Study on Benchmarking of parental control tools for the online protection of children

Size: px
Start display at page:

Download "Study on Benchmarking of parental control tools for the online protection of children"

Transcription

1 Benchmarking of parental control tools for the online protection of children SIP-BENCH II 5 th International Conference Keeping Children and Young People Safe Online Warsaw, September 2011

2 Who we are SIP-BENCH II second edition of project financed by EC DG INFSO under Safer Internet Programme Consortium composed by INNOVA Europe (coordinator) with CYBION and Stiftung Digitale Chancen as technical and operational partners

3 What we do: Objectives To benchmark the main functionalities, effectiveness and usability of most currently used software from a technical and fit-for-purpose point of view, without any commercial or profit-related concern in order to:

4 Provide end-users with overview of existing parental control tools benchmarked on their needs Help end-users to find most appropriate parental control tool that best fits their needs Raise awareness on tools that protect children and young people from threats on the internet

5 How we work: methodological approach Six-monthly testing cycles of 30 parental control tools for PCs, mobiles and game consoles Software are selected: Market leadership Geographic/language coverage (6 languages) Devices and operative systems

6 Tests carried out (<12 years old and >13) to assess: Functionality: has the software the features required to satisfy parents needs? Effectiveness: is the software able to block a specific harmful page and at the same time allow showing non-harmful pages? Security: Is the software able to prevent the user from bypassing or disabling the filter? Usability: is the software easy to install, configure and use?

7 Dissemination of results of 1st cycle

8 Dissemination of results of 1st cycle

9 2 nd nd CYCLE RESULTS

10 Where we stand now: 2 nd Cycle results

11

12 Effectiveness tests

13 Key findings General issues The tools globally have a low effectiveness. The average underblocking is superior to 20 % for all tested tools. The tools offer quite similar results with each configuration (one for children <12 year old and one for teenagers > 13 year old). The tools present a lower effectiveness on Web 2.0 content. The adult content is better filtered than the other categories. The tools work better on English languages than the other languages. Even considering only English content, no tool reach an effectiveness lower than 20%. For languages other than English there is no outstanding tool.

14 Effectiveness tests tested tools 2 nd cycle

15

16 Effectiveness tests 1 st and 2 nd cycle Test ed t ools Ideal t ools Ov e r bl oc k i ng

17 Comparison with first cycle Average on adult content 2,22 (1,90) in the first cycle. Some almost satisfying results on adult content: Underblocking between 10 and 20 % Cyber Patrol Cybersitter Kasperky - Mac OS Windows Xooloo - Zone alarm Average on other content 1,33 (1,06) in the first cycle.

18 Mobile phones Effectiveness results similar to PC Functionalities available are quite poor It is very easy to un-install the applications

19 Consoles Very few tools Effectiveness results similar to PC Functionalities available are poor

20 Tools for PCs Usability results 2nd cycle 1st cycle best tool: 3,3 worst tool: 2,0 2nd cycle best tool: 2,99 worst tool: 1,90

21 Usability results 2nd cycle Tools for mobile phones

22 Usability results 2nd cycle Tools for game consoles

23 Online database

24

25 NEW Tools For 3 rd Cycle Excluded tools: FilterPak Intego IS Barrier X6 Norman SafeEyes Mobile Mobile Security for Android New tools: Cenzor Deutsche Telecom Dolphin Secure McAfee Family Protection (Android/Iphone) Mobicip (Linux) BitDefender ** Enologic **

26 Some recommendations Blocking categories should reflect more young people protection needs and be more transparent to parents All software should contain message warning about the limits of the filtering tool The perfect tool does not exist! Parents supervision is still the best tool

27 Users Recruitment for 3 rd Cycle: REGISTER NOW TO TEST A TOOL! If you wish to test a tool send an

28 Thank You! Silvia Pietropaolo visit our website:

Benchmarking of parental control tools for the online protection of children. 2 nd testing cycle Report Executive Summary

Benchmarking of parental control tools for the online protection of children. 2 nd testing cycle Report Executive Summary Benchmarking of parental control tools for the online protection of children 2 nd testing cycle Report Executive Summary The project is funded by the European Union, through the Safer Internet Programme

More information

INTRODUCTION 4 Objectives 4 What are the parental control tools? 5 What are the main criteria for choosing a tool and type of test carried out?

