1 / 35

LANDesk Endpoint Security Audit 2.5

LANDesk Endpoint Security Audit 2.5. Danny Huang. LANDesk. Jan 2014. What Endpoint Security Audit can do for you?. IT Security Audit for e nterprises. Data Loss Tracking Critical file leak: Copy Print Email IM …. Monitoring & Controlling Enforce Security Policy: USB Block

claus
Download Presentation

LANDesk Endpoint Security Audit 2.5

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. LANDesk Endpoint Security Audit 2.5 Danny Huang LANDesk Jan 2014

  2. What Endpoint Security Audit can do for you? IT Security Audit for enterprises • Data Loss Tracking • Critical file leak: • Copy • Print • Email • IM • … • Monitoring & Controlling • Enforce Security Policy: • USB Block • Unsafe APP • … • User Behavior Checking • Unrelated to work things • Game • Surf web • IM chatting • Stock trading Reduce Risks Enforce Policy Increase Productivity

  3. LANDesk Desktop Management / Security / Audit Solutions Manage Security Audit Before Happening After LANDesk Management Suite LANDesk Security Suite LANDesk Security Audit

  4. Lifecycle Security Audit Turn ON User login Document Create, Edit, Delete… Logging user all operation User logout Turn Off Print, Copy… Game, Surf web, IM…

  5. Security Audit 360Security Audit App Audit - App usage - Active Window Title - Screenshots Doc Audit - File operation - Print Document Application Operation Network Network Audit - Surf web - Email - IM chatting Operation Audit - On/Off Login/Logout - USB Usage - Copy/ Paste ESA Pro 3.0

  6. Product roadmap Marketing Trial File Opt, Screenshot, Print Log Web Access Log Mail Log Critical File Read Log ESA 1.x 2011-2012 ESA 2.x 2013-2014 ESA 3.x 2014-2016 ESA 4.x 2015-2018 Application, Active Title Log Clipboard, USB Disk Log Logon/logoff, System Change Log Web Access Log (Trail) BYOD / Cloud Clients Mobile Device Audit Log

  7. Software usage logging Get better understand how end user are using software.

  8. Turn ON/OFF, Login/Logoff logging Get better understand how end user are using their computers. Work at weekends

  9. Surf web logging Get better understand how end user are using network. Web title, URL, Port, time… Surf web logging, even not in Corp network

  10. File operation logging File name, folder, operation, time, user…

  11. Print logging Get better understand how end user are using printer. Doc name, printer name User, IP, Pages

  12. Active window title logging Windows title, process name, time, user…

  13. Application usage logging App name, time, version…

  14. Screenshot logging

  15. Screenshot logging • Screenshot can be triggered by time, specified application. For example: only when end user use Skype will do screenshot. • Can search picture content, high compressed picture save storage space. • Picture can be showed as video, and can be exported. Word Web eMail IM

  16. Screenshot logging Replay IM (Skype / QQ / MSN) chatting.

  17. Screenshot logging Online video

  18. Turn ON/OFF Login/Logout Logging Turn On, Login Lock screen, Login

  19. System information change logging In another network Business trip… In different time zone, abroad… Change: Hostname, IP, Time zone…

  20. USB device usage logging Get better understand how end user are using USB device. USB storage plug in/out Name and Type

  21. Clipboard logging Copy files from local and network drives Copy Content File name, Content

  22. IM chatting logging Chatting content User: From, To, Group File transfer

  23. User abnormity behavior logging High light User abnormity behavior

  24. User abnormity behavior logging Search by user, IP, keyword and export to CSV files All behavior relate to the keyword“QQ”

  25. Log query Create queries by different parameters

  26. User abnormity behavior alert Alert rule、email template, Alert admin by email

  27. User abnormity behavior alert email Watching movie in work time IM Chatting in work time

  28. Multiple logging rule for different BU/User Individual enable/disable logging Move to different groups

  29. Up to 10000 nodes, low net work usage Support multiple file servers Use different logging rule to lower net work usage

  30. LANDesk ESA topologic logging ESA File Servers PC / NC Notebook Desktop management Client Audit log All log keep in DB/file server Support up to 10000 clients Desktop management ESA console LDMSconsole Core Server

  31. Supported platforms • Server: • Windows Server 2008 R2 or higher • SQL Server 2005SP3 / 2008 R2or higher • .NET Framework 4.0 or higher • Client: • Windows XP / Vista / Windows 7 / 8 • Support language : • Server:English / Japanese / Chinese • Client: English / Japanese / Chinese

  32. Medalsoft Consulting Services • Profile: • Founded: 2011 • CAGR: 25% • Shanghai: 25+ people, • Shenzhen Branch: 10+ people • Tokyo Office: 2+ people • Target: • To be a top 10 professional solution provider in Cloud Computer area in China. • To be listed in OTC SH within 3-5 years • Products & Solutions: • SharePoint / Office 365 Consulting Services & Apps • BPM Consulting Services • ESA & ITAM & ITSM Solutions (LANDesk) • Clients & Partners: • 100+ Clients • Customer Satisfaction: 99% • Microsoft, LANDesk, Kingsoft (China), FlowPotal BPM (China), Clover-Sun (Japan)

  33. Our Products & Solutions Enterprise Information Portal (SharePoint & SharePoint Online) EIP Medalsoft BPM ITIL IT Asset Management IT Service Management Endpoint Security Audit - PC Operation Logs Business Process Management

  34. Work with LANDesk • Endpoint Security Audit: • Released ESA 2.x version. • Won more than 10+ clients (20000 nodes+) in China. • More than RMB2,000,000 revenue contributed indirectly. • Technical Support to Japan team & South Asia team. • Asset Lifecycle Management: • More than 10+ ALM projects delivered. • More than RMB3,000,000 revenue contributed indirectly. • Delivered Almost 80% ALM projects in China. • Management Suite: • More than 50+ LDMS projects’ support provided. • More than 10+ projects delivered (Customization Development). • More than RMB3,000,000 revenue contributed indirectly. • Technical support to South China & East China teams • Service Desk: • Started LDSD Consulting Services from 2013 • Started one LDSD project in 2013

More Related