2Contents Brief Introduction 1 14 Modules of IP-guard 2 Solutions 3 Components and Basic System Architecture4
3Security Challenges form Computerized Corporation Data-Stealingspyware,illegal intrusion,hacker…Data DisclosureRemovable storage device, , P2P Application, printing…Security Riskssystem vulnerability,virus attack,malicious deletion or modificationCreative design,VIP customer information, sensitive financial data …
4Drawbacks of Information Technology Play games · Trade Stocks · Chat OnlineBrowse Web Pages · Print Personal StuffsOnline Movies · Radio · Download MusicCannot Troubleshoot Remote ComputerCannot Track Computer Assets ChangesAdministrator Faces Heavy Workload
5The significance of Protecting Intranet Security To resist external risksTo prevent internal breachesVirusIntranet Security ManagementFirewallHackerFirewallCorporationIntranet Security ManagementAnti-virus SoftwareMalware
6The Core Values of IP-guard Protect data security;Safeguard intellectual property.Effective and Comprehensive ManagementAdjust employee behavior;Improve work efficiency.Centrally manage system;Keep system stable.
7Contents Brief Introduction 1 14 Modules of IP-guard 2 Solutions 3 Components and Basic System Architecture4
9Basic Management Module Basic and essential module of IP-guard. It’s a mandatory module.Basic Events LogRecord computer startup, logon, logoff, shutdown to check when do your employee start working and what time do they leave their workstationsBasic ControlRemotely lock, log off, restart and turn off agent computers to manage computers or stop illegal operationsBasic PolicyBlock users from randomly modify system setting in order to prevent accidental and intentional destruction and improve system security.test
10Basic Management Module - Basic Policy Control PanelComputers ManagementSystemNetworkIP/Mac BindingActiveXOthers
11Document Management Module Control and monitor document actions to safeguard intellectual propertyDocument ControlEffectively control document actions to prevent unauthorized actions, malicious modification and deletion.Document BackupBack up documents before they are modified or deleted to make sure the security of important documentsDocument LoggingRecord document actions in detailRecord document actions of any computer on shared documents
13Print Management Print Control Print Logging Print Backup Monitor file printing to prevent data leakagePrint ControlControl printing permission to prevent data leakageReasonably assign print resource to stop wasting print resourcePrint LoggingRecord print actions in detail for administrator to evaluate the effective usage of print resourcePrint BackupBack up the image of printed file
14Print Management - Print Control By printer typeBy applicationBy Printer name
15Device Management Device Control Control and monitor the usage of various devices to prevent data leakageDevice ControlBlock external devices from connecting to the intranet to protect data security and stop data breachesDetailed and specific control
16Device Management - List of Controlled Device Storage DevicesFloppy, CDROM, Burning Device, Tape, Removable Storage DeviceCommunications DevicesCOM, LTP, Bluetooth, Infrared, SCSI Controller, etc.DialupDial-up ConnectionUSB DevicesUSB hard disk, USB CDROME、USB LAN Adapter, USB Image Device, etc.Network DevicesWireless LAN Adapter, Virtual LAN Adapter, PnP Adapter (USB, PCAMCIA)OthersAudio device, Virtual LAN AdapterAny added new devices
17Removable Storage Management Authorize and encrypt removable storage device to protect your valuable data anywhere at anytime.Permission ControlStrictly control file in motion to protect dataAutomatic Encryption & DecryptionAutomatically encrypt data when files are written to any removable storage device to enhance the security level of data in motionWhole Disk EncryptionFormat corporate removable storage device as encrypted removable storage device.Automatically encrypt and decrypt data stored on the encrypted removable storage device within the corporate environment.* NOTE: Encrypted removable storage device only can be used within the corporate environment
18Email Management Email Control Email Logging Control and monitor incoming and outgoing s to prevent data leakageControlBlock sending specified POP3/SMTP s or Exchanges s out of the organization via to prevent data leakageLoggingFully record sender, recipient, subject, text and attachmentSupport POP3/SMTP , Exchange , webmail, and Lotus
19Instant Messaging Management Control and monitor instant messaging to safeguard data security and improve work efficiencyIM LoggingCompletely record instant messages, participants, time to prevent data leaking out via IM applicationsFile Transfer ControlBlock sending files out of the corporation over limited size or with limited file namesFile BackupBack up transferred file
20Application Management Control and monitor application usage to improve work efficiencyApplication StatisticsGather statistics by category, name, detail and group to let you know your employee’s work performanceApplication ControlFilter non-work related applications to make your employees concentrate on work businessBlock malicious application to protect computer securityApplication LogRecord application start, stop, window switch to track the application activity of staff
21Application Management – Application Statistics Gather statistics by categoryGather statistics by nameGather statistics by detailGather statistics by group
22Website Management Website Statistics Website Management Website Log Record staff’s web browsing activities; limit web site access right to regulate staff’s online activityWebsite StatisticsGather statistics by different ways to let you know your staff’s web browsing activityWebsite ManagementFilter non-work related websites during a specified time periodBlock malicious and inappropriate websitesWebsite LogRecord the URL, caption, and time of the visited websites to track what your staff were browsing during office hours
23Website Management – Website Statistics Gather statistics by categoryGather statistics by detailGather statistics by group
24Bandwidth Management Traffic Statistics Bandwidth Control Limit and control bandwidth to avoid any bandwidth abuseTraffic StatisticsGather statistics by different ways to assist administrator to analyze traffic consumptionBandwidth ControlLimit bandwidth by IP address or port to help administrator reasonably assign various bandwidth to different usersLimit BT download, online video watching to make sure that you have sufficient bandwidth for business use
26Network Management Network Control Network Intrusion Detection Prevent unauthorized external computers from accessing internal networkNetwork ControlOffer firewall function and block unauthorized computer from communication with internal computers in order to protect intranet securityNetwork Intrusion DetectionScan the whole network to immediately stop unauthorized computers from connecting to the internal network so as to safeguard information security
27Screen Monitoring Screen Monitoring Screen Record Record and replay screen snapshot to let you know what your employees do step by stepScreen MonitoringView the real-time desktop screen of any computerMonitor computers with multi displaysCentrally monitor multi computers at one timeScreen RecordCompletely record screen history for your latter reviewSet different intervals to capture screen snapshot when different application are being used so as to pay attention to risky applicationsCan save a lot of screen snapshots due to effective compressionScreen history can be exported to wmv format.
