network grc delivery
DESCRIPTION
Guardware GRC software explainedTRANSCRIPT
![Page 1: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/1.jpg)
ensuring the responsible use of IT
the value of
![Page 2: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/2.jpg)
e-Safe Business : Powered by Guardware
Mobile Phone
Social Networking
Web Conferencing
Instant Messaging
The The OrganizationOrganization
VOIP
As society becomes increasingly connected so organizations of all types and sizes have to adapt to, and take advantage of, the business benefits of online
communication, connectivity and collaboration.
Balancing Productivity and Compliance
![Page 3: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/3.jpg)
e-Safe Business : Powered by Guardware
This change is accelerating, its scope is broadening and its impact is global. Competition is fierce and
recruitment is increasingly difficult
Regulatory pressures are escalating
Clients are more demanding
Acceptable Use PoliciesBalancing Productivity and Compliance
![Page 4: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/4.jpg)
e-Safe Business : Powered by Guardware
Society is hooked on all-pervasive, always-on connectivity. The boundaries between work, social and leisure time are becoming nonexistent.
Web Conferencing
Social Networking
PDAs
Internet
Mobile Phone
VOIP
I.M.
![Page 5: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/5.jpg)
e-Safe Business : Powered by Guardware
The OrganizationThe Organization
For most of us, not having online access would severely impact our productivity.
For a growing percentage, full time, instant, multi-device connectivity is mission critical.
Connectedness
For any organization connectedness provides a huge competitive advantage particularly if governed by an ITC Acceptable Use Policy which is integrated into its business vision and strategy.
![Page 6: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/6.jpg)
e-Safe Business : Powered by Guardware
The OrganizationThe Organization
At the same time workplace demographics are changing
Existing staff members are being replaced by a new generation of knowledge workers
Connectedness
They have never known a world without the internet, Google, Facebook, YouTube, text messaging and camera phones, they are naturally collaborative and connected.
![Page 7: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/7.jpg)
e-Safe Business : Powered by Guardware
The OrganizationThe Organization
At the same time workplace demographics are changing
In order to compete for this valuable talent base organizations have to offer an always on, connected, collaborative environment
Connectedness
It has to support the way in which the “everyone, everything, everywhere, connected” generation, live and work.
![Page 8: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/8.jpg)
e-Safe Business : Powered by Guardware
10%
5%
60%
25%VOIP
Web ConferencingText Messaging
60% use social networking sitesat work
More than half of all knowledge workers use social networking sites and online communities for business communications
Whilst no one doubts that connectivity, communication and collaboration tools dramatically increase knowledge worker productivity there is the realisation that these same tools increase business risks for the employer.
![Page 9: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/9.jpg)
e-Safe Business : Powered by Guardware
How an organization manages these issues and trends could (will) impact on its costs and possibly even its ability to attract clients and recruit talent.
There is, therefore, a direct link between a clearly written and applied Acceptable Use Policy, Pro-active HR activity, continuous compliance monitoring and bottom line profit.
So What?
![Page 10: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/10.jpg)
e-Safe Business : Powered by Guardware
Manage the behaviour of users
These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to:
![Page 11: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/11.jpg)
e-Safe Business : Powered by Guardware
balance security and network reliability
These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to:
Manage the behaviour of users
![Page 12: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/12.jpg)
e-Safe Business : Powered by Guardware
Maintain employee productivity and safety
These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to:
balance security and network reliability
Manage the behaviour of users
![Page 13: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/13.jpg)
e-Safe Business : Powered by Guardware
Ensure complianceWith Regulatory rules and guidelines.
These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to:
Maintain employee productivity and safety
balance security and network reliability
Manage the behaviour of users
![Page 14: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/14.jpg)
e-Safe Business : Powered by Guardware
The risks fall into two main categories:
• Productivity & Reputational Damage for example lost hours, green computing issues,
negative media, investor & client consequence
•HR Issues
In particular the employees’ right to work within a secure, regulated and protected online environmenttogether with developing policies and strategies which help connected employees maintain a work/life balance.
![Page 15: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/15.jpg)
e-Safe Business : Powered by Guardware
The risks fall into two main categories:
•HR Issues
In particular the employees’ right to work within a secure, regulated and protected online environmenttogether with developing policies and strategies which help connected employees maintain a work/life balance.
![Page 16: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/16.jpg)
“70% of porn traffic occurs between 9- 5”The Industry Standard
“Worker Internet misuse ‘a problem’: two-thirds of companies have disciplined employees”
CBS Marketwarch
Consequences of breaches of Acceptable Use Policies: – Resource misuse costs.
– Reduced employee productivity.– Exposure to legal liabilities. .