INTRODUCTION 4 Objectives 4 What are the parental control tools? 5 What are the main criteria for choosing a tool and type of test carried out? The study aims to benchmark the main functionalities, effectiveness and usability of most currently used filtering software from a technical and fit-for-purpose point of view, without any commercial or

More information

Benchmarking of parental control tools for the online protection of children SIP-Bench II Assessment results and methodology 4 th Cycle

Benchmarking of parental control tools for the online protection of children SIP-Bench II Assessment results and methodology 4 th Cycle Benchmarking of parental control tools for the online protection of children results and methodology 4 th Cycle SAFER INTERNET PROGRAMME Empowering and Protecting Children Online NOTICE The project is

More information

Alice (Telecom Italia ISP used for testing)

Alice (Telecom Italia ISP used for testing) NAME ALICE (ISP SERVICE)* Company Alice (Telecom Italia ISP used for testing) Version 2010 (9.1) Type of product Devices supported Client (distributed by ISP. Available only for ALICE ADSL Internet connection

More information

Windows XP (32/64 bit) Windows 7 (32/64 bit) Vista (32/64 bit) Mac OS X (from 10.4 version on) 12 years old users: 15/21 (points 1,59 out of 4)

Windows XP (32/64 bit) Windows 7 (32/64 bit) Vista (32/64 bit) Mac OS X (from 10.4 version on) 12 years old users: 15/21 (points 1,59 out of 4) NAME Xooloo Company Xooloo Version 12.1 Type of product Devices supported Operating systems Client Computer Windows XP (32/64 bit) Windows 7 (32/64 bit) Vista (32/64 bit) Mac OS X (from 10.4 version on)

More information

MOBICIP NAME. Mobicip. Company. Version 1.3.0.12. Client. Type of product. Computer. Devices supported. Linux Ubuntu Windows 7 (Tested on Windows)

MOBICIP NAME. Mobicip. Company. Version 1.3.0.12. Client. Type of product. Computer. Devices supported. Linux Ubuntu Windows 7 (Tested on Windows) NAME MOBICIP Company Mobicip Version 1.3.0.12 Type of product Devices supported Operating systems Client Computer Linux Ubuntu Windows 7 (Tested on Windows) Price* 1 year - 1 license: 7,75 Language of

More information

Windows 7 (32 or 64 bit edition) Windows Vista Service Pack 2 Windows Server 2008 R2 Windows Server 2008 Service Pack 2

Windows 7 (32 or 64 bit edition) Windows Vista Service Pack 2 Windows Server 2008 R2 Windows Server 2008 Service Pack 2 NAME Windows Live Family Safety Company Microsoft Version 2012 Type of product Devices supported Operating systems Price* Client Computer Windows 7 (32 or 64 bit edition) Windows Vista Service Pack 2 Windows

More information

User's voice. Safe Eyes. User 1: I was surprised how the tool was easy to install and configure. Comprehensibility:

User's voice. Safe Eyes. User 1: I was surprised how the tool was easy to install and configure. Comprehensibility: NAME Safe Eyes Company McAfee Version 6.0.244 Type of product Devices supported Operating systems Client Computer Windows XP Windows 7 Vista Mac OS (with some limitations on functionalities) Price* 1 year,

More information

CYBERSITTER NAME. LLC/Solid Oak Software. Company. Version 11.12.7.20. Client. Type of product. Computer. Devices supported

CYBERSITTER NAME. LLC/Solid Oak Software. Company. Version 11.12.7.20. Client. Type of product. Computer. Devices supported NAME CYBERSITTER Company LLC/Solid Oak Software Version 11.12.7.20 Type of product Devices supported Operating systems Client Computer Windows Vista (32/64 Bits) Windows 7 (32/64 Bits) Windows XP Windows

More information

Name of Filtering Software

Name of Filtering Software List of Filtering Software 1 Copyright Name of Filtering Software page ContentProtect. 2 CYBERsitter.. 4 Net Nanny.. 6 Cyber Patrol.. 7 ContentBarrier.. 9 KidsGoGoGo... 10 CYTANET s Safe Internet. 11 List

