Benefits: o Checks the actual software licenses installed in the network against purchased. o Reduce the cost through efficient software license usage and monitoring. 11
  • 13. Application Monitoring  Monitor and Manage application usage on a single or a number of systems/servers.  Provides location of installed applications.  Identify and stop non-essential processes.  Identify malicious processes.  Typical Benefits: o Action can be taken based on the violation of the policy. 13
  • 15. Data Leakage Protection  Notification/Alert on the data communication happening with external storage devices/media.  Get information about files (Not content) transferred to/from machine to/from external media.  Blocking of USB Ports, external storage devices, CD Drives, Printer, Wi-Fi, Bluetooth devices, USB Modem/Data Card and etc to protect the data.  On demand file enumeration report to get media files, photographs, Word/Excel/ PowerPoint files and other files exists in the machine.  Typical Benefits: o Protect the data from spreading outside the organization. o Closely monitor data communication happening across organization. 15
  • 17. Data Leakage Protection 17  USB Media usage Report
  • 18. Policy Enforcement  Enabling and disabling of external devices for protecting data like: o USB Ports/ Storage Devices/ Printer, o Dialup Modem, o Printer, o Floppy Drive, o CD/DVD Drive, o Bluetooth, o Wi-Fi, o Other external devices  Policy for monitoring/managing authorized software installed on the machine.  Restrict user from changing IP Address of the machine. 18
  • 20. Security  Hardware blocking and set access permissions: o Blocking of USB modem for connecting to Internet. o Blocking of USB, CD and other external Media.  Report of add/remove of media like USB, CD drive.  Communication from/to Removal Media.  Immediate alarm and report on usage of removable media.  Facility to prohibit every removable media and set selective permission.  Report of removable media used in machine including the file transferred with size, type, and etc without vision in to contents. 20
  • 21. Security (Contd …)  Anti Virus: o Status of Anti Virus upgrade like successful /failure. o Virus found with name of virus and other details.  OS Patches information.  Unauthorized access/attempt to OS utilities to be monitored and reported (e.g. Control Panel, System32 Folder, Registry access and etc)  System Firewall Status (On/Off) 21
  • 24. User Management  Report on all Guest/ Normal /Administrator user accounts configured on each machine: o List of Users, which has administrative privileges.  Policy for disabling/deleting users from the central console.  Report of: o User wise Login-Logout details, o System Start-up shutdown details, o User Activities while network is off or machines goes out off network. 24
  • 25. User Management (Contd …)  Password Management:  Provides report on weak password set by the user  Provides information about Screen Saver password  Report of unsuccessful login attempts by the user 25
  • 27. Network Security  Real time report on if a machine has accessed internet using modem, dial up connection, data card and etc.  Generates notification/alert when a machine has connected/accessed unauthorized IP Address/machine.  Block access of unauthorized IP Address and network port.  History of all network operations like which application used/opened network ports and etc..  Reporting of offline violations immediately on connection. 27
  • 29. Network Access Control (NAC)  Define network policy for only Group of PCs or selected PCs should communicate with each other.  Newly added/discovered device/PC should not communicate with any other PC in the network, untill Admistrator authorized it.  Facilities block/deny access of selected devices/PCs in the network. 29
  • 31. System Events/Logs Monitoring  Monitors various system events/logs like: o Application Events, o Security Events, o System Events  Check whether any security incident/event is generated  Incorporate the system logs, events and alerts into a single data store, so consolidated data analysis can be done later. 31
  • 33. Security Incident/Event Monitoring (SIEM)  System should take one or multiple security incidents or events from the multiple sources/devices.  To generate a single Security Incident Event based on single/ multiple security incidents or events.  The Security Incident Event will categories based on the categories/sub- categories defined in the organization.  Automatically generates notification/service requests/ tickets when any security event/incident occurred. 33
  • 35. Service Level Agreement Management (SLA)  Define time period needed for Security Request/Tickets to be handled or closed by the engineer.  If the Security Request/Ticket is not closed, then: o It will be automatically escalated to the next level of expert/engineer, o Suitable emails/SMS will be send to the Admin and the higher authorities (as defined by the Security incident handling policy). 35
  • 36. Service Level Agreement Management (SLA) 36
  • 37. Software/Patch Management  Deploy software and software patches from central console.  Any MSI based Software/Patch deployment, which does not required user interaction.  Command line supported any EXE based software/patch deployment.  Command line based Registry update/Script file execution.  Typical Benefits: o Reduce the time of deploying software at scattered locations. 37
  • 39. Secure Power Management  Apply network, group or PC wise following policies for those machines, which have been idle for specific time: o Turn OFF, o Hibernate, o Standby  Single console for achieving the Green Computing needs of IT infrastructure. 39
  • 41. Secure Remote Audit & Management  Single console for comprehensive remote management.  Secure remote access of Desktop/Servers for trouble-shooting, provisioning and management.  Typical Benefits: o Faster problem identification and resolution, o Facility to record actions taken by the engineer, o Clear responsibility allocation and track of action taken by IT support staff. Resulting in less blame-game involving the IT Support Team, o Lower training time and cost for new IT Support Team members 41
  • 42. Secure Remote Audit & Management 42
  • 43. Secure Remote Audit & Management 43
  • 44. Print Management  Tracking of all files with name, size, path and etc being printed by the user. 44
  • 45. Reports  Inventory Reports like: o Desktop Assets like …  Hard disk ID,  BIOS information,  Motherboard,  no. of HDD ,  RAM slot o Create and maintain Inventory of storage media, Laptops, Desktop and etc. o Report of hardware and software changes are made. o Detects and stores the make, model, serial number etc. of hardware assets.  Reports of product keys of installed Microsoft’s software. 45
  • 46. Reports (Contd …)  Provides report: o Agent installation, o Shared Resources, o Printing information, o Processes and services running on the machine, o Activities performed by the User.  All reports are provided on a single console.  Reporting to address your complete IT Infrastructure reporting needs.  Export to Excel/ PDF format for further analysis and sharing. 46
  • 49. Conclusion  Simple to Implement and easy to use.  Get control of your IT Infrastructure spread across different departments and locations.  Enforce IT policy  Made in India for Indian IT Environment. 49
  • 51. THANK YOU 51 23,N.S.ROAD KOLKATA- 700001 Cont.Dets.: Manoj Singh Cont.No: 09331230629/03366336500/24 E-mail: manoj.singh@ncs.net.in / sales@ncs.net.in