FUJITSU Software Systemwalker Desktop Keeper V15 Introducing

Similar documents
FUJITSU Software Systemwalker Desktop Keeper. User's Guide. Windows

FUJITSU Software Systemwalker Desktop Patrol. Reference Manual. Windows

Operation Guide: for Clients

FUJITSU Software Systemwalker Desktop Patrol. Release Information. Windows

Smart Device Connection Manual for Android

FUJITSU Software Systemwalker Desktop Patrol. Release Information. Windows

Working Folder. Cloud Document Management Service

HPE Intelligent Management Center

ipad in Business Mobile Device Management

Wi-Fi Direct Guide. Easy Setup Using Wi-Fi Direct. Troubleshooting. Appendix

MultiPresenter application (for Windows/macOS) User manual

Thin Clients, Wireless Computers, Macs and Mobile Devices

Directions for pairing with an Android powered device via Bluetooth ISSION 360º I AM ON MISSION 360º I AM ON MIS

3CX Mobile Device Manager

Skynax. Remote Assist Console. User Guide

Register for your 30 day FREE TRIAL today.

Copyright Samsung Electronics Co., Ltd. All rights reserved.

Wi-Fi Direct Guide. Easy Setup Using Wi-Fi Direct. Troubleshooting. Appendix

Lenovo B. Quick Start Guide. Lenovo A2016b30. Read this guide carefully before using your smartphone.

App for a Smartphone or Tablet Terminal EXILIM Connect 3.0

User manual. 1. Overview of MultiPresenter Features Operating conditions... 4

Connection Guide (for KeyMission 80)

App for a Smartphone or Tablet Terminal EXILIM Connect 2.0

PAX A920 FAQ. Frequently Asked Questions. Date: Version: 1.01 PAX A920 FAQ. 1 PAX Customer Support (877)

Mobile Print Guide for Brother iprint&label (Android )

Copyright Samsung Electronics Co., Ltd. All rights reserved.

Image Capture Mobile. Operator s Guide

ATU-L21 ATU-L22. Quick Start Guide

Application Development Setup Guide

Brother Mobility Solutions for Business

Getting Started ENGLISH CEL-SW8BA210

Smart Plug User Guide

Managing Devices and Corporate Data on ios

User manual. 1. Overview of MultiPresenter Features Operating conditions... 4

<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy

Setup Guide. Setting Up the Machine. Installing the Software. FAX settings. Scan settings. Control Panel Sheet

DR CONTROL. Contents. Trademarks

FlashAir Configuration Software. User s Manual. (Windows) Revision 2

Copyright 2013 Esselte Leitz GmbH & Co. KG. All rights reserved.

Mobile Apps Introduction Getting Started Features Resources

SafeNet Authentication Client

Quick Start Guide. U.S. Cellular Customer Service

Wi-Fi Setup Guide TM. Model 7320 Universal Programmable Smart Wi-Fi Thermostat. Leave this Setup Guide with thermostat.

BACKING UP YOUR COMPUTER PRESENTED BY SAM STAHL

SEPARATING WORK AND PERSONAL

Introduction. Package Checklist. Minimum System Requirements. Registering Your Product. More Help

NETGEAR genie Apps. User Manual. 350 East Plumeria Drive San Jose, CA USA. August v1.0

Deploying ios Devices with the Casper Suite and Apple Configurator. Technical Paper June 2012

Connection Guide (for COOLPIX)

Mobile Print Guide for Brother iprint&label (Apple Devices)

Table of Contents. 2 Know your device. 4 Device setup. 8 Customize. 10 Connections. 11 Apps. 12 Contacts. 13 Messages. 14 Camera.

Getting Started ENGLISH CEL-SW9AA210

Troubleshooting Guide

Deployment User Guide

Troubleshooting Guide

How To Setup Bluetooth Iphone 4s Ringtones On Windows >>>CLICK HERE<<<

eprint User s Manual ipad/iphone/ipod touch application 2014/03/31 Revision 1.12 (Version6.0)

InControl INCONTROL OVERVIEW

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment

Accessing the SIM PCMH Dashboard

Point of View Android 2.3 Tablet - User s Manual PlayTab Pro

What Sets ThinManager Apart?

