WABA
Enforcement

A system designed to manage remote work with an emphasis on productivity, policy enforcement for information protection and risk management.

For analysis and decision making purposes, the system has an agent that monitors the user's activities within the Workspace created on demand for the session. This information is useful to determine what the user was focused on, what programs he/she was using, what pages he/she was visiting, and what percentage of idle time is registered in his/her workday.

1. Monitoring
2. Restrictive process configuration

The system allows the company to define a set of processes (applications) to which the user must have access during a remote work session. So that the user can only have access to what is explicitly allowed. This allows the remote worker to focus on his work activities avoiding distractions that interfere with his productivity and most importantly, he will have a secure and isolated workspace different from the main space of the Host to improve the security and protection of the company's information.

3. Restrictive web site configuration

The system has a feature that allows to define a black list or a white list of web sites so that the employee can only navigate to where it is allowed. This is also useful in terms of productivity at work and in terms of security, preventing the employee from accessing dangerous websites that pose a risk to information security.

4. Peripheral blocking

It is a feature that allows the employer to block access to removable media that are connected via USB. In order to prevent information leakage during a remote work session.

5. ​Data destruction

During a remote work session, a lot of temporary session-level information can be generated that may contain sensitive data that needs to be kept within the context of the secure session. The system allows a control to be activated to remove all that information before allowing the user to log out. The information that is removed includes the clipboard.

6. ​​​Clipboard locking

The clipboard is a temporary space for storing data that can be available at the level of the entire operating system; If desired, a permanent lock can be activated so that, during the remote work session, the user will not be able to save data in this memory space for use outside the secure workspace.

7. ​VPN integration

It is possible that a VPN connection may be required while connected to the telework session, in this case it is feasible that we can integrate your VPN provider to work only when the secure connection of the system is active. Currently the integration works with OPENVPN. But do not hesitate to contact us to evaluate other integrations.

8. ​​​​Safety with process isolation

It is important to keep in mind that when staff at work remotely use their own computers, there will always be a risk of threats such as malware, Trojans, etc. that may affect and compromise the security of the information. Azuan has a security layer based on process isolation that forces everything that the user must use at the level of processes and applications to be executed within a secure and isolated space called Bunker. This way while the employee is working in this space, the information will remain secure regardless of whether the machine was compromised with malware.

9. ​Activity reports

The system captures a lot of information within a remote work session that can be made available for consultation through our API or through the web console to which system administrators have access. In this console, you will find a set of reports that are useful to monitor user activity. For example, activity reports, navigation reports, timeout reports, other reports related to the origin of the connection that contain vital information for auditing purposes.

10. ​Web-based system administration

The system has an administrative component with WEB access that facilitates and centralizes the administration and monitoring of all remote work activity of the collaborators. It is also possible to create policies based on groups or applicable to the whole company. It is often more relevant to be able to apply different policies depending on the group or role of the employee.