"The employer is vicariously liable. An employer should make sure that the people it employs know how to behave and if they're causing offence to others then they should do something about it,"
Sarah Veale of the TUC – on BBC Radio
"Today's change will force employers to take their responsibilities towards providing a harassment-free working environment more seriously. “
TUC general secretary Brendan Barber
![Page 17: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/17.jpg)
A Personal Threat
![Page 18: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/18.jpg)
Responsible use of IT
• Blocking inappropriate material.– Pornography, drugs, racial discrimination.
• Blocking unproductive material.– Personal websites, games, gambling, chat.
• Ensuring proper use of facilities.– PC usage (PCs little used / PCs left on)– Application usage (What users actual do) – Disk usage (music and video files)– Network usage (downloads)– Green Computing CO2 management
• Optimal usage of hardware / software– Lack of or too many licenses. – Tracking assets.– Under or over powered PCs.
![Page 19: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/19.jpg)
Ensuring the responsible use of IT
Introducing
![Page 20: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/20.jpg)
ScreenShield™ v3
• Only solution that prevents all misuse of IT infrastructure and resources.
• Enables middle managers to control the usage of PCs in their departments. – Middle managers know what applications their staff use and are
responsible for ensuring productivity.
• Overcomes limitations of competitors.– Unlimited clients.– Web-based
• HTTP protocol so no firewall issues.• Administration of system via web-pages.• Modular design –
– Image– Text– End Point Management (USB)– Productivity & Green
![Page 21: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/21.jpg)
Image Analysis
• Decoding of video files. – Analysis of DVDs as they are being played.
• Fast image filter.– Up to 100 images per second. No need to fully decode.
• Full Analysis
Decision
Skin Tones Skin Textures Edges Blobs Limbs Faces
![Page 22: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/22.jpg)
Text Analysis
• Bayesian network classifier was developed and implemented in ScreenShield™:– Words / phrases considered in the context of
other words / phrases.
– Supports Arabic, Thai, Russian, French & German.
• More accurate than the simplistic keyword approach implemented in most filters.
![Page 23: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/23.jpg)
Webpage Analysis
• Metadata in the webpage header.– Analysis of text in Title, Keywords and Description.
– Checking of Internet Rating Labels • RSACi, SafeSurf, PICS amongst others
– Fast and confident decision if useful information.
• Body of the webpage:– Analysis of text within the webpage.
– Analysis of images within the webpage.
– Analysis of links in the webpage.
– Analysis of webpage structure.
![Page 24: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/24.jpg)
Scan the Hard Drive forpornographic image, file types and video files
Drive Scanning
![Page 25: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/25.jpg)
Server clustering
• Cluster contains four server types:– Database Server, Web Admin Server, File Server and
Report Server.– Need to support 50,000+ clients.
• Support for Apache and Microsoft IIS.– WinXP, Win2003, – Planned: Win2008, Linux (Susie, Fedora and RedHat).
• Cascading server architecture. – Designed for hierarchical organisations spread over a
number of countries.
– Three types of server (Branch / Area / HQ) implemented.
![Page 26: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/26.jpg)
Cascade Management
![Page 27: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/27.jpg)
Features• Blocking pornographic images in WebPages
![Page 28: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/28.jpg)
WITHOUT ScreenShieldWITH ScreenShield
![Page 29: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/29.jpg)
•Blocking pornographic images in WebPages• Capture of pornography at point of display
• Independent of source of pornography and application
Features
![Page 30: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/30.jpg)
![Page 31: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/31.jpg)
![Page 32: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/32.jpg)
•Blocking pornographic images in WebPages• Capture of pornography at point of display
• Independent of source of pornography and application• Blocking of inappropriate WebPages (Gambling, hacking etc)
Features
![Page 33: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/33.jpg)
Features•Blocking pornographic images in webpages• Capture of pornography at point of display
• Independent of source of pornography and application• Blocking of inappropriate webpages (gambling)
![Page 34: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/34.jpg)
Categories Monitored
![Page 35: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/35.jpg)
•Blocking pornographic images in WebPages• Capture of pornography at point of display
• Independent of source of pornography and application• Blocking of inappropriate WebPages (Gambling, hacking etc)• All inappropriate incidences are logged.
Features
![Page 36: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/36.jpg)
Detailed Reports
Thumb nail view for easy administration
Who?
How?
When?
![Page 37: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/37.jpg)
Accidental
Addictive
Directing Attention
![Page 38: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/38.jpg)
•Blocking pornographic images in WebPages• Capture of pornography at point of display
• Independent of source of pornography and application• Blocking of inappropriate WebPages (gambling)• All inappropriate incidences are logged.•Not just inappropriate usage, but all PC usage.
