0% found this document useful (0 votes)
103 views44 pages

IP-guard Product Introduction

The document describes IP-guard, a software with 14 modules for intranet security management. It provides security for data, devices, applications, websites, emails and more. It monitors usage and activities to protect information and improve work efficiency.

Uploaded by

Rendy Aldo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
103 views44 pages

IP-guard Product Introduction

The document describes IP-guard, a software with 14 modules for intranet security management. It provides security for data, devices, applications, websites, emails and more. It monitors usage and activities to protect information and improve work efficiency.

Uploaded by

Rendy Aldo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 44

IP-guard

www.ip-guard.com
IP-guard

Contents

1 Brief Introduction

2 14 Modules of IP-guard

3 Solutions

4 Components and Basic System Architecture


IP-guard

Security Challenges form


Computerized Corporation

Data-Stealing

Data Disclosure spyware,


Security Risks
illegal intrusion,
Removable storage device, hacker…
email, P2P Application, system vulnerability,
printing… virus attack,
malicious deletion or
modification

Creative design,
VIP customer
information,
sensitive financial
data …
IP-guard

Drawbacks of Information Technology

Play games · Trade Stocks · Chat Online

Browse Web Pages · Print Personal Stuffs

Online Movies · Radio · Download Music

Cannot Troubleshoot Remote Computer

Cannot Track Computer Assets Changes

Administrator Faces Heavy Workload


IP-guard

The significance of Protecting


Intranet Security
 To resist external risks
 To prevent internal breaches

Intranet Security
Management

Corporation

Management
Intranet Security

Anti-virus
Software
IP-guard

The Core Values of IP-guard

Protect data security;


Safeguard intellectual property.

Effective and
Adjust employee behavior;
Comprehensive
Improve work efficiency.
Management

Centrally manage system;


Keep system stable.
IP-guard

Contents

1 Brief Introduction

2 14 Modules of IP-guard

3 Solutions

4 Components and Basic System Architecture


IP-guard

14 Modules of IP-guard

Basic Management Application Management

Document Management Website Management

Print Management Bandwidth Management

Device Management IP-guard Network Management

Removable Storage Screen Monitoring


Management

Email Management Remote Maintenance

Instant Messaging IT Asset Management


Management

Be composed freely;
Be selected optionally.
IP-guard

Basic Management Module


Basic and essential module of IP-guard. It’s a mandatory
module.

 Basic Events Log


 Record computer startup, logon, logoff, shutdown to check
when do your employee start working and what time do they
leave their workstations

 Basic Control
 Remotely lock, log off, restart and turn off agent computers to
manage computers or stop illegal operations

 Basic Policy
 Block users from randomly modify system setting in order to
prevent accidental and intentional destruction and improve
system security.
IP-guard

Document Management Module


Control and monitor document actions to safeguard
intellectual property

 Document Control
 Effectively control document actions to prevent unauthorized
actions, malicious modification and deletion.

 Document Backup
 Back up documents before they are modified or deleted to
make sure the security of important documents

 Document Logging
 Record document actions in detail
 Record document actions of any computer on shared
documents
IP-guard

Print Management
Monitor file printing to prevent data leakage

 Print Control
 Control printing permission to prevent data leakage
 Reasonably assign print resource to stop wasting print
resource

 Print Logging
 Record print actions in detail for administrator to evaluate the
effective usage of print resource

 Print Backup
 Back up the image of printed file
IP-guard

Device Management
Control and monitor the usage of various devices to prevent
data leakage

 Device Control
 Block external devices from connecting to the intranet to
protect data security and stop data breaches

 Detailed and specific control


IP-guard
Device Management
- List of Controlled Device
 Storage Devices
 Floppy, CDROM, Burning Device, Tape, Removable Storage Device

 Communications Devices
 COM, LTP, Bluetooth, Infrared, SCSI Controller, etc.

 Dialup
 Dial-up Connection

 USB Devices
 USB hard disk, USB CDROME、USB LAN Adapter, USB Image Device, etc.

 Network Devices
 Wireless LAN Adapter, Virtual LAN Adapter, PnP Adapter (USB, PCAMCIA)

 Others
 Audio device, Virtual LAN Adapter

 Any added new devices


IP-guard

Removable Storage Management


Authorize and encrypt removable storage device to protect your
valuable data anywhere at anytime.

