Date : 21st May 2021 Time : 03.00 PM to 04.00 PM
Mr. Vishal Shah explained the following concerns related to Work from Home.
- Backup of enterprise data stored on user’s remote computer
- Access to enterprise applications like tally, SAP, ERP, customized application by remote users
- Access to enterprise file data like documents, designs, drawings, spreadsheets by remote users
- Prevent the possibility of data leakage by remote users over USB
- Prevent the possibility of data leakage by remote users over Email Attachment or Blind Carbon Copy
- Prevent the possibility of data leakage by remote users over the Internet (google drive, dropbox, personal emails)
BLACKbox technical team prepared an ideal work from home setup on two remote users designated as a project engineer and project manager. A live demonstration of these ideal profiles was carried out to show how the above-listed concerns can be addressed and resolved in a full-proof manner. The salient highlights of the demonstration are as below.
- Device hardening was demonstrated showing users could access enterprise data only from a specific computer.
- Device hardening was demonstrated showing users could access enterprise data and applications over VPN only.
- It was demonstrated that users can use permitted applications on the computer.
- It was demonstrated that if the user deleted data remotely from the private cloud (VPN drives), it can be restored and the remote user who deleted the data can be identified.
- It was demonstrated that uses enterprise and personal data is segregated and automatic backup of user’s data on remote computer happens on BLACKbox cloud
- It was demonstrated that as per the set policy project engineer profile could only inward data from the USB drive.
- It was demonstrated that as per the set policy project manager profile could copy data outward on the USB drive, but the report was sent to his supervisor.
- Various options to control email communication and enforce email vigilance policies were demonstrated to prevent data theft over email attachments or blind carbon copy.
- It was demonstrated that users can access the limited website with access to enterprise data. It was also demonstrated that when a user opts for full internet access, data is automatically isolated to prevent data theft over the Internet or on personal mail ids, or cloud drives.
- It was demonstrated how user’s activities are captured and played back to analyze any productivity issues.
It was a session well participated through polls and relevant questions. In case you have missed out on this webinar or you want to share this knowledge with someone at Synersoft Technologies Private Limited, you may please watch the recording of the webinar on this link.