More information

Device Lifecycle Management

Device Lifecycle Management Device Lifecycle Management 1 (8) Table of Contents 1. Executive summary... 3 2. Today's challenges in adapting to lifecycle management... 3 3. How is Miradore different?... 5 4. Conclusion... 8 2 (8)

More information

User's voice NET NANNY. Quite simple to install and configure. Improve messages and possible reactions when a page is blocked. Comprehensibility:

User's voice NET NANNY. Quite simple to install and configure. Improve messages and possible reactions when a page is blocked. Comprehensibility: NAME NET NANNY Company Content Watch Version 6.5.13.1 Type of product Devices supported Operating systems Client Computer Microsoft Windows 7 (32/64 bit) Microsoft Windows Vista (32/64 bit) Microsoft Windows,

More information

BITDEFENDER SECURITY FOR AMAZON WEB SERVICES

BITDEFENDER SECURITY FOR AMAZON WEB SERVICES BITDEFENDER SECURITY FOR AMAZON WEB SERVICES Beta Version Testing Guide Bitdefender Security for Amazon Web Services Beta Version Testing Guide Publication date 2015.03.04 Copyright 2015 Bitdefender Legal

More information

Access the TCNJ Palo Alto Networks VPN using the GlobalProtect VPN client

Access the TCNJ Palo Alto Networks VPN using the GlobalProtect VPN client Access the TCNJ Palo Alto Networks VPN using the GlobalProtect VPN client June 2014 Table of Contents Introduction 1 Determine the Windows Operating System Version 2 Install the GlobalProtect VPN client

More information

Using LAN Wi-Fi (WLAN) 3-2 Connecting Wi-Fi Devices via Wi-Fi (WLAN) 3-3 Connecting Windows 3-5 Connecting Mac 3-8

Using LAN Wi-Fi (WLAN) 3-2 Connecting Wi-Fi Devices via Wi-Fi (WLAN) 3-3 Connecting Windows 3-5 Connecting Mac 3-8 Wi-Fi (WLAN) -2 Connecting Wi-Fi Devices via Wi-Fi (WLAN) - Connecting WPS Supported Wi-Fi Devices - Connecting Game Consoles - Connecting Android Devices -4 Connecting Windows -5 Windows 7-5 Windows Vista

More information

Remote Desktop Connection Setup at King s College in Wilkes-Barre, PA

Remote Desktop Connection Setup at King s College in Wilkes-Barre, PA Remote Desktop Connection Setup at King s College in Wilkes-Barre, PA Remote Desktop connections are granted to King s Staff only. Students do not have desktop (office) machines on campus, thus no desktop

More information

Your ASK4 Internet Guide. PLUS: 2013/14 Calendar

Your ASK4 Internet Guide. PLUS: 2013/14 Calendar Your Internet Guide PLUS: 2013/14 Calendar 1.Your Inclusive Package 1YOUR INCLUSIVE PACKAGE Welcome to, your Broadband Internet provider WIRED Speed 12 Mb/s Over your wired connection No download limits

More information

USER GUIDE. Snow Inventory Data Receiver Version 2.1 Release date 2013-04-26. Installation Configuration Document date 2014-12-02

USER GUIDE. Snow Inventory Data Receiver Version 2.1 Release date 2013-04-26. Installation Configuration Document date 2014-12-02 USER GUIDE Product Snow Inventory Data Receiver Version 2.1 Release date 2013-04-26 Content Prerequisites Installation Configuration Document date 2014-12-02 CONTENT ABOUT THIS DOCUMENT... 3 PREREQUISITES...

