Job Management Partner 1/Client Security Control Description, User's Guide and Operator's Guide
With the recent advances in IT and trends toward open networks, problems in information security management such as sensitive information leaks and computer virus infections are having a profound impact on corporate management. More than ever, efforts to bolster information security are an important issue in the corporate community.
While acting to secure information security is critical to maintaining business activities, corporations are encountering the following problems in developing information security measures:
- Integrated management of the company's information of IT assets (network information, hardware information, and software information) is difficult to perform.
- Network-wide safety cannot be obtained, because client users have little knowledge about security.
- It is difficult to accurately assess the status of security measures on clients.
- Leaks due to smuggled information and missing computers are unavoidable.
- Responses to continuing information security problems are often not in time.
To solve these problems, it is important to first completely assess the company's information of IT assets, automatically eliminate any vulnerabilities of clients connected to the network, and implement a variety of risk prevention measures for information security. Also, it is important to constantly evaluate and improve corporate information security measures, to respond to the daily changes in security risks.
A client security control system provides overall security management based on the information security measure, from management of client asset information and client monitoring through to dealing with security risks.
By using a client security control system, an administrator can use centrally managed client asset information to monitor the status of client security measures in real-time. The administrator can also judge the security level, implementing actions such as warning message notification and denying network connections to clients with inadequate security measures.
The following figure shows an overview of a client security control system.
Figure 1-1 Overview of a client security control system
All Rights Reserved. Copyright (C) 2009, 2011, Hitachi, Ltd.
Copyright, patent, trademark, and other intellectual property rights related to the "TMEng.dll" file are owned exclusively by Trend Micro Incorporated