Solution Introduction

ICT solution through thorough user analysis

MyGuardInformation Security
It provides managing skills of internal information such as change, creation and circulation in company rules. And, it also provides a way to effectively manage / control data handling behavior users of data creation / change / circulation parties
MY GUARD SMB Component Catalog
Providing module Explanation
Blocking ransomware · Blocking ransomware in documents of office, txt, PDF and image
Securing external media · Policy of reading and writing USB, floppy and CD/DVD
· Blocking to access portable storage (MPT, PTP )
Blocking wireless LAN · Except the designated AP, other APs are blocked from use
Printing watermark out · Printing image and text watermark out
Managing copy files · Managing PDF type of copy files
· Possible to monitor printed document by saving as TEXT
Controlling program installation · Blocking to copy and install system file(eg. EXE, DLL, SYS and etc.) which can execute malicious code into PC
Protection function · Procection Folder in Local Pc and Network
· Option is selectable as follows
- Do not allow to Screen Capture on Folder security
- Do not allow to copy file ousite
- File transfer prohibited when use Email on IE Chrome
- Do not allow to print file
- Block outflow as Clip-copy/ Paste
- Do not allow to fix and delete file (Read Only)
- Can not reach the hidden file
- Can access particular Application( Office, Acrobat)
Securing e-mail · Only approved File can send Email
· File attachments are not allowed in the other pullers
Deleting completely · Possible to completely delete the file periodically
· The user has the ability to completely delete the specified file
Getting SW List · Getting S/W list on PC
Getting HW List · Getting H/W list on PC
Managing Log · Can Read/Write/Create/Delete when Logged
· Can get file outside when Logged
· Can attach file when Logged
· Can use external equipment
Feature
Save control
· HDD addition and revision management
· Drive/Folder management(formation and capacity)
· Data save/revision/deletion/control
· System drive control
· General drive control
Log management
· Monitoring Use/Chang/Deletion/Copy/Move of files
· Monitoring media use(USB, 1394, MTP, PTP)
· Monitoring attachment/save of files
· Monitoring process execution
· Monitoring use of print
· Web Report Server
Use control
· Output control and WaterMarking
· Screen Cupture Control
· ClipBoard Control
· Drag & Drop Control
· File Copy/Move Control
ECM linkage
· Linking ECM's Windows Explorer
· Other models/multi ECM interlocking
· Linking of authority property of ECM
(Keep the same property on user’s PC)
Process control
· Process Access Control(by local/device/user definition)
· Application Installation Control
· Data Adjustment Control by application
OS environment Protection
· Agent self-protection
· Control Restore Operating System
· Registry protection
Data encryption
· Automatic encoding(encoding the designated drive and folder by file-automatic encryption-decryption)
Introduction Effect
The company can automatically accumulate intellectual property, minimize the risk of leakage and reduce the opportunity cost. Users can easily adapt to changing IT environments, changing their awareness of data handling and security.
Before introducing MyGuard
Intellectual Property Store Hard disk of user’s computer
internal distribution Distribution based on personal authentication and approval
external distribution Distribution based on approval and personal authentication, distribution by security medium
Outside staff work Difficulty in performing due to DRM materials
Collaboration environment with partner companies Raw data sharing or virtualization environment
Security audit Network monitoring
Centralization rate About 5% level


After introducing MyGuard
Intellectual Property Store File Sever or EDMS which company managers
internal distribution Distribution based on company public
external distribution Distribution of approved encrypted file types(If necessary, it will decrypt after approval)
Outside staff work After SSL VPN connection, perform the same operation as the company environment
Collaboration environment with partner companies Proceeds similarly to organization’s environment without data transfer
Security audit History of all data processed by user / Tracking external distribution data
Centralization rate 95% 이상
Environmental change after construction
As long as the data exists on the user’s PC there is a risk of leakage, all users' data will be stored in the central repository and the distribution process will be carried out so that "who create / browse / change / Deleted / distributed the Text “will be managed by the main company.
Application example
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고
구축사례로고