Sie sind auf Seite 1von 12

PRODUCTIVITY

BEGINS WITH
SECURITY

CHANGE THE GAME WITH


SECURE PRODUCTIVITY
In small to mid-sized businesses, IT managers tend to wear multiple hats. They are tasked
with constantly updating their organizations technological capabilities while simultaneously
competing with other departments for limited budgetary resources. And, because IT has
traditionally been viewed as a cost center, getting a fair slice of the pie is often difficult.
But in todays digital economy, where productivity drives profitability and networks power
the enterprise, IT departments actually are a critical component of success. With a focus on
day-to-day productivity and safeguarding work environments using a secure management
solution, IT can be a key driver of business growth.

WHAT WE DO
Interfocus provides vital productivity management
capabilities for small and mid-sized businesses.
Our multifunctional product delivers operational
visibility into the following:

IT asset management

User activity monitoring and management

Employee productivity

Endpoint compliance and protection

Software license compliance

Internal IT and regulatory IT compliance

THE PILLARS OF PRODUCTIVITY


VISIBILITY
Get the insight you need to make changes that work. Notice which IT assets are
underutilized and understand where they can best be redeployed. See who is
accessing sensitive data and if theyre exporting it. Identify your best performers
and model your policies accordingly.

CONTROL
Manage with greater understanding and dexterity. Oversee web access using
white and black lists and/or URLs. Block unauthorized or custom applications.
Assign appropriate access privileges and monitor for their risk potential.

COMPLIANCE
Rules arent rules if they arent being followed. Understand who is complying
with the use policy and take steps to steer behavior. Be audit-ready with software
license management and tracking. Increase your awareness of unauthorized apps
on company devices and ensure mandatory apps are installed.

WHETHER MALICIOUS OR NOT,


THE PROBLEM IS REAL

UP TO

80%

$500K

71%

per incident for PCI

of data breaches target

compliance violations ++

small businesses*

30-40%

60%

96%

of employee Internet access


time is not work related +++

of all online attacks target

of data breaches target

small and mid-sized businesses**

payment card data*

of leaks occur internally +

60%
of small businesses close within six
months of experiencing a data breach*

* Value Delivery Model for Secure Productivity by Interfocus Technologies, Inc.


** The New York Times article No Business Too Small To Be Hacked
+ JNSA
++ UC Santa Cruz - PCI-DSS: Security-Penalties
+++ International Data Corp. (IDC)
4

WHO STANDS TO BENEFIT


Our secure productivity solution is specifically designed to meet the IT security and productivity
management needs of small and mid-sized businesses struggling with increasing accountability
and limited resources.
That said, any enterprise with high value intellectual property and/or a large virtual workforce
(work-at-home and/or administrative personnel) will find our affordable, easy-to-use, and secure
productivity management solution powerfully effective. Gain actionable insights into user behavior,
devices, applications, and data to ensure security and compliance while keeping employees
productive, and do it all from a single console.

Specific markets who will find our solutions helpful are


those with regulatory compliance mandates, including:

HEALTHCARE
FINANCIAL SERVICES
RETAIL
MANUFACTURING
LEGAL

GREATER VISIBILITY
Using a simple web browser UI, administrators can see on which PC a rule violation has occurred just by
clicking. Once a policy has been set, violations are displayed in the calendar and trigger an email notification
to the appropriate administrator informing them which PC is out of compliance.

Administrators have access to comprehensive logs of user activity so they can track policy violations
during office hours. Violations are set by company policy and can flag a wide range of unauthorized
actions by users, including playing games or shopping on company time or even exposing confidential
customer information.

By automatically detecting the devices attached to the office network and collecting their configuration
information, you can identify all the IT assets that need to be managed as well as any rogue assets on the
network. In addition, administrators can detect employees personal PCs when connected to the office
environment. This can give you better visibility toward protecting your network from threats, infections, and
malicious activities.
6

UNPRECEDENTED CONTROL

By reading the activity log 15 minutes before and after an incident, you can trace file operations
(copy, move, create, delete, or rename) from inception to the final destination. If a wider time frame
is required (than 15 minutes before and after), that can be checked in a single click.

SIMPLIFIED COMPLIANCE

Hardware and software information collection occurs automatically every day allowing administrators
to maintain an optimum inventory without the need for additional management action. IT asset
information can then be presented clearly, to reflect the true, current environment with all updates
recorded and sent to specified administrators via email.

CAPABILITIES AT A GLANCE
FUNCTION

DETAILED FUNCTION

OVERVIEW

Alert Management

Represents alerts on dashboard by group and person.

Reporting

Shows summarized log and graph that drills down by group and date.

Log Search and Trace

Allows users to search and lookup logs up to 5 years back and can trace certain causes of a le breach.

Network
Detection

Detection/Notication

Automatically detects network devices.


Detects unauthorized connections and sends corresponding notications in real time.

SNMP Device
Management

SNMP-compatible Device
Management/Live Monitoring

Collects and manages information about hardware of SNMP-compatible devices.


Also provides live monitoring.

Remote Control

vPro/VNC

Allows users to operate VNC-equipped computers remotely to congure BIOS settings,


turn unit power on or o, and perform other remote operations on computers compatible
with Intel vPro technology.

Hardware Asset Management

Automatically retrieves over 50 types of data, including computer names and IP addresses.
Manages printers and peripheral devices as asset management items.

Software Asset Management

Coordinates with license dictionaries to perform SAM, allowing users to maintain an inventory of
installed applications and upgrade/downgrade software as needed.

USB Asset Management

Automatically detects USB devices in use and lets users check how long devices have been idle.

Power-saving Management

Congures settings including power-on/o or standby. Enables remote operations via WakeOnLAN.