•Monitoring of text with special emphasis on chat clients• MSN, YAHOO!, MS Messenger• Key word logging of input by user and document analysis
Features
![Page 39: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/39.jpg)
Number of Chat Violations
By user
Each chat session can
be viewed by the administrator
Text Monitoring
![Page 40: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/40.jpg)
•Blocking pornographic images in WebPages• Capture of pornography at point of display
• Independent of source of pornography and application• Blocking of inappropriate WebPages (gambling)• All inappropriate incidences are logged.•Not just inappropriate usage, but all PC usage.
•Monitoring of text with special emphasis on chat clients• MSN, YAHOO!, MS Messenger. • Key word logging of input by user and document analysis
• User productivity monitoring
Features
![Page 41: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/41.jpg)
e-Safe Business : Powered by Guardware
The risks fall into two main categories:
• Reputational Damage
for example lost hours, green computing issues, negative media, investor & client consequence
• Management Reporting & Feature Controls
![Page 42: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/42.jpg)
System tray icon
Working Environment Policies
![Page 43: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/43.jpg)
•Implementation organizational working environment policies Configurable detection threshold settings Limiting internet surfing time PC hibernation, log-off, shutdown if not in use. Thumbdrive blocking. Use-of-facilities policy and system tray icon. Limiting application usage
•Easy Administration of large numbers of PCs. Full configurable profiles Scheduling of Profiles User access control for different Auto-emailed Summary Reports
Features
![Page 44: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/44.jpg)
Productivity Reports
User productivity measured in percentage
![Page 45: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/45.jpg)
Productivity Report
Detailed productivity analysis by time
![Page 46: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/46.jpg)
•Blocking pornographic images in WebPages• Capture of pornography at point of display
• Independent of source of pornography and application• Blocking of inappropriate WebPages (gambling)• All inappropriate incidences are logged.•Not just inappropriate usage, but all PC usage.
•Monitoring of text with special emphasis on chat clients•MSN, YAHOO!, MS Messenger •Key word logging of input by user and document analysis
• User productivity monitoring• Network usage
Features
![Page 47: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/47.jpg)
Per user network load
Peek network activity break down
Network Usage
![Page 48: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/48.jpg)
•Blocking pornographic images in WebPages• Capture of pornography at point of display
• Independent of source of pornography and application• Blocking of inappropriate WebPages (gambling)• All inappropriate incidences are logged.•Not just inappropriate usage, but all PC usage.
•Monitoring of text with special emphasis on chat clients• MSN, YAHOO!, MS Messenger • Key word logging of input by user and document analysis
• User productivity monitoring• Network usage• Hardware and software audit
Features
![Page 49: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/49.jpg)
Organization wide PC
Hardware resource
captured and categorized
PCs recognized by using
MAC addresses
Detailed specification of the PCs captured
Hardware Audit
![Page 50: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/50.jpg)
Actively monitoring all
PC hardware resources
for changes
Detailed description of the changes recorded
Detecting HW Misuse
![Page 51: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/51.jpg)
Organization wide PC software resources captured and categorized
Report on illegal software usage in the organization
Software Audit
![Page 52: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/52.jpg)
Detailed description per PC on the licensed and un licensed software
Available licenses can be are categorized in to groups for easy management
Detecting SW Change
Detecting software changes per user
![Page 53: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/53.jpg)
•Blocking pornographic images in WebPages• Capture of pornography at point of display
• Independent of source of pornography and application• Blocking of inappropriate WebPages (gambling)• All inappropriate incidences are logged.•Not just inappropriate usage, but all PC usage.
•Monitoring of text with special emphasis on chat clients•MSN, YAHOO!, MS Messenger •Key word logging of input by user and document analysis
• User productivity monitoring• Network usage• Hardware and software auditing • Drive auditing
Features
![Page 54: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/54.jpg)
Break down of Harddrive usage by each employee
Drive Scanning
![Page 55: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/55.jpg)
•Implementation of organizational working environment policies• Configurable detection threshold settings• Limiting internet surfing time• Thumbdrive blocking.• PC hibernation, log-off, shutdown if not in use.
Features
![Page 56: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/56.jpg)
Configurable thresholds for different type of users
Enable or disable internet surfing for different users
Thumb drive blocking
PC hibernation and shutdown settings
Working Environment Policies
Green Computing Benefit – average Office work station can create over 200Kg of C02 per year
Equal to a passenger flight from London to Paris!
www.fixgaia.com
![Page 57: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/57.jpg)
What are the environmental benefits?
‘Businesses are currently responsible for half of all the UK’s carbon emissions; even small offices can emit three to five tonnes of carbon dioxide a year. Unless they reduce their carbon emissions, businesses will start paying the price of climate change through more expensive energy supplies and higher insurance premiums. a drop in business, with customers looking elsewhere for a more socially responsible supplier’
consider;
One workstation can produce the annual CO2 equivalent of a passenger flying from London to Paris.
