FINEART TECHNOLOGY OVERVIEW Security Consultant Alden Chen www.fineart-tech.com
ABOUT FINEART
About FineArt + 110+ 30Y 800+ Patent Granted Global Customer Since 1989 100% RD 50%+ 100 employees Made in TW
X-FORT ENTERPRISE ELECTRONIC DATA SURVEILLANCE SYSTEM
How data be used? Take laptop back home Use storage device to Design and drawing Upload data to Cloud for work exchange and backup files Install OS or software by Business talk via IM Email data to personal Sharing files via SMB users account via Gmail Net Share
X-FORT Protection First, we installed an X-FORT Agent to each computer(device) Then, it works as below: Log all the Control user Filter trusted Lock important assets operations behavior/operation computer/device and restrict to access Access Control Guard Monitor Safe box System
Information Security Governance Behavior Analysis Bulk copy or delete Irregular browsing • • Use untrusted device Screen capture • • Audit Malicious software • Operation Log File operation log Application exec. log • • Monitor Web browsing Event recording • • IM chat message • IT Asset Management H/W & S/W change alert Remote deployment • • Management Prohibit untrusted HotFix management • • application Leak Prevention Storage device, Printer, Wireless AP • Control Web, IM, Webmail, Cloud • Virtual Machine •
X-FORT Control Scope (DRM) (DLP) (DLP) (ITAM) Document Local Network Asset Management Security Security Management Hardware SMB Net Access Storage Assets Rights Share Device Software Document Personal Assets Encryption Firewall CD/DVD Center Life Cycle Web On-demand Printing Browsing S/W Encryption Deployment Operation Transfer Remote Delegation Log Control Software Force Email Other Device Security Encryption
X-FORT Architecture System Mgmt. X-FORT Server File Server AD Server MS SQL Branch1 (VPN) X-FORT Backup Server Head Quarter Branch2 (VPN) Dept. Mgmt. Mgmt. Role Mgmt. Offline Group Manager X-FORT Auditor Admin System Admin Group Member X-FORT Relay Server
PROTECT . PREVE N T . S E C URE
Recommend
More recommend