28Remote Maintenance Remote Troubleshooting Remote Control Support remote maintenance so as to let you shorten the downtime and quickly solve the system problemRemote TroubleshootingCheck the real-time running processes of client computersRemotely analyze the running status, system fault and device status of client computersRemote ControlPerform remote assistance or demonstrate operational instructionRemote File TransferRemotely transfer files from remote computers to local computer, and from local computer to remote computers in order to quickly gather fault samples to diagnose the problem and update files
29Remote Maintenance - Maintenance Centrally view the running status of any remote computer through IP-guard console
30IT Asset Management Easily manage IT asset to reduce management cost Asset InformationAutomatically collect software and hardware information and provide asset inventory to facilitate administrator’s managementOffer non-IT asset management functionAsset ChangeRecord software and hardware changes in detailInstant alert on asset changes
31IT Asset Management Vulnerability Management Patch Management Automatically scan system vulnerability of agent computer and provide easy-to-read report and solutionsPatch ManagementCheck Microsoft for new patches at regular intervalsAutomatically download and deploy new patches to agent computersSoftware DeploymentDeploy files and programs with easeSupport breakpoint transmission to facilitate background installation and interactive installation
32Contents Brief Introduction 1 14 Modules of IP-guard 2 Solutions 3 Components and Basic System Architecture4
33Data Loss Prevention Solution Instant MessagingManagementDocumentData Security ManagementScreenMonitoringNetworkDevicePrintRemovableStorage Management
34Data Loss Prevention Solution Pre-ControlIn-ControlPost-ControlWhen unpermitted actions trigger the policies, actions will be immediately blocked so as to protect data security.Based on business and management needs to set specific policiesAll activities on computer are recorded in logs and in other formats.
35Data Loss Prevention Solution Pre-ControlBased on business and management needs to set specific policies
36Data Loss Prevention Solution General ControlDocument Management Print ManagementManagement Instant Messaging ManagementDevice ManagementIn-ControlOffline ControlPolicies are still effective when computers are offline in order to always protect data security.When unpermitted actions trigger the policies, actions will be immediately blocked so as to protect data security.Document Backup* Back up original files before they are modified or deleted* Back up files before they are sent out of the companyTransparent Removable Storage Encryption and Document EncryptionActive defense. Maximumly safeguard data security.
37Data Loss Prevention Solution Record document actionsRecord printed filesRecord print actionsPost-ControlRecord the usage of removable storage deviceRecord content and attachmentRecord both incoming and outgoing sAll activities on computer are recorded in logs and in other formats.Back up transferred filesInstant message loggingReal-time screen snapshotscreen snapshot history
38Customer Benefits Avoid lawsuit and data leakage risks Raise the core competitive power of enterpriseImprove the reputation of enterprise
40Employee Activity Management Manage employee’s online and computer activity
41Employee Activity Management Instant Warning MessageOptionally do NOT compulsively block users using gaming applications, browsing shopping websites, sending private s, and much more. But when they are doing non-work related things, warning messages can be automatically sent to users. Warning messages help them comply with the company policy.Powerful Control FunctionThis solution not only can allow or block specified employees from using specified application, , removable media and other things, but also can control employees’ activity by customized group during different time periods.
42Customer BenefitsAdjust employees’ work behavior to improve work efficiencyAvoid network abuse and network choking to make sure that there is enough bandwidth to support the smooth development of key business
43Systems Management Solution System ManagementIT Asset ManagementRemote ControlSoftware & hardware ManagementPatch ManagementVulnerability ManagementSoftware DeploymentRemote TroubleshootingRemote ControlRemote File Transfer
44Customer Benefits Get a grip on your IT inventory Make quick response to system faultsGreatly improve system administrators’ work efficiencyMaintain system stability and enforce system security
45Contents Brief Introduction 1 14 Modules of IP-guard 2 Solutions 3 Components and Basic System Architecture4
48System Requirements Requirements Database Agent Server Console ComponentsRequirementsDatabaseSQL Server 2000 SP4, MSDE SP4, SQL Server 2005 SP1, SQL Server 2005 Express SP1AgentOS SupportedMicrosoft Vista, 2003, XP, 2000, Me, and 98RecommendedCPU: Pentium® 4RAM: 512MBFree disk space: 1GBServerMicrosoft Windows Vista, 2003 SP1, XP SP2, and 2000 SP4CPU: Dual Core or Quad CoreRAM: 2GBFree space: 60GBConsoleMicrosoft Windows Vista, 2003, XP, and 2000CPU: Pentium 4Free space: 1GB
49Installation Server Installation Agent Installation Generally, sever is installed on a server-class computer with high performance and a lot of free disk space. The server computer should use the Operating System which IP-guard server is supported.Agent InstallationAgents are installed on the computers you want to monitor or manage.* Manually direct installation* Remote Installation* Logon Script InstallationConsole InstallationConsoles are installed on manager and supervisor’s computers.
50Conclusion 1 2 3 What is IP-guard？ How IP-guard can help corporations？ Why chooseIP-guard？