More information

F-SECURE INTERNET SECURITY 2012

F-SECURE INTERNET SECURITY 2012 NAME F-SECURE INTERNET SECURITY 2012 Company F-Secure Corporation Version 1.62 Type of product Devices supported Operating systems Client Computer Windows 7 (all editions) Windows Vista Windows XP Home,

More information

ENOLOGIC NETFILTER HOME

ENOLOGIC NETFILTER HOME NAME ELOGIC NETFILTER HOME Company Enologic Version 5.2.1.1 Type of product Devices supported Operating systems Client Computer Microsoft Windows 98, Me, NT, 2000, XP, Vista, 7 (32 and 64 bit) Price* 1

More information

2015 NTX-ISSA Cyber Security Conference (Spring) Kid Proofing the Internet of Things

2015 NTX-ISSA Cyber Security Conference (Spring) Kid Proofing the Internet of Things 2015 NTX-ISSA Cyber Security Conference (Spring) Kid Proofing the Internet of Things April 24-25, 2015 Copyright 2015 NTX-ISSA 2015 Raytheon Cyber Security Company. Conference All rights (Spring) reserved.

More information

Connecting Windows 7 to the network

Connecting Windows 7 to the network Connecting Windows 7 to the network This document outlines the procedure for setting up Windows 7 to use the College and University network. It assumes that the computer is set up and working correctly

More information

Free Download Kaspersky Internet Security - multi device new softwares free download ]

Free Download Kaspersky Internet Security - multi device new softwares free download ] Free Download Kaspersky Internet Security - multi device - 2016 new softwares free download ] Description: Benefits Protecting all your connected devices the one-licence, easy-touse solution Kaspersky

More information

RSA Authentication Manager

RSA Authentication Manager McAfee Enterprise Security Manager Data Source Configuration Guide Data Source: RSA Authentication Manager February 26, 2015 RSA Authentication Manager Page 1 of 9 Important Note: The information contained

More information

Windows XP Home Network Setup: Step-by-Step

Windows XP Home Network Setup: Step-by-Step Windows XP Home Network Setup: Step-by-Step Before we begin, please uninstall any and all firewall software. Software firewalls such as Norton Internet Security, Zone Alarm, Black Ice, McAfee Firewall,

More information

Parent-led Protection

Parent-led Protection RESEARCH PAPER ADAM SMITH INSTITUTE Parent-led Protection Market-based solutions to child safety By Dominique Lazanski Introduction Claire Perry MP recently chaired an independent review into whether Internet

More information

Naverisk 2013 R3 - Road Map

Naverisk 2013 R3 - Road Map Naverisk 2013 R3 - Road Map This document summarizes the new features and enhancements in the 2013 R3 release of Naverisk. Continuing the Naverisk rapid release program, we have taken partner feedback

More information

FRITZ!Box Products Secure high-speed surfing and convenient telephoning over the Internet

FRITZ!Box Products Secure high-speed surfing and convenient telephoning over the Internet www.avm.de More about FRITZ!: To find out more, please visit www.avm.de. AVM GmbH for International Communication Technology Alt-Moabit 95 10559 Berlin, Germany Phone: +49-30-3 99 76-3 Fax: +49-30-3 99

More information

Single Product Review - Bitdefender Security for Virtualized Environments - November 2012

Single Product Review - Bitdefender Security for Virtualized Environments - November 2012 Single Product Review Bitdefender Security for Virtualized Environments Language: English November 2012 Last Revision: 1 st December 2012 Review commissioned by Bitdefender - 1 - Bitdefender Security for

More information

BitDefender Client Security Workstation Security and Management

BitDefender Client Security Workstation Security and Management BitDefender Client Security Workstation Security and Management BitDefender Client Security is an easy to use business security and management solution, which delivers superior proactive protection from

More information

AT&T Internet Security Suite - powered by McAfee. Installation Guide (for Clean Machine with No Anti-Virus Installed)

AT&T Internet Security Suite - powered by McAfee. Installation Guide (for Clean Machine with No Anti-Virus Installed) AT&T Internet Security Suite - powered by McAfee Installation Guide (for Clean Machine with No Anti-Virus Installed) Contents 2 Contents Introduction 3 Chapters 1. Start Download Manager...4 2. Select

More information

Maximize your Remote Desktop Services

Maximize your Remote Desktop Services Maximize your Remote Desktop Services White paper Parallels An Overview of Remote Desktop Services Virtualization has added new issues to information technology. Today, businesses look not only at optimizing

More information

User Note: FSecure Internet Security Firewall Settings for Veebeam

User Note: FSecure Internet Security Firewall Settings for Veebeam User Note: FSecure Internet Security Firewall Settings for Veebeam 2011 Veebeam Corp. All rights reserved. Veebeam and the Veebeam logo are trademarks of Veebeam Corp. Other brands and product names are

More information

Licensing Windows and Microsoft Office for use on a Mac

Licensing Windows and Microsoft Office for use on a Mac Volume Licensing brief Licensing Windows and Microsoft Office for use on a Mac Table of Contents This brief applies to all Volume Licensing programs. Summary... 1 What s New in This Brief... 1 Details...

