Network GRC Delivery

Post on 24-May-2015

194 views 1 download

Tags:

description

Guardware GRC software explained

Transcript of Network GRC Delivery

ensuring the responsible use of IT

the value of

e-Safe Business : Powered by Guardware

Email

Mobile Phone

Social Networking

Web Conferencing

Instant Messaging

The The OrganizationOrganization

VOIP

As society becomes increasingly connected so organizations of all types and sizes have to adapt to, and take advantage of, the business benefits of online

communication, connectivity and collaboration.

Balancing Productivity and Compliance

e-Safe Business : Powered by Guardware

This change is accelerating, its scope is broadening and its impact is global. Competition is fierce and

recruitment is increasingly difficult

Regulatory pressures are escalating

Clients are more demanding

Acceptable Use PoliciesBalancing Productivity and Compliance

e-Safe Business : Powered by Guardware

Society is hooked on all-pervasive, always-on connectivity. The boundaries between work, social and leisure time are becoming nonexistent.

Web Conferencing

Social Networking

PDAs

E-mail

Internet

Mobile Phone

VOIP

I.M.

e-Safe Business : Powered by Guardware

The OrganizationThe Organization

For most of us, not having online access would severely impact our productivity.

For a growing percentage, full time, instant, multi-device connectivity is mission critical.

Connectedness

For any organization connectedness provides a huge competitive advantage particularly if governed by an ITC Acceptable Use Policy which is integrated into its business vision and strategy.

e-Safe Business : Powered by Guardware

The OrganizationThe Organization

At the same time workplace demographics are changing

Existing staff members are being replaced by a new generation of knowledge workers

Connectedness

They have never known a world without the internet, Google, Facebook, YouTube, text messaging and camera phones, they are naturally collaborative and connected.

e-Safe Business : Powered by Guardware

The OrganizationThe Organization

At the same time workplace demographics are changing

In order to compete for this valuable talent base organizations have to offer an always on, connected, collaborative environment

Connectedness

It has to support the way in which the “everyone, everything, everywhere, connected” generation, live and work.

e-Safe Business : Powered by Guardware

10%

5%

60%

25%VOIP

Web ConferencingText Messaging

60% use social networking sitesat work

More than half of all knowledge workers use social networking sites and online communities for business communications

Whilst no one doubts that connectivity, communication and collaboration tools dramatically increase knowledge worker productivity there is the realisation that these same tools increase business risks for the employer.

e-Safe Business : Powered by Guardware

How an organization manages these issues and trends could (will) impact on its costs and possibly even its ability to attract clients and recruit talent.

There is, therefore, a direct link between a clearly written and applied Acceptable Use Policy, Pro-active HR activity, continuous compliance monitoring and bottom line profit.

So What?

e-Safe Business : Powered by Guardware

Manage the behaviour of users

These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to:

e-Safe Business : Powered by Guardware

balance security and network reliability

These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to:

Manage the behaviour of users

e-Safe Business : Powered by Guardware

Maintain employee productivity and safety

These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to:

balance security and network reliability

Manage the behaviour of users

e-Safe Business : Powered by Guardware

Ensure complianceWith Regulatory rules and guidelines.

These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to:

Maintain employee productivity and safety

balance security and network reliability

Manage the behaviour of users

e-Safe Business : Powered by Guardware

The risks fall into two main categories:

• Productivity & Reputational Damage for example lost hours, green computing issues,

negative media, investor & client consequence

•HR Issues

In particular the employees’ right to work within a secure, regulated and protected online environmenttogether with developing policies and strategies which help connected employees maintain a work/life balance.

e-Safe Business : Powered by Guardware

The risks fall into two main categories:

•HR Issues

In particular the employees’ right to work within a secure, regulated and protected online environmenttogether with developing policies and strategies which help connected employees maintain a work/life balance.

“70% of porn traffic occurs between 9- 5”The Industry Standard

“Worker Internet misuse ‘a problem’: two-thirds of companies have disciplined employees”

CBS Marketwarch

Consequences of breaches of Acceptable Use Policies: – Resource misuse costs.

