network grc delivery

71
ensuring the responsible use of IT the value of

Upload: iansadler

Post on 24-May-2015

195 views

Category:

Documents


1 download

DESCRIPTION

Guardware GRC software explained

TRANSCRIPT

Page 1: Network GRC Delivery

ensuring the responsible use of IT

the value of

Page 2: Network GRC Delivery

e-Safe Business : Powered by Guardware

Email

Mobile Phone

Social Networking

Web Conferencing

Instant Messaging

The The OrganizationOrganization

VOIP

As society becomes increasingly connected so organizations of all types and sizes have to adapt to, and take advantage of, the business benefits of online

communication, connectivity and collaboration.

Balancing Productivity and Compliance

Page 3: Network GRC Delivery

e-Safe Business : Powered by Guardware

This change is accelerating, its scope is broadening and its impact is global. Competition is fierce and

recruitment is increasingly difficult

Regulatory pressures are escalating

Clients are more demanding

Acceptable Use PoliciesBalancing Productivity and Compliance

Page 4: Network GRC Delivery

e-Safe Business : Powered by Guardware

Society is hooked on all-pervasive, always-on connectivity. The boundaries between work, social and leisure time are becoming nonexistent.

Web Conferencing

Social Networking

PDAs

E-mail

Internet

Mobile Phone

VOIP

I.M.

Page 5: Network GRC Delivery

e-Safe Business : Powered by Guardware

The OrganizationThe Organization

For most of us, not having online access would severely impact our productivity.

For a growing percentage, full time, instant, multi-device connectivity is mission critical.

Connectedness

For any organization connectedness provides a huge competitive advantage particularly if governed by an ITC Acceptable Use Policy which is integrated into its business vision and strategy.

Page 6: Network GRC Delivery

e-Safe Business : Powered by Guardware

The OrganizationThe Organization

At the same time workplace demographics are changing

Existing staff members are being replaced by a new generation of knowledge workers

Connectedness

They have never known a world without the internet, Google, Facebook, YouTube, text messaging and camera phones, they are naturally collaborative and connected.

Page 7: Network GRC Delivery

e-Safe Business : Powered by Guardware

The OrganizationThe Organization

At the same time workplace demographics are changing

In order to compete for this valuable talent base organizations have to offer an always on, connected, collaborative environment

Connectedness

It has to support the way in which the “everyone, everything, everywhere, connected” generation, live and work.

Page 8: Network GRC Delivery

e-Safe Business : Powered by Guardware

10%

5%

60%

25%VOIP

Web ConferencingText Messaging

60% use social networking sitesat work

More than half of all knowledge workers use social networking sites and online communities for business communications

Whilst no one doubts that connectivity, communication and collaboration tools dramatically increase knowledge worker productivity there is the realisation that these same tools increase business risks for the employer.

Page 9: Network GRC Delivery

e-Safe Business : Powered by Guardware

How an organization manages these issues and trends could (will) impact on its costs and possibly even its ability to attract clients and recruit talent.

There is, therefore, a direct link between a clearly written and applied Acceptable Use Policy, Pro-active HR activity, continuous compliance monitoring and bottom line profit.

So What?

Page 10: Network GRC Delivery

e-Safe Business : Powered by Guardware

Manage the behaviour of users

These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to:

Page 11: Network GRC Delivery

e-Safe Business : Powered by Guardware

balance security and network reliability

These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to:

Manage the behaviour of users

Page 12: Network GRC Delivery

e-Safe Business : Powered by Guardware

Maintain employee productivity and safety

These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to:

balance security and network reliability

Manage the behaviour of users

Page 13: Network GRC Delivery

e-Safe Business : Powered by Guardware

Ensure complianceWith Regulatory rules and guidelines.

These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to:

Maintain employee productivity and safety

balance security and network reliability

Manage the behaviour of users

Page 14: Network GRC Delivery

e-Safe Business : Powered by Guardware

The risks fall into two main categories:

• Productivity & Reputational Damage for example lost hours, green computing issues,

negative media, investor & client consequence

•HR Issues

In particular the employees’ right to work within a secure, regulated and protected online environmenttogether with developing policies and strategies which help connected employees maintain a work/life balance.

Page 15: Network GRC Delivery

e-Safe Business : Powered by Guardware

The risks fall into two main categories:

•HR Issues

In particular the employees’ right to work within a secure, regulated and protected online environmenttogether with developing policies and strategies which help connected employees maintain a work/life balance.

Page 16: Network GRC Delivery

“70% of porn traffic occurs between 9- 5”The Industry Standard

“Worker Internet misuse ‘a problem’: two-thirds of companies have disciplined employees”

CBS Marketwarch

Consequences of breaches of Acceptable Use Policies: – Resource misuse costs.