8 Features Every Mobile E-Ticketing Device Needs. Finding the right tool for the job.

Home Network Security Quick Start Guide

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

PrinterOn Mobile App MDM/MAM. Basic Integration Guide

- Contents - Use in High-Safety Applications

User Guide. Cloud Application P2 Cast ENGLISH

USB 2.0 Mini Card Reader Quick Installation Guide

Parallels Remote Application Server 15 Beta Beta Guide

Getting Started ENGLISH CEL-SW9CA210

Printer Software Installation Manual

Systemwalker Software Configuration Manager. Reference Guide. Windows/Linux

Data Leak Prevention

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT

IT-G400 Series. Android 6.0 Quick Start Guide. This document is a Development Guide Book for IT-G400 application developers. Ver 1.

You should be asked if you want to run or save this file, please select run. After the install is complete it will redirect you to the logon page.

BEAT 2.0 USER MANUAL

Airplane mode Android app application Back key bandwidth

Copyright

Supra ekey 5.0. Quick Guide. Contents. Install the Supra ekey App. Requirements. Steps

Quick Start Guide U.S. Cellular Customer Service

Tarsier P Mini WiFi Action Camera (VMS60)

PiceaServices. Quick Start Guide. April 2017, v.4.6

For more information. Go to Settings > About phone > Legal information to read the legal information.

SMART WI-FI CAMERA START GUIDE

Setup Guide. Setting Up the Machine. Installing the Software. Control Panel Sheet

Table of Contents. 2 Device Functions. 4 Device Setup. 7 S Pen. 9 Customize Your Device. 11 Contacts. 12 Messages. 13 Connections.

Release Note

Ekran System v Program Overview

COS6.20 Cloud Client User Manual

User Manual. FX200 Professional Android Device

Android Oreo. New features guide

HOW TO ACCESS IROQUOIS ONLINE

USB 2.0 Multi Card Reader Quick Installation Guide

Dell Latitude E6220. Setup And Features Information. About Warnings. Front And Back View

White paper. April Connectivity

- Contents - Use in High-Safety Applications

User Guide Vodafone Mobile Wi-Fi R205. Designed by Vodafone

Copyright

Transcription:

FUJITSU Software Systemwalker Desktop Keeper V15 Introducing March 2018 Fujitsu Limited 0 Copyright 2018 FUJITSU LIMITED

Contents Introduction What is Systemwalker Desktop Keeper? Operation Log Collection (View/Trace) Flow of Operation Log Collection Log Collection Log Management (Trace Operations) Log Management (Back Up the Original File) Operation Prohibition Flow of Operation Prohibition Operation Prohibition Operation Prohibition (Permit Use of Media) Report Feature Output Report Product Information Examples (for Reference) Trademarks 1 Copyright 2018 FUJITSU LIMITED

Introduction What is Systemwalker Desktop Keeper? 2 Copyright 2018 FUJITSU LIMITED

What is Systemwalker Desktop Keeper? Importance of operation log collection (view/trace) and operation prohibition It is impossible to prevent information leakage only by recording operations performed on corporate PCs such as access to files not related to business, printing of confidential information, or copying of the information to USB memory. Prohibiting printing or copying in order to lower the risk of information leakage may affect business. To protect confidential information, it is vital to have measures for information leakage not only from PCs, but smart devices as well, which are now commonly used for business. Systemwalker Desktop Keeper solutions! Operation log collection (view/trace) Operations on PCs or smart devices, or operations using a printer or USB memory are recorded, making it possible to take action promptly after an issue occurs. Operation prohibition Determines security policies that meet the needs of the entire company or a department and prohibits operations unnecessary for business. Report feature The diagnosis result of the security status within an organization and the internal compliance status can be printed as a report or output to file. 3 Copyright 2018 FUJITSU LIMITED

Operation Log Collection (View/Trace) Flow of Operation Log Collection Log Collection Log Management (Trace Operations) Log Management (Backup Up the Original File) 4 Copyright 2018 FUJITSU LIMITED

Flow of Operation Log Collection Operation log collection (view/trace) Management Server Can see operations performed by users and review policies Log Analyzer Server Manage logs Output reports Collect logs Systemwalker Desktop Keeper Administrator 7 for 14 for PC Operation Log Collection (View/Trace) Smart device 7 for Copy of files 8 for Twelve types of logs can be collected from PCs Copy to USB memory 6 for 6 for Web access Incoming/outgoing calls Eight types of logs can be collected from smart devices 5 Copyright 2018 FUJITSU LIMITED