– Reduced employee productivity.– Exposure to legal liabilities. .

"The employer is vicariously liable. An employer should make sure that the people it employs know how to behave and if they're causing offence to others then they should do something about it,"

Sarah Veale of the TUC – on BBC Radio

"Today's change will force employers to take their responsibilities towards providing a harassment-free working environment more seriously. “

TUC general secretary Brendan Barber

A Personal Threat

Responsible use of IT

• Blocking inappropriate material.– Pornography, drugs, racial discrimination.

• Blocking unproductive material.– Personal websites, games, gambling, chat.

• Ensuring proper use of facilities.– PC usage (PCs little used / PCs left on)– Application usage (What users actual do) – Disk usage (music and video files)– Network usage (downloads)– Green Computing CO2 management

• Optimal usage of hardware / software– Lack of or too many licenses. – Tracking assets.– Under or over powered PCs.

Ensuring the responsible use of IT

Introducing

ScreenShield™ v3

• Only solution that prevents all misuse of IT infrastructure and resources.

• Enables middle managers to control the usage of PCs in their departments. – Middle managers know what applications their staff use and are

responsible for ensuring productivity.

• Overcomes limitations of competitors.– Unlimited clients.– Web-based

• HTTP protocol so no firewall issues.• Administration of system via web-pages.• Modular design –

– Image– Text– End Point Management (USB)– Productivity & Green

Image Analysis

• Decoding of video files. – Analysis of DVDs as they are being played.

• Fast image filter.– Up to 100 images per second. No need to fully decode.

• Full Analysis

Decision

Skin Tones Skin Textures Edges Blobs Limbs Faces

Text Analysis

• Bayesian network classifier was developed and implemented in ScreenShield™:– Words / phrases considered in the context of

other words / phrases.

– Supports Arabic, Thai, Russian, French & German.

• More accurate than the simplistic keyword approach implemented in most filters.

Webpage Analysis

• Metadata in the webpage header.– Analysis of text in Title, Keywords and Description.

– Checking of Internet Rating Labels • RSACi, SafeSurf, PICS amongst others

– Fast and confident decision if useful information.

• Body of the webpage:– Analysis of text within the webpage.

– Analysis of images within the webpage.

– Analysis of links in the webpage.

– Analysis of webpage structure.

Scan the Hard Drive forpornographic image, file types and video files

Drive Scanning

Server clustering

• Cluster contains four server types:– Database Server, Web Admin Server, File Server and

Report Server.– Need to support 50,000+ clients.

• Support for Apache and Microsoft IIS.– WinXP, Win2003, – Planned: Win2008, Linux (Susie, Fedora and RedHat).

• Cascading server architecture. – Designed for hierarchical organisations spread over a

number of countries.

– Three types of server (Branch / Area / HQ) implemented.

Cascade Management

Features• Blocking pornographic images in WebPages

WITHOUT ScreenShieldWITH ScreenShield

•Blocking pornographic images in WebPages• Capture of pornography at point of display

• Independent of source of pornography and application

Features

•Blocking pornographic images in WebPages• Capture of pornography at point of display

• Independent of source of pornography and application• Blocking of inappropriate WebPages (Gambling, hacking etc)

Features

Features•Blocking pornographic images in webpages• Capture of pornography at point of display

• Independent of source of pornography and application• Blocking of inappropriate webpages (gambling)

Categories Monitored

•Blocking pornographic images in WebPages• Capture of pornography at point of display

• Independent of source of pornography and application• Blocking of inappropriate WebPages (Gambling, hacking etc)• All inappropriate incidences are logged.

Features

Detailed Reports

Thumb nail view for easy administration

Who?

How?

When?

Accidental

Addictive

Directing Attention

•Blocking pornographic images in WebPages• Capture of pornography at point of display

• Independent of source of pornography and application• Blocking of inappropriate WebPages (gambling)• All inappropriate incidences are logged.•Not just inappropriate usage, but all PC usage.