– Reduced employee productivity.– Exposure to legal liabilities. .

"The employer is vicariously liable. An employer should make sure that the people it employs know how to behave and if they're causing offence to others then they should do something about it,"

Sarah Veale of the TUC – on BBC Radio

"Today's change will force employers to take their responsibilities towards providing a harassment-free working environment more seriously. “

TUC general secretary Brendan Barber

Page 17: Network GRC Delivery

A Personal Threat

Page 18: Network GRC Delivery

Responsible use of IT

• Blocking inappropriate material.– Pornography, drugs, racial discrimination.

• Blocking unproductive material.– Personal websites, games, gambling, chat.

• Ensuring proper use of facilities.– PC usage (PCs little used / PCs left on)– Application usage (What users actual do) – Disk usage (music and video files)– Network usage (downloads)– Green Computing CO2 management

• Optimal usage of hardware / software– Lack of or too many licenses. – Tracking assets.– Under or over powered PCs.

Page 19: Network GRC Delivery

Ensuring the responsible use of IT

Introducing

Page 20: Network GRC Delivery

ScreenShield™ v3

• Only solution that prevents all misuse of IT infrastructure and resources.

• Enables middle managers to control the usage of PCs in their departments. – Middle managers know what applications their staff use and are

responsible for ensuring productivity.

• Overcomes limitations of competitors.– Unlimited clients.– Web-based

• HTTP protocol so no firewall issues.• Administration of system via web-pages.• Modular design –

– Image– Text– End Point Management (USB)– Productivity & Green

Page 21: Network GRC Delivery

Image Analysis

• Decoding of video files. – Analysis of DVDs as they are being played.

• Fast image filter.– Up to 100 images per second. No need to fully decode.

• Full Analysis

Decision

Skin Tones Skin Textures Edges Blobs Limbs Faces

Page 22: Network GRC Delivery

Text Analysis

• Bayesian network classifier was developed and implemented in ScreenShield™:– Words / phrases considered in the context of

other words / phrases.

– Supports Arabic, Thai, Russian, French & German.

• More accurate than the simplistic keyword approach implemented in most filters.

Page 23: Network GRC Delivery

Webpage Analysis

• Metadata in the webpage header.– Analysis of text in Title, Keywords and Description.

– Checking of Internet Rating Labels • RSACi, SafeSurf, PICS amongst others

– Fast and confident decision if useful information.

• Body of the webpage:– Analysis of text within the webpage.

– Analysis of images within the webpage.

– Analysis of links in the webpage.

– Analysis of webpage structure.

Page 24: Network GRC Delivery

Scan the Hard Drive forpornographic image, file types and video files

Drive Scanning

Page 25: Network GRC Delivery

Server clustering

• Cluster contains four server types:– Database Server, Web Admin Server, File Server and

Report Server.– Need to support 50,000+ clients.

• Support for Apache and Microsoft IIS.– WinXP, Win2003, – Planned: Win2008, Linux (Susie, Fedora and RedHat).

• Cascading server architecture. – Designed for hierarchical organisations spread over a

number of countries.

– Three types of server (Branch / Area / HQ) implemented.

Page 26: Network GRC Delivery

Cascade Management

Page 27: Network GRC Delivery

Features• Blocking pornographic images in WebPages

Page 28: Network GRC Delivery

WITHOUT ScreenShieldWITH ScreenShield

Page 29: Network GRC Delivery

•Blocking pornographic images in WebPages• Capture of pornography at point of display

• Independent of source of pornography and application

Features

Page 30: Network GRC Delivery
Page 31: Network GRC Delivery
Page 32: Network GRC Delivery

•Blocking pornographic images in WebPages• Capture of pornography at point of display

• Independent of source of pornography and application• Blocking of inappropriate WebPages (Gambling, hacking etc)

Features

Page 33: Network GRC Delivery

Features•Blocking pornographic images in webpages• Capture of pornography at point of display

• Independent of source of pornography and application• Blocking of inappropriate webpages (gambling)

Page 34: Network GRC Delivery

Categories Monitored

Page 35: Network GRC Delivery

•Blocking pornographic images in WebPages• Capture of pornography at point of display

• Independent of source of pornography and application• Blocking of inappropriate WebPages (Gambling, hacking etc)• All inappropriate incidences are logged.

Features

Page 36: Network GRC Delivery

Detailed Reports

Thumb nail view for easy administration

Who?

How?

When?

Page 37: Network GRC Delivery

Accidental

Addictive

Directing Attention

Page 38: Network GRC Delivery

•Blocking pornographic images in WebPages• Capture of pornography at point of display

• Independent of source of pornography and application• Blocking of inappropriate WebPages (gambling)• All inappropriate incidences are logged.•Not just inappropriate usage, but all PC usage.