Distribution/Automatic
Installation

Distributes security patches and installs business applications.


Records operation on screens to install application automatically.

Application Operation

Renders application operations in numerical terms and helps users grasp who uses which
applications how often.

Application Blocking

Blocks executing user-dened or unauthorized applications.


Issues pop-up warnings as appropriate to make users aware of potential policy violations.

Retrieving Operation Logs

Retrieves logs concerning PC operations.


Retrieves records of le-copy, le-move, le-delete, and command prompt operations.

Literacy Management

Displays terminal operating times and operating status conditions in a visual format to help
visualize business tasks. Allows users to extract operations performed during non-business hours
(early morning/late night operations) and check operation logs.

Retrieving Operation Logs

Retrieves printing logs including document name, PC, person, and printer.
Sets thresholds and assesses large-volume printing projects.

Retrieving Web Access Logs

Monitors web activity to identify which users are accessing which websites and for how long.
Captures web mail and any uploads/downloads from the website.

Conicting Website Blocking

Blocks unauthorized access to web sites, including uploading, downloading, and writing to them
via blocked keywords and/or URLs.

Controlling Use of
Storage Media

Controls the use of CD/FD/USB memory and/or other devices.


Enables users to limit the use of USB memory devices to specic models, prohibit read/write
operations, and congure related device settings. Controls Wi-Fi/Bluetooth connections.

Web Console

Asset
Management

File Distribution

Application
Operation
Management

Operational
Process
Management

Print Log

Web
Access
Monitoring

Device Controls

INTERFOCUS IN ACTION
EMPOWER REMOTE WORKERS WHILE
ENSURING REGULATORY COMPLIANCE
A semiconductor manufacturer with 300+ workstations allows its employees to
use laptops at home for the sake of efficiency. However, regulations in its industry
requires all change logs of regulated files to be captured. By running Interfocus
agent on remote workers laptops, the administrators visibility into whats
happening is significantly improved. The activity logs can also be reviewed to
reduce the potential of data breach.

COMPLIANCE LED TO COST SAVINGS


A financial firm with 160 workstations chose Interfocus to help with privacy
regulations compliance but soon discovered surprising benefits in other areas. For
instance, using asset management capabilities made it easy to identify underutilized
assets and reallocate them. Also, when the print log management function notified
employees of overages, they began to use preview mode before printing which
dramatically cut down on excessive hard copies.

AUDIT READY AND BULLET PROOF


A defense manufacturer with 300 workstations subject to International Traffic in
Arms Regulations (ITAR), which control the export and import of defense-related
articles and services, knew it had to act when a third party alerted them to a content
breach. By relocating the ITAR-regulated files to a shared server monitored by Interfocus,
all access is continuously logged, including identifying data copied to external USB
drives. Today, the manufacturers ITAR compliance is truly locked and loaded.

HEALTHCARES STRICT REGULATIONS


REQUIRE EXTRA DILIGENCE
When this medical holding company with 900 workstations established its data
export policy, it set up a read-only access for external devices. Using Interfocus
monitoring features, it was discovered that users were bypassing the rules and
uploading sensitive data to cloud-based servers. Based on these findings, the
company was able to quickly apply web access and application prohibition policies
to stop data leakage to the cloud.
9

SAVE TIME AND MONEY TODAY


AND TOMORROW
Receiving a software license audit letter for 1,000 workstations prompted
a building and construction manufacturer to tally up the time theyd need to
complete the task and they came up with a daunting project estimate
of 12 months. Interfocus solutions helped them complete the audit quickly
in under two months! Now theyve been able to establish a company policy for
software license compliance and they continue to rely on Interfocus for ongoing
software maintenance and management.

MANAGE THE MOBILE WORKFORCE


AND MITIGATE RISK
An IT service provider with a large mobile workforce of 5,000 workstations created
policies and tried mitigating the risk posed by peripheral devices using an
off-the-shelf consumer product. Unfortunately, the product was unstable and the
project failed within 12 months. Using Interfocus, the provider completed the
project in eight weeks and had a stable platform to implement its peripheral device
policy. More than 800 USBs were cataloged into the solution and read-only mode
was applied.

TOP STORY IS VISIBILITY AND CONTROL


FROM A SINGLE CONSOLE
A media broadcast company with 150 workstations and 20+ smartphones wanted
to be able to monitor its log files whether in the studio or on the go. They zoomed
in on Interfocus to provide visibility, control, and compliance across their IT assets
and applications. Now outdated and unsanctioned applications are old news.

OPERATION LOGS MANAGEMENT PROVIDED


HEALTHIER WORK-LIFE BALANCE
An IT manager at a small business implemented Interfocus to better log who
did what when at which PC. PC usage information is recorded, such as apps
running, printing, file operations, screen views (window title). That info allowed him
to better understand his work, recognize issues and solve problems like managing
applications. He happily reported to us that hed gained a healthier work-life
balance, Within five months, I was able to get more work done despite reducing
my average monthly work hours by 10%.

10

ABOUT INTERFOCUS TECHNOLOGIES


Interfocus Technologies is a productivity management software company dedicated to enabling
visibility into user activity, controlling IT assets, and securing continuously-compliant enterprises at
an affordable price through a single console.
We offer US businesses exclusive access to a market-leading technical solution that has helped
over 10,000 global clients with 8.6M installed users, manage and protect their digital property and
productivity.
Interfocus Technologies, Inc. is the US subsidiary of MOTEX, part of the Kyocera Communication
Systems Co., Ltd Group in Japan. The base Interfocus technology has successfully served clients
since 1990.

900 East Hamilton Avenue, Suite 100


Campbell, California 95008
general@interfocustechnologies.com
11

Das könnte Ihnen auch gefallen