WABA
Work​space

A system designed to generate a restrictive and secure workspace giving to companies: control, data protection and monitoring during each session. WABA WORKSPACE creates a secure environment on-demand (Sandbox) by using the existing capabilities of the operating system, avoiding to install or acquire expensive and complex systems. The user works within a virtual space isolated from the main system, focused on: Security, Control and Monitoring.  

For analysis and decision making purposes, the system has an agent that monitors the user's activities within the Workspace created on demand for the session. This information is useful to determine what the user was focused on, what programs he/she was using, what pages he/she was visiting, and what percentage of idle time is registered per session.

1. Activity Monitoring
2. Restrictive processes configuration

The system allows the company to define a set of processes (applications) to which the user must have access during a remote work session. So that the user can only have access to what is explicitly allowed. This allows the worker to focus on his work activities avoiding distractions that interfere with productivity and most importantly, he will have a secure and isolated workspace different from the host space of the machine to improve the security and protection of the company's information.

3. Restrictive internet browsing configuration

The system has a feature that allows to define a black list or a white list of web sites so that the employee can only navigate to where it is allowed to do so. This is also useful in terms of productivity at work and in terms of security, preventing the employee from accessing dangerous websites that pose a risk to information security.

4. Endpoint security

By using different layers and modules derived from our core security system deployed in several Banks. We enhance endpoint security to guarantee protection against malware, phishing and other common threats.

5. Temp Data destruction

During a remote work session, a lot of temporary session-level information can be generated that may contain sensitive data that needs to be kept within the context of the secure session. The system allows a control to be activated to remove all that information before allowing the user to log out. The information that is removed includes the clipboard.

6. Blocking access to Peripheral devices and other shared resources

It is a feature that allows the administrator to force blocking access to removable media connected via USB, WIFI or BlueTooth, like external storage, Printers etc.

7. VPN integration (Ask Us about your specific needs)

It is possible that a VPN connection may be required while connected to corporate resources. In this case it is feasible that we can integrate your VPN provider to work only when the secure connection of the system is active. Currently the integration works with OPENVPN. But do not hesitate to contact us to evaluate other integrations.

8. ​​​process isolation technology

It is important to keep in mind that when staff at work remotely use their own computers, there will always be a risk of threats such as malware, Trojans, etc. that may affect and compromise the security of the information. Workspace uses an isolation technology that makes the processes to be run within the session independent from the rest of the operating system. This way, while the employee is working inside this space, the information will remain secure regardless of whether the machine has been compromised by malware in the main host.

9. ​Reporting

The system captures a lot of information within a remote work session that can be made available for consultation through our API or through the web console to which system administrators have access. In this console, you will find several standard reports that show user activity. For example, activity reports, navigation reports, timeout reports, other reports related to the origin of the connection that may contain vital information for auditing purposes.

10. ​​Web-based system administration

The system has an administrative component with WEB access that facilitates and centralizes the administration and monitoring of all remote work activity of the collaborators. It is also possible to create policies based on groups or applicable to the whole company. It is often more relevant to be able to apply different policies depending on the group or role of the employee.