•Monitoring of text with special emphasis on chat clients• MSN, YAHOO!, MS Messenger• Key word logging of input by user and document analysis

Features

Number of Chat Violations

By user

Each chat session can

be viewed by the administrator

Text Monitoring

•Blocking pornographic images in WebPages• Capture of pornography at point of display

• Independent of source of pornography and application• Blocking of inappropriate WebPages (gambling)• All inappropriate incidences are logged.•Not just inappropriate usage, but all PC usage.

•Monitoring of text with special emphasis on chat clients• MSN, YAHOO!, MS Messenger. • Key word logging of input by user and document analysis

• User productivity monitoring

Features

e-Safe Business : Powered by Guardware

The risks fall into two main categories:

• Reputational Damage

for example lost hours, green computing issues, negative media, investor & client consequence

• Management Reporting & Feature Controls

System tray icon

Working Environment Policies

•Implementation organizational working environment policies Configurable detection threshold settings Limiting internet surfing time PC hibernation, log-off, shutdown if not in use. Thumbdrive blocking. Use-of-facilities policy and system tray icon. Limiting application usage

•Easy Administration of large numbers of PCs. Full configurable profiles Scheduling of Profiles User access control for different Auto-emailed Summary Reports

Features

Productivity Reports

User productivity measured in percentage

Productivity Report

Detailed productivity analysis by time

•Blocking pornographic images in WebPages• Capture of pornography at point of display

• Independent of source of pornography and application• Blocking of inappropriate WebPages (gambling)• All inappropriate incidences are logged.•Not just inappropriate usage, but all PC usage.

•Monitoring of text with special emphasis on chat clients•MSN, YAHOO!, MS Messenger •Key word logging of input by user and document analysis

• User productivity monitoring• Network usage

Features

Per user network load

Peek network activity break down

Network Usage

•Blocking pornographic images in WebPages• Capture of pornography at point of display

• Independent of source of pornography and application• Blocking of inappropriate WebPages (gambling)• All inappropriate incidences are logged.•Not just inappropriate usage, but all PC usage.

•Monitoring of text with special emphasis on chat clients• MSN, YAHOO!, MS Messenger • Key word logging of input by user and document analysis

• User productivity monitoring• Network usage• Hardware and software audit

Features

Organization wide PC

Hardware resource

captured and categorized

PCs recognized by using

MAC addresses

Detailed specification of the PCs captured

Hardware Audit

Actively monitoring all

PC hardware resources

for changes

Detailed description of the changes recorded

Detecting HW Misuse

Organization wide PC software resources captured and categorized

Report on illegal software usage in the organization

Software Audit

Detailed description per PC on the licensed and un licensed software

Available licenses can be are categorized in to groups for easy management

Detecting SW Change

Detecting software changes per user

•Blocking pornographic images in WebPages• Capture of pornography at point of display

• Independent of source of pornography and application• Blocking of inappropriate WebPages (gambling)• All inappropriate incidences are logged.•Not just inappropriate usage, but all PC usage.

•Monitoring of text with special emphasis on chat clients•MSN, YAHOO!, MS Messenger •Key word logging of input by user and document analysis

• User productivity monitoring• Network usage• Hardware and software auditing • Drive auditing

Features

Break down of Harddrive usage by each employee

Drive Scanning

•Implementation of organizational working environment policies• Configurable detection threshold settings• Limiting internet surfing time• Thumbdrive blocking.• PC hibernation, log-off, shutdown if not in use.

Features

Configurable thresholds for different type of users

Enable or disable internet surfing for different users

Thumb drive blocking

PC hibernation and shutdown settings

Working Environment Policies

Green Computing Benefit – average Office work station can create over 200Kg of C02 per year

Equal to a passenger flight from London to Paris!

www.fixgaia.com

What are the environmental benefits?

‘Businesses are currently responsible for half of all the UK’s carbon emissions; even small offices can emit three to five tonnes of carbon dioxide a year. Unless they reduce their carbon emissions, businesses will start paying the price of climate change through more expensive energy supplies and higher insurance premiums. a drop in business, with customers looking elsewhere for a more socially responsible supplier’

consider;

One workstation can produce the annual CO2 equivalent of a passenger flying from London to Paris.