More information

NETOP VISION CLASSROOM MANAGEMENT SOFTWARE. Using Vision in mobile labs and BYOD environments

NETOP VISION CLASSROOM MANAGEMENT SOFTWARE. Using Vision in mobile labs and BYOD environments NETOP VISION CLASSROOM MANAGEMENT SOFTWARE Using Vision in mobile labs and BYOD environments CHANGE IS INEVITABLE Classrooms around the world are evolving and changing. Schools are looking for ways to

More information

Trend Micro Incorporated. Windows 7 (Unspecified. Tested on 64 bit) Windows Vista (Unspecified. Tested on 64 bit) Windows XP (32/64 bit)

Trend Micro Incorporated. Windows 7 (Unspecified. Tested on 64 bit) Windows Vista (Unspecified. Tested on 64 bit) Windows XP (32/64 bit) NAME Trend Micro Online Guardian for Families Company Trend Micro Incorporated Version 1.5.0.5041 Type of product Devices supported Operating systems Client Computer Windows 7 (Unspecified. Tested on 64

More information

AT&T Internet Security Suite - powered by McAfee. Installation Guide (for Customers with Existing Security Software)

AT&T Internet Security Suite - powered by McAfee. Installation Guide (for Customers with Existing Security Software) AT&T Internet Security Suite - powered by McAfee Installation Guide (for Customers with Existing Security Software) Contents 2 Contents Introduction 3 Chapters 1. Start Download Manager...4 2. Remove Incompatible

More information

Here is a demonstration of the Aqua Accelerated Protocol (AAP) software see the Aqua Connect YouTube Channel

Here is a demonstration of the Aqua Accelerated Protocol (AAP) software see the Aqua Connect YouTube Channel OS X Terminal Server The Marriott Library, Computer & Media Services has a OS X Terminal Server running software from Aqua Connect, see web site http://www.aquaconnect.net/. This enables the OS X operating

More information

User's voice OPTENET WEBFILTER PC. Comprehensibility: Test user did not provide any comments. Look and Feel: Time to install and configure: 45 minutes

User's voice OPTENET WEBFILTER PC. Comprehensibility: Test user did not provide any comments. Look and Feel: Time to install and configure: 45 minutes NAME OPTENET WEBFILTER PC Company Optenet S.A. Version 10.09.69 Type of product Devices supported Operating systems Client Computer Windows XP Sp2 Windows Vista (32 and 64 bits) Windows 7 (32 and 64 bits)

More information

Job Description. The post-holder will be expected to implement and work within the University s Policies, Procedures and Guidelines.

Job Description. The post-holder will be expected to implement and work within the University s Policies, Procedures and Guidelines. Job Description Job title: IT Support Manager Department/School: Computing Services (BUCS) Grade: 7 Location: University of Bath Job purpose The IT Support Manager will be responsible for the day-to-day

More information

Comparing Antivirus Business Solutions. A small business running 25 work stations and 2 servers require an antivirus solution that

Comparing Antivirus Business Solutions. A small business running 25 work stations and 2 servers require an antivirus solution that Ron Lakin 1 Ronald Lakin CIS 130 Nick Romano November 28 2015 Comparing Antivirus Business Solutions A small business running 25 work stations and 2 servers require an antivirus solution that will meet

More information

MS office 2016 Call * 855 ~ 999 ~ 8O45 Online Technical support

MS office 2016 Call * 855 ~ 999 ~ 8O45 Online Technical support MS office 2016 Call * 855 ~ 999 ~ 8O45 Online Technical support The mist widely used accepted MS office version of Microsoft, MS office 2016 gained huge success in terms of user-interference and useful

More information

Access the UTHSCSA Palo Alto Networks (PAN) VPN using Global Protect VPN client and Two Factor Authentication (2FA)

Access the UTHSCSA Palo Alto Networks (PAN) VPN using Global Protect VPN client and Two Factor Authentication (2FA) Access the UTHSCSA Palo Alto Networks (PAN) VPN using Global Protect VPN client and Two Factor Authentication (2FA) Table of Contents Introduction. 1 Determine your Windows Operating System (for software

More information

The mobile job search for SAP E-Recruiting is here!