 Permission Control
 Strictly control file in motion to protect data

 Automatic Encryption & Decryption


 Automatically encrypt data when files are written to any
removable storage device to enhance the security level of data
in motion

 Whole Disk Encryption


 Format corporate removable storage device as encrypted
removable storage device.
 Automatically encrypt and decrypt data stored on the encrypted
removable storage device within the corporate environment.
* NOTE: Encrypted removable storage device only can be used within the
corporate environment
IP-guard

Email Management
Control and monitor incoming and outgoing emails to prevent data
leakage

 Email Control
 Block sending specified POP3/SMTP emails or Exchanges
emails out of the organization via email to prevent data leakage

 Email Logging
 Fully record sender, recipient, subject, text and attachment
 Support POP3/SMTP email, Exchange email, webmail, and
Lotus email
IP-guard

Instant Messaging Management


Control and monitor instant messaging to safeguard data security
and improve work efficiency

 IM Logging
 Completely record instant messages, participants, time to
prevent data leaking out via IM applications

 File Transfer Control


 Block sending files out of the corporation over limited size or
with limited file names

 File Backup
 Back up transferred file
IP-guard

Application Management
Control and monitor application usage to improve work efficiency

 Application Statistics
 Gather statistics by category, name, detail and group to let you
know your employee’s work performance

 Application Control
 Filter non-work related applications to make your employees
concentrate on work business
 Block malicious application to protect computer security

 Application Log
 Record application start, stop, window switch to track the
application activity of staff
IP-guard

Website Management
Record staff’s web browsing activities; limit web site access right to
regulate staff’s online activity

 Website Statistics
 Gather statistics by different ways to let you know your staff’s
web browsing activity

 Website Management
 Filter non-work related websites during a specified time period
 Block malicious and inappropriate websites

 Website Log
 Record the URL, caption, and time of the visited websites to
track what your staff were browsing during office hours
IP-guard

Bandwidth Management
Limit and control bandwidth to avoid any bandwidth abuse

 Traffic Statistics
 Gather statistics by different ways to assist administrator to
analyze traffic consumption

 Bandwidth Control
 Limit bandwidth by IP address or port to help administrator
reasonably assign various bandwidth to different users
 Limit BT download, online video watching to make sure that
you have sufficient bandwidth for business use
IP-guard

Network Management
Prevent unauthorized external computers from accessing internal
network

 Network Control
 Offer firewall function and block unauthorized computer
from communication with internal computers in order to
protect intranet security

 Network Intrusion Detection


 Scan the whole network to immediately stop
unauthorized computers from connecting to the internal
network so as to safeguard information security
IP-guard

Screen Monitoring
Record and replay screen snapshot to let you know what your
employees do step by step

 Screen Monitoring
 View the real-time desktop screen of any computer
 Monitor computers with multi displays
 Centrally monitor multi computers at one time

 Screen Record
 Completely record screen history for your latter review
 Set different intervals to capture screen snapshot when
different application are being used so as to pay attention to
risky applications
 Can save a lot of screen snapshots due to effective
compression
 Screen history can be exported to wmv format.
IP-guard

Remote Maintenance
Support remote maintenance so as to let you shorten the
downtime and quickly solve the system problem

 Remote Troubleshooting
 Check the real-time running processes of client computers
 Remotely analyze the running status, system fault and
device status of client computers

 Remote Control
 Perform remote assistance or demonstrate operational
instruction

 Remote File Transfer


 Remotely transfer files from remote computers to local
computer, and from local computer to remote computers in
order to quickly gather fault samples to diagnose the
problem and update files
IP-guard

IT Asset Management
Easily manage IT asset to reduce management cost

 Asset Information
 Automatically collect software and hardware information and
provide asset inventory to facilitate administrator’s
management
 Offer non-IT asset management function

 Asset Change
 Record software and hardware changes in detail
 Instant alert on asset changes
IP-guard

IT Asset Management

 Vulnerability Management
 Automatically scan system vulnerability of agent computer and
provide easy-to-read report and solutions

 Patch Management
 Check Microsoft for new patches at regular intervals
 Automatically download and deploy new patches to agent
computers

 Software Deployment
 Deploy files and programs with ease
 Support breakpoint transmission to facilitate background
installation and interactive installation
IP-guard

Contents

1 Brief Introduction

2 14 Modules of IP-guard

3 Solutions

4 Components and Basic System Architecture


IP-guard

Data Loss Prevention Solution

Data Security Management

Email Document
Management Management Instant Messaging
Management

Screen Network
Print Device
Removable Management
Management Management Monitoring
Storage Management
IP-guard

Data Loss Prevention Solution

Pre-Control In-Control Post-Control

When unpermitted
Based on business actions trigger the All activities on
and management policies, actions will computer are
needs to set be immediately recorded in logs
specific policies blocked so as to and in other
protect data security. formats.
IP-guard

Data Loss Prevention Solution

Pre-Control

Based on
business and
management
needs to set
specific policies
IP-guard

Data Loss Prevention Solution


General Control
Document Management Print Management
Email Management Instant Messaging Management

In-Control Device Management

Offline Control
Policies are still effective when computers are offline
in order to always protect data security.