•Monitoring of text with special emphasis on chat clients• MSN, YAHOO!, MS Messenger• Key word logging of input by user and document analysis

Features

Page 39: Network GRC Delivery

Number of Chat Violations

By user

Each chat session can

be viewed by the administrator

Text Monitoring

Page 40: Network GRC Delivery

•Blocking pornographic images in WebPages• Capture of pornography at point of display

• Independent of source of pornography and application• Blocking of inappropriate WebPages (gambling)• All inappropriate incidences are logged.•Not just inappropriate usage, but all PC usage.

•Monitoring of text with special emphasis on chat clients• MSN, YAHOO!, MS Messenger. • Key word logging of input by user and document analysis

• User productivity monitoring

Features

Page 41: Network GRC Delivery

e-Safe Business : Powered by Guardware

The risks fall into two main categories:

• Reputational Damage

for example lost hours, green computing issues, negative media, investor & client consequence

• Management Reporting & Feature Controls

Page 42: Network GRC Delivery

System tray icon

Working Environment Policies

Page 43: Network GRC Delivery

•Implementation organizational working environment policies Configurable detection threshold settings Limiting internet surfing time PC hibernation, log-off, shutdown if not in use. Thumbdrive blocking. Use-of-facilities policy and system tray icon. Limiting application usage

•Easy Administration of large numbers of PCs. Full configurable profiles Scheduling of Profiles User access control for different Auto-emailed Summary Reports

Features

Page 44: Network GRC Delivery

Productivity Reports

User productivity measured in percentage

Page 45: Network GRC Delivery

Productivity Report

Detailed productivity analysis by time

Page 46: Network GRC Delivery

•Blocking pornographic images in WebPages• Capture of pornography at point of display

• Independent of source of pornography and application• Blocking of inappropriate WebPages (gambling)• All inappropriate incidences are logged.•Not just inappropriate usage, but all PC usage.

•Monitoring of text with special emphasis on chat clients•MSN, YAHOO!, MS Messenger •Key word logging of input by user and document analysis

• User productivity monitoring• Network usage

Features

Page 47: Network GRC Delivery

Per user network load

Peek network activity break down

Network Usage

Page 48: Network GRC Delivery

•Blocking pornographic images in WebPages• Capture of pornography at point of display

• Independent of source of pornography and application• Blocking of inappropriate WebPages (gambling)• All inappropriate incidences are logged.•Not just inappropriate usage, but all PC usage.

•Monitoring of text with special emphasis on chat clients• MSN, YAHOO!, MS Messenger • Key word logging of input by user and document analysis

• User productivity monitoring• Network usage• Hardware and software audit

Features

Page 49: Network GRC Delivery

Organization wide PC

Hardware resource

captured and categorized

PCs recognized by using

MAC addresses

Detailed specification of the PCs captured

Hardware Audit

Page 50: Network GRC Delivery

Actively monitoring all

PC hardware resources

for changes

Detailed description of the changes recorded

Detecting HW Misuse

Page 51: Network GRC Delivery

Organization wide PC software resources captured and categorized

Report on illegal software usage in the organization

Software Audit

Page 52: Network GRC Delivery

Detailed description per PC on the licensed and un licensed software

Available licenses can be are categorized in to groups for easy management

Detecting SW Change

Detecting software changes per user

Page 53: Network GRC Delivery

•Blocking pornographic images in WebPages• Capture of pornography at point of display

• Independent of source of pornography and application• Blocking of inappropriate WebPages (gambling)• All inappropriate incidences are logged.•Not just inappropriate usage, but all PC usage.

•Monitoring of text with special emphasis on chat clients•MSN, YAHOO!, MS Messenger •Key word logging of input by user and document analysis

• User productivity monitoring• Network usage• Hardware and software auditing • Drive auditing

Features

Page 54: Network GRC Delivery

Break down of Harddrive usage by each employee

Drive Scanning

Page 55: Network GRC Delivery

•Implementation of organizational working environment policies• Configurable detection threshold settings• Limiting internet surfing time• Thumbdrive blocking.• PC hibernation, log-off, shutdown if not in use.

Features

Page 56: Network GRC Delivery

Configurable thresholds for different type of users

Enable or disable internet surfing for different users

Thumb drive blocking

PC hibernation and shutdown settings

Working Environment Policies

Green Computing Benefit – average Office work station can create over 200Kg of C02 per year

Equal to a passenger flight from London to Paris!

www.fixgaia.com

Page 57: Network GRC Delivery

What are the environmental benefits?

