WABA Workspace is safety-oriented where workers should use their own machines.
It is an advantage for the company not to worry about provisioning additional hardware resources or additional IT efforts to enable workers who have their own computers.
The employee's device will no longer be a security breach or concern for the company when working outside of a controlled network, while the owner of the device can keep all the system configuration and use it for personal purposes, so when the user finishes the work session, He will get back the control of their machine as usual. And all monitoring and restrictions will be deactivated until he needs to start a new session.
For analysis and decision making purposes, the system has an agent that monitors the user's activities within the Workspace created on demand for the session. This information is useful to determine what the user was focused on, what programs he/she was using, what pages he/she was visiting, and what percentage of idle time is registered per session.
1. Activity Monitoring
2. Restrictive processes configuration
The system allows the company to define a set of processes (applications) to which the user must have access during a remote work session. So that the user can only have access to what is explicitly allowed. This allows the worker to focus on his work activities avoiding distractions that interfere with productivity and most importantly, he will have a secure and isolated workspace different from the host space of the machine to improve the security and protection of the company's information.
3. Restrictive internet browsing configuration
The system has a feature that allows to define a black list or a white list of web sites so that the employee can only navigate to where it is allowed to do so. This is also useful in terms of productivity at work and in terms of security, preventing the employee from accessing dangerous websites that pose a risk to information security.
4. Endpoint security
By using different layers and modules derived from our core security system deployed in several Banks. We enhance endpoint security to guarantee protection against malware, phishing and other common threats.
5. Temp Data destruction
During a remote work session, a lot of temporary session-level information can be generated that may contain sensitive data that needs to be kept within the context of the secure session. The system allows a control to be activated to remove all that information before allowing the user to log out. The information that is removed includes the clipboard.
6. Blocking access to Peripheral devices and other shared resources
It is a feature that allows the administrator to force blocking access to removable media connected via USB, WIFI or BlueTooth, like external storage, Printers etc.
7. VPN integration (Ask Us about your specific needs)
It is possible that a VPN connection may be required while connected to corporate resources. In this case it is feasible that we can integrate your VPN provider to work only when the secure connection of the system is active. Currently the integration works with OPENVPN. But do not hesitate to contact us to evaluate other integrations.
8. process isolation technology
It is important to keep in mind that when staff at work remotely use their own computers, there will always be a risk of threats such as malware, Trojans, etc. that may affect and compromise the security of the information. Workspace uses an isolation technology that makes the processes to be run within the session independent from the rest of the operating system. This way, while the employee is working inside this space, the information will remain secure regardless of whether the machine has been compromised by malware in the main host.
9. Reporting
The system captures a lot of information within a remote work session that can be made available for consultation through our API or through the web console to which system administrators have access. In this console, you will find several standard reports that show user activity. For example, activity reports, navigation reports, timeout reports, other reports related to the origin of the connection that may contain vital information for auditing purposes.
10. Web-based system administration
The system has an administrative component with WEB access that facilitates and centralizes the administration and monitoring of all remote work activity of the collaborators. It is also possible to create policies based on groups or applicable to the whole company. It is often more relevant to be able to apply different policies depending on the group or role of the employee.