When unpermitted Document Backup


actions trigger the
policies, actions will * Back up original files before they are modified or
be immediately deleted
blocked so as to * Back up files before they are sent out of the
protect data security. company

Transparent Removable Storage


Encryption and Document Encryption
Active defense. Maximumly safeguard data
security.
IP-guard

Data Loss Prevention Solution


• Record document actions

• Record printed files


• Record print actions

Post-Control
• Record the usage of
removable storage device

• Record email content and


attachment
All activities on • Record both incoming and
computer are outgoing emails
recorded in logs
and in other
• Back up transferred files
formats.
• Instant message logging

• Real-time screen snapshot


• screen snapshot history
IP-guard

Customer Benefits
 Avoid lawsuit and data leakage risks
 Raise the core competitive power of enterprise
 Improve the reputation of enterprise
IP-guard
Employee Activity Management
Solution
Device
Application Management
Management • Control device usage
•Control application usage
• Gather statistics on
application usage
• Record application
activity

Screen
Bandwidth Activity Monitoring
Management Management
• Control bandwidth • Real-time screen
usage snapshot

•Gather statistics on • Screen snapshot


traffic consumption history

Website Network
Management Management
• Filter unwanted websites • Control network
communications
• Gather statistics on
websites visited • Detect intrusion
• Record websites visited
IP-guard

Employee Activity Management


Manage employee’s online and computer activity
IP-guard

Employee Activity Management


Instant Warning Message
Optionally do NOT compulsively block users using gaming applications, browsing shopping websites,
sending private emails, and much more. But when they are doing non-work related things, warning
messages can be automatically sent to users. Warning messages help them comply with the company
policy.

Powerful Control Function


This solution not only can allow or block specified employees from using specified application,
email, removable media and other things, but also can control employees’ activity by customized
group during different time periods.
IP-guard

Customer Benefits

• Adjust employees’ work behavior to improve


work efficiency

• Avoid network abuse and network choking to make


sure that there is enough bandwidth to support the
smooth development of key business
IP-guard

Systems Management Solution

System Management

IT Asset
Remote
Management
Control

• Software & hardware


Management • Remote
Troubleshooting
• Patch Management
• Remote Control
• Vulnerability
Management • Remote File Transfer

• Software Deployment
IP-guard

Customer Benefits
• Get a grip on your IT inventory

• Make quick response to system faults

• Greatly improve system administrators’ work efficiency

• Maintain system stability and enforce system security


IP-guard

Contents

1 Brief Introduction

2 14 Modules of IP-guard

3 Solutions

4 Components and Basic System Architecture


IP-guard

Components of IP-guard

Console
Server
 View data
 Store data  Set policy

 Manage policy  Perform real-time maintenance

Agent
 Collect data
 Execute policy
IP-guard

System Architecture
IP-guard

System Requirements

Components Requirements
SQL Server 2000 SP4, MSDE SP4,
Database SQL Server 2005 SP1, SQL Server 2005 Express SP1

OS Supported Microsoft Vista, 2003, XP, 2000, Me, and 98

Agent CPU: Pentium® 4


Recommended RAM: 512MB
Free disk space: 1GB

OS Supported Microsoft Windows Vista, 2003 SP1, XP SP2, and 2000 SP4

Server CPU: Dual Core or Quad Core


Recommended RAM: 2GB
Free space: 60GB

OS Supported Microsoft Windows Vista, 2003, XP, and 2000

Console CPU: Pentium 4


Recommended RAM: 512MB
Free space: 1GB
IP-guard

Installation
 Server Installation
 Generally, sever is installed on a server-class computer with
high performance and a lot of free disk space. The server
computer should use the Operating System which IP-guard
server is supported.

 Agent Installation
 Agents are installed on the computers you want to monitor or
manage.
* Manually direct installation
* Remote Installation
* Logon Script Installation

 Console Installation
 Consoles are installed on manager and supervisor’s computers.
IP-guard

Conclusion

1 2 3
What is IP-guard? How IP-guard can Why choose
help corporations? IP-guard?

You might also like