The Internet, Computing and their supporting environmental services (air conditioning, lighting & buildings) are one of the worlds largest sources of GHG creation – Greater than air travel

All businesses can reduce their Carbon footprint by proactive management of their IT equipment and power consumption plus the implementation and effective monitoring of an Acceptable Use Policy (AUP) which governs the use of company infrastructure and which is backed up by both effective tools, regular monitoring and comprehensive training” using proactive system and activity management.

•Implementation organizational working environment policies• Configurable detection threshold settings• Limiting internet surfing time• PC hibernation, log-off, shutdown if not in use.• Thumbdrive blocking.• Use-of-facilities policy and system tray icon. • Limiting application usage

Features

Configurable application usage for different type of users

Working Environment Policies

•Implementation organizational working environment policies• Configurable detection threshold settings• Limiting internet surfing time• PC hibernation, log-off, shutdown if not in use.• Thumbdrive blocking.• Use-of-facilities policy and system tray icon. • Limiting application usage

•Easy Administration of large numbers of PCs. •Fully configurable profiles •Different profiles for different users and PCs

Features

Tree Structure for easy PC grouping and administration

Different groups of profiles targeted at different set of users

•Implementation organizational working environment policies• Configurable detection threshold settings• Limiting internet surfing time• PC hibernation, log-off, shutdown if not in use.• Thumbdrive blocking.• Use-of-facilities policy and system tray icon. • Limiting application usage

•Easy Administration of large numbers of PCs. •Fully configurable profiles • Scheduling of Profiles

Features

Application of different profiles for different timings

Night hours

Working hours

After working hours

•Implementation organizational working environment policies• Configurable detection threshold settings• Limiting internet surfing time• PC hibernation, log-off, shutdown if not in use.• Thumbdrive blocking.• Use-of-facilities policy and system tray icon.• Limiting application usage

•Easy Administration of large numbers of PCs. • Full configurable profiles • Scheduling of Profiles• User access control for different • Auto-emailed Summary Reports

Features

Summary – Uniqueness

• Approach to detecting inappropriate material. – Captures at point of display not at gateway level.– Detection of encrypted chat, DVDs and applications.

• Designed for middle managers not IT staff. – Ensure proper usage of PCs in their departments.– Intuitive and interactive Web 2.0 interface.

• Support for very large hierarchical organisations.

– Server clustering with support for linux

Summary – Quality

• Developed using CMMI Level 3 Software Processes and Practices.

• Latest Web 2.0 Technologies for speed, interactivity and usability.

• Award winning artificial intelligence and image processing analysis engines

Awards & RecognitionPIKOM Computimes ICT Awards 2004 - WINNER“ICT Product of the Year”

MSC - Asia Pacific ICT Awards 2004 - WINNER“Best of Applications and Infrastructure Tools”

International Asia Pacific ICT Awards 2004 Hong Kong - MERIT AWARD“Best of Applications and Infrastructure Tools”

MSC - APICTA 2003 - MERIT AWARD“Best of R&D”

Asian Innovation Awards 2004 - FINALIST Far East Economic Review“Improving Productivity, Efficiency & Quality of Life”

Asian Conference on Computer Vision 2004 28-30 January 2004, Juju Island, Korea.Detecting Pornographic Images

MSC-APICTA 2005, Malaysia – WINNERURLChecker "Best of Application and Infrastructure Tools”

APICTA 2008, SS3 - WINNER“e-Community & e-Inclusion' category”

“Surprisingly, perhaps, it works brilliantly”

All businesses can improve their

• Productivity• Compliance and;• Carbon Footprint

by implementation of a programme and process of Governance, Compliance and Acceptable Use which governs the use of their infrastructure using proactive system and activity management - backed up by effective tools, regular monitoring and comprehensive ongoing training

Closing So What

By this action the business will make positive gains in its;

Staff relationships Customer relationships Investor & Stakeholder relationships Profitability

Closing So What

Questions?ians@guardware.co.uk

Ensuring the responsible use of IT