‘Businesses are currently responsible for half of all the UK’s carbon emissions; even small offices can emit three to five tonnes of carbon dioxide a year. Unless they reduce their carbon emissions, businesses will start paying the price of climate change through more expensive energy supplies and higher insurance premiums. a drop in business, with customers looking elsewhere for a more socially responsible supplier’

consider;

One workstation can produce the annual CO2 equivalent of a passenger flying from London to Paris.

The Internet, Computing and their supporting environmental services (air conditioning, lighting & buildings) are one of the worlds largest sources of GHG creation – Greater than air travel

All businesses can reduce their Carbon footprint by proactive management of their IT equipment and power consumption plus the implementation and effective monitoring of an Acceptable Use Policy (AUP) which governs the use of company infrastructure and which is backed up by both effective tools, regular monitoring and comprehensive training” using proactive system and activity management.

Page 58: Network GRC Delivery

•Implementation organizational working environment policies• Configurable detection threshold settings• Limiting internet surfing time• PC hibernation, log-off, shutdown if not in use.• Thumbdrive blocking.• Use-of-facilities policy and system tray icon. • Limiting application usage

Features

Page 59: Network GRC Delivery

Configurable application usage for different type of users

Working Environment Policies

Page 60: Network GRC Delivery

•Implementation organizational working environment policies• Configurable detection threshold settings• Limiting internet surfing time• PC hibernation, log-off, shutdown if not in use.• Thumbdrive blocking.• Use-of-facilities policy and system tray icon. • Limiting application usage

•Easy Administration of large numbers of PCs. •Fully configurable profiles •Different profiles for different users and PCs

Features

Page 61: Network GRC Delivery

Tree Structure for easy PC grouping and administration

Page 62: Network GRC Delivery

Different groups of profiles targeted at different set of users

Page 63: Network GRC Delivery

•Implementation organizational working environment policies• Configurable detection threshold settings• Limiting internet surfing time• PC hibernation, log-off, shutdown if not in use.• Thumbdrive blocking.• Use-of-facilities policy and system tray icon. • Limiting application usage

•Easy Administration of large numbers of PCs. •Fully configurable profiles • Scheduling of Profiles

Features

Page 64: Network GRC Delivery

Application of different profiles for different timings

Night hours

Working hours

After working hours

Page 65: Network GRC Delivery

•Implementation organizational working environment policies• Configurable detection threshold settings• Limiting internet surfing time• PC hibernation, log-off, shutdown if not in use.• Thumbdrive blocking.• Use-of-facilities policy and system tray icon.• Limiting application usage

•Easy Administration of large numbers of PCs. • Full configurable profiles • Scheduling of Profiles• User access control for different • Auto-emailed Summary Reports

Features

Page 66: Network GRC Delivery

Summary – Uniqueness

• Approach to detecting inappropriate material. – Captures at point of display not at gateway level.– Detection of encrypted chat, DVDs and applications.

• Designed for middle managers not IT staff. – Ensure proper usage of PCs in their departments.– Intuitive and interactive Web 2.0 interface.

• Support for very large hierarchical organisations.

– Server clustering with support for linux

Page 67: Network GRC Delivery

Summary – Quality

• Developed using CMMI Level 3 Software Processes and Practices.

• Latest Web 2.0 Technologies for speed, interactivity and usability.

• Award winning artificial intelligence and image processing analysis engines

Page 68: Network GRC Delivery

Awards & RecognitionPIKOM Computimes ICT Awards 2004 - WINNER“ICT Product of the Year”

MSC - Asia Pacific ICT Awards 2004 - WINNER“Best of Applications and Infrastructure Tools”

International Asia Pacific ICT Awards 2004 Hong Kong - MERIT AWARD“Best of Applications and Infrastructure Tools”

MSC - APICTA 2003 - MERIT AWARD“Best of R&D”

Asian Innovation Awards 2004 - FINALIST Far East Economic Review“Improving Productivity, Efficiency & Quality of Life”

Asian Conference on Computer Vision 2004 28-30 January 2004, Juju Island, Korea.Detecting Pornographic Images

MSC-APICTA 2005, Malaysia – WINNERURLChecker "Best of Application and Infrastructure Tools”

APICTA 2008, SS3 - WINNER“e-Community & e-Inclusion' category”

“Surprisingly, perhaps, it works brilliantly”

Page 69: Network GRC Delivery

All businesses can improve their

• Productivity• Compliance and;• Carbon Footprint

by implementation of a programme and process of Governance, Compliance and Acceptable Use which governs the use of their infrastructure using proactive system and activity management - backed up by effective tools, regular monitoring and comprehensive ongoing training

Closing So What

Page 70: Network GRC Delivery

By this action the business will make positive gains in its;

Staff relationships Customer relationships Investor & Stakeholder relationships Profitability

Closing So What

Page 71: Network GRC Delivery

[email protected]

Ensuring the responsible use of IT