Log Collection Operation records of PCs or smart devices per user can be centrally managed. Management Server Operation log collection (view/trace) PC users Collect logs Collect logs PC users Relay Server Internet via Wi-Fi Smart device users Logs collected from PCs *1 Application startup/termination Window title collection (Web access log) E-mail sending E-mail receiving Device configuration changes Printing operation File export PrintScreen key operation Web operation (upload/download) Clipboard operation *2 FTP server operation (upload/download) File operation Logon, Logoff *3 Environment change Linkage application (15 types of logs) Logs collected from smart devices *4 Web access SD card mount/unmount SIM card mount/unmount Wi-Fi connection Bluetooth connection Incoming/outgoing calls Application usage Application configuration change (8 types of logs) *1: There are also logs that cannot be collected in a virtual environment. Refer to the relevant documents that describe the feature for. *2: Collect logs of copy operation via Clipboard between a virtual PC (Citrix XenDesktop/VMware View) and PC. *3: Also collect logs for power on/off of PCs. *4: Smart devices with ios are not supported. 6 Copyright 2018 FUJITSU LIMITED

Log Management (Trace Operations) Operation log collection (view/trace) Operations performed before or after the filtered operation can be traced by searching logs, using keywords or period of time. Forward trace Used to investigate operations (copy, rename) for the file to trace that were performed after the specified starting point. Create Starting point Rename Copy Print Delete User A Copy or rename a file Collect logs Management Server new Customer A name list Customer A name list Copy Rename Export Customers Customers Customer A Email name list attachment Back trace Used to investigate operations (copy, rename) for the file to trace that were performed before the specified starting point. Confirm logs Administrator User B Export a file Create Rename new Customer A name list Copy Print Delete Customer A name list Rename Search operation logs to trace operation history in case of an emergency, allowing prompt action. Copy Customer A name list Customers Email attachment Export Customers Starting point Customers 7 Copyright 2018 FUJITSU LIMITED

Log Management (Back Up the Original File) Operation log collection (view/trace) A file (the original file) can be stored with operation logs when it is exported to a portable storage device. Fujitsu proprietary File The original file is stored on the server Copy a file to a storage device Store the original Management Server Confirm the original Administrator Portable media such as USB memory User Export File Even if the file is leaked, the administrator can plan actions to take according to the stored original file. 8 Copyright 2018 FUJITSU LIMITED

Operation Prohibition Flow of Operation Prohibition Operation Prohibition Operation Prohibition (Permit Use of Media) 9 Copyright 2018 FUJITSU LIMITED

Flow of Operation Prohibition Operation prohibition Log Analyzer Server Policy settings Management Server Output reports Administrator Systemwalker Desktop Keeper 14 for Operations can be prohibited per department or user Prohibit operations Prohibit operations 11 for PC 11 for Smart device 11 for 11 for Print prohibition Print Screen PrintScreen key usage prohibition Prohibition of data export to portable media or read operation Permit usage 12 for Permit usage of USB memory Wi-Fi connection prohibition Application usage prohibition 10 Copyright 2018 FUJITSU LIMITED

Operation Prohibition Operation prohibition Operations that have a risk of information leakage can be prohibited. Prohibits operations unnecessary for business according to security policies. Policies can be set per department or user. PC users Set policy Distribute policy Print Screen URL access operation prohibition Administrator Distribute policy PrintScreen key usage prohibition Prohibition of data export to portable media or read operation Smart device users Application startup prohibition Wi-Fi connection prohibition Application usage prohibition Web upload/download operation prohibition FTP server upload/download operation prohibition Print prohibition PC or smart device operations that have a risk of information leakage can be prohibited. 11 Copyright 2018 FUJITSU LIMITED

Operation Prohibition (Permit Use of Media) Operation prohibition The individual media identification feature allows export only for a specific person or device for business purposes. Export can be permitted by specifying time or day of the week. Fujitsu proprietary USB device individual identification feature Unregistered USB device Specifying time or day of the week Unconfigured USB device Administrator Register the serial number of the USB device to use from the screen Administrator Set the department, time period, day of the week of the USB device usage from the screen Set the department/user and use Can be used by the department set in the policy on the day of the week within the time frame set Can be used Can be used The following devices can be controlled in addition to USB memory: Android device *1 (portable/imaging) ios media (portable) Digital camera (portable) Scanner (portable) SD card, mini SD card, micro SD card *1: For smart devices etc., a different file transfer method (PTP/MTP *2 ) from the USB memory is used to avoid file corruption during transfer. *2: PTP: Picture Transfer Protocol, MTP: Media Transfer Protocol Individual file usage can be permitted according to the security policy when the files are exported. 12 Copyright 2018 FUJITSU LIMITED