The mobile job search for SAP E-Recruiting is here! The mobile job search for SAP E-Recruiting is here! Smart E-Recruiting add-ons by Promerit HR + IT New! The mobile job search for SAP E-Recruiting is here! Smart E-Recruiting add-ons by Promerit With the

More information

Puresight Technologies Ltd. Arabic, Dutch, English, German, Greece, Russian. 12 years old users: 1/21 (points 2,67 out of 4)

Puresight Technologies Ltd. Arabic, Dutch, English, German, Greece, Russian. 12 years old users: 1/21 (points 2,67 out of 4) NAME PURESIGHT OWL Company Puresight Technologies Ltd. Version 2012.3.9081 Type of product Devices supported Operating systems Client Computer Windows Vista (32/64 bit) Windows XP (32/64 bit) Windows 7

More information

GlobalProtect Overview

GlobalProtect Overview GlobalProtect Overview Whether checking email from home or updating corporate documents from the airport, the majority of today's employees work outside the physical corporate boundaries. This increased

More information

AT&T Internet Security Suite - powered by McAfee. Installation Guide (for users with BellSouth Internet Security Installed)

AT&T Internet Security Suite - powered by McAfee. Installation Guide (for users with BellSouth Internet Security Installed) AT&T Internet Security Suite - powered by McAfee Installation Guide (for users with BellSouth Internet Security Installed) Contents 2 Contents Introduction 3 Chapters 1. Start Download Manager...4 2. Remove

More information

MS office 2010 Call * 855 ~ 999 ~ 8O45 Online Technical support

MS office 2010 Call * 855 ~ 999 ~ 8O45 Online Technical support MS office 2010 Call * 855 ~ 999 ~ 8O45 Online Technical support The mist widely used accepted MS office version of Microsoft, MS office 2010 gained huge success in terms of user-interference and useful

More information

MS office 2013 Call * 855 ~ 999 ~ 8O45 Online Technical support

MS office 2013 Call * 855 ~ 999 ~ 8O45 Online Technical support MS office 2013 Call * 855 ~ 999 ~ 8O45 Online Technical support The mist widely used accepted MS office version of Microsoft, MS office 2013 gained huge success in terms of user-interference and useful

More information

MS office 365 Call * 855 ~ 999 ~ 8O45 Online Technical support

MS office 365 Call * 855 ~ 999 ~ 8O45 Online Technical support MS office 365 Call * 855 ~ 999 ~ 8O45 Online Technical support The mist widely used accepted MS office version of Microsoft, MS office 365 gained huge success in terms of user-interference and useful tools

More information

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community A Sampling of Cyber Security Solutions Designed for the

More information

Global Antivirus Software Package Market 2015-2019

Global Antivirus Software Package Market 2015-2019 Brochure More information from http://www.researchandmarkets.com/reports/3498718/ Global Antivirus Software Package Market 2015-2019 Description: About antivirus software package An antivirus scans the

More information

MS office Outlook Call * 855 ~ 999 ~ 8O45 Online Technical support

MS office Outlook Call * 855 ~ 999 ~ 8O45 Online Technical support MS office Outlook Call * 855 ~ 999 ~ 8O45 Online Technical support The mist widely used accepted MS office version of Microsoft, MS office Outlook gained huge success in terms of user-interference and

More information

Hit Hanan & Faisal Faruqi Nexscience

Hit Hanan & Faisal Faruqi Nexscience Leveraging Mobile Technology for Oracle Databases Management Hit Hanan & Faisal Faruqi Nexscience Mobile Market.. The total number of PCs will reach 1.78 billion in three years, while the number of smart

More information

McAfee Public Cloud Server