The Internet, Computing and their supporting environmental services (air conditioning, lighting & buildings) are one of the worlds largest sources of GHG creation – Greater than air travel
All businesses can reduce their Carbon footprint by proactive management of their IT equipment and power consumption plus the implementation and effective monitoring of an Acceptable Use Policy (AUP) which governs the use of company infrastructure and which is backed up by both effective tools, regular monitoring and comprehensive training” using proactive system and activity management.
![Page 58: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/58.jpg)
•Implementation organizational working environment policies• Configurable detection threshold settings• Limiting internet surfing time• PC hibernation, log-off, shutdown if not in use.• Thumbdrive blocking.• Use-of-facilities policy and system tray icon. • Limiting application usage
Features
![Page 59: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/59.jpg)
Configurable application usage for different type of users
Working Environment Policies
![Page 60: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/60.jpg)
•Implementation organizational working environment policies• Configurable detection threshold settings• Limiting internet surfing time• PC hibernation, log-off, shutdown if not in use.• Thumbdrive blocking.• Use-of-facilities policy and system tray icon. • Limiting application usage
•Easy Administration of large numbers of PCs. •Fully configurable profiles •Different profiles for different users and PCs
Features
![Page 61: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/61.jpg)
Tree Structure for easy PC grouping and administration
![Page 62: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/62.jpg)
Different groups of profiles targeted at different set of users
![Page 63: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/63.jpg)
•Implementation organizational working environment policies• Configurable detection threshold settings• Limiting internet surfing time• PC hibernation, log-off, shutdown if not in use.• Thumbdrive blocking.• Use-of-facilities policy and system tray icon. • Limiting application usage
•Easy Administration of large numbers of PCs. •Fully configurable profiles • Scheduling of Profiles
Features
![Page 64: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/64.jpg)
Application of different profiles for different timings
Night hours
Working hours
After working hours
![Page 65: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/65.jpg)
•Implementation organizational working environment policies• Configurable detection threshold settings• Limiting internet surfing time• PC hibernation, log-off, shutdown if not in use.• Thumbdrive blocking.• Use-of-facilities policy and system tray icon.• Limiting application usage
•Easy Administration of large numbers of PCs. • Full configurable profiles • Scheduling of Profiles• User access control for different • Auto-emailed Summary Reports
Features
![Page 66: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/66.jpg)
Summary – Uniqueness
• Approach to detecting inappropriate material. – Captures at point of display not at gateway level.– Detection of encrypted chat, DVDs and applications.
• Designed for middle managers not IT staff. – Ensure proper usage of PCs in their departments.– Intuitive and interactive Web 2.0 interface.
• Support for very large hierarchical organisations.
– Server clustering with support for linux
![Page 67: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/67.jpg)
Summary – Quality
• Developed using CMMI Level 3 Software Processes and Practices.
• Latest Web 2.0 Technologies for speed, interactivity and usability.
• Award winning artificial intelligence and image processing analysis engines
![Page 68: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/68.jpg)
Awards & RecognitionPIKOM Computimes ICT Awards 2004 - WINNER“ICT Product of the Year”
MSC - Asia Pacific ICT Awards 2004 - WINNER“Best of Applications and Infrastructure Tools”
International Asia Pacific ICT Awards 2004 Hong Kong - MERIT AWARD“Best of Applications and Infrastructure Tools”
MSC - APICTA 2003 - MERIT AWARD“Best of R&D”
Asian Innovation Awards 2004 - FINALIST Far East Economic Review“Improving Productivity, Efficiency & Quality of Life”
Asian Conference on Computer Vision 2004 28-30 January 2004, Juju Island, Korea.Detecting Pornographic Images
MSC-APICTA 2005, Malaysia – WINNERURLChecker "Best of Application and Infrastructure Tools”
APICTA 2008, SS3 - WINNER“e-Community & e-Inclusion' category”
“Surprisingly, perhaps, it works brilliantly”
![Page 69: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/69.jpg)
All businesses can improve their
• Productivity• Compliance and;• Carbon Footprint
by implementation of a programme and process of Governance, Compliance and Acceptable Use which governs the use of their infrastructure using proactive system and activity management - backed up by effective tools, regular monitoring and comprehensive ongoing training
Closing So What
![Page 70: Network GRC Delivery](https://reader035.vdocument.in/reader035/viewer/2022062220/5561bb8ed8b42a9f2f8b4df0/html5/thumbnails/70.jpg)
By this action the business will make positive gains in its;
Staff relationships Customer relationships Investor & Stakeholder relationships Profitability
Closing So What