Report Feature Output Report 13 Copyright 2018 FUJITSU LIMITED

Output Report Report feature Security measures, security risk status, and PC usage can be confirmed by using the Report Output Tool. Log Analyzer Server Administrator Create analysis reports using the Report Output Tool Reports that can be output (24 types) Information leakage analysis report: 8 types Device usage analysis report: 4 types Violation operation analysis report: 6 types Comprehensive analysis report: 1 type Print volume monitoring report: 5 types Regular evaluation/analysis results are visualized and can be used to review policies. 14 Copyright 2018 FUJITSU LIMITED

Product Information Examples (for Reference) Trademarks 15 Copyright 2018 FUJITSU LIMITED

Example 1 - Telecom Carrier (for Reference) Store the original Enhance security measures for products under development when they are exported to portable media. Requirement: Information leakage measures without compromising the work efficiency of system developers. Challenges Solutions There is a concern of information leakage due to the loss of media when system developers export design specifications or test data to portable media. Want to understand the status of operation log collections or exported files. Using a feature of Systemwalker Desktop Keeper, original files are forcibly and automatically stored on the server when they are exported to portable media. When the media is lost, prompt action can be taken because the file content can be confirmed from the original file. By collecting operation logs of the terminals used by system developers, any operations that violate the security policy can be traced. Proposal that Fujitsu and other companies can make Additional proposal only from Fujitsu (differential) Export to portable media Collect logs when data is exported to portable media Developer Collect logs when data is printed Design specification/t est data Store the original Original Administrator 16 Copyright 2018 FUJITSU LIMITED

Example 2 - Oil Company (for Reference) Collect/search smart device logs Smart device operation logs can be centrally managed. Requirement: Smart devices are introduced to gas stations to start selling subscriptions for credit cards and car insurance. Want to ensure security prohibiting the unauthorized use of smart devices. Challenges Solutions Prohibit the use of applications unnecessary for business Understand how the devices are used to determine other operations to be prohibited Distribute applications or explanatory materials necessary for selling subscriptions to the outlets via smart devices (Android) Using the Systemwalker Desktop Keeper application startup prohibition feature, prohibit the startup of unnecessary applications Using the log collection feature, user operation logs are collected to understand how devices are used. Consider if any operations should be prohibited. Proposal that Fujitsu and other companies can make Additional proposal only from Fujitsu (differential) Application startup prohibition Administrator Achieved security control and simplified operations Application startup prohibition Collect/search smart device logs 17 Copyright 2018 FUJITSU LIMITED

Example 3 - Metal Company (for Reference) Collect/search PC logs Security control to domestic/overseas sites using the same policy Requirement: Want to use the same security policy as the domestic one in overseas sites and centrally manage PC logs Challenges Administrators are different for domestic sites and overseas sites in five countries (Thailand, Vietnam, China, Singapore, and Malaysia), and the security policy is not followed in overseas sites as strictly as in the domestic sites. Want to maintain the same security level over the entire company by distributing security policies to overseas sites as well as domestic sites from a central location. Solutions Systemwalker Desktop Keeper also supports client operations on non-japanese operating systems, so it is possible to centrally manage overseas PCs from a domestic site. Can achieve the same level of security policy operation between domestic and overseas sites. Proposal that other companies can make Distribute policies and collect logs using different administrators and servers for domestic and overseas sites Proposal from Fujitsu Distribute policies and collect logs at each site and perform centralized management in Japan Centralized management Japan Outside Japan Japan Outside Japan Outside Japan Outside Japan 18 Copyright 2018 FUJITSU LIMITED

Trademarks Microsoft, Windows, Windows NT, Windows Vista, Windows Server or other Microsoft product names are trademarks or registered trademarks of Microsoft Corporation in the United States and other countries. Citrix, Xen Citrix XenApp, Citrix XenServer, Citrix XenDesktop and Citrix Presentation Server are trademarks or registered trademarks of Citrix Systems, Inc in the United States and other countries. VMware is a trademark or registered trademark of VMware, Inc in the United States and other countries. Android is a trademark or registered trademark of Google Inc. Bluetooth is a registered trademark of Bluetooth SIG, and is licensed to Fujitsu. Wi-Fi and Wi-Fi Logo are registered trademarks of Wi-Fi Alliance. IOS trademark is used based on the license of Cisco in the United States and other countries. Apple, Apple Logo and Mac OS are registered trademarks of Apple Inc. in the United States and other countries. Other product names are trademarks or registered trademarks of their respective holders. 19 Copyright 2018 FUJITSU LIMITED

Copyright 2016 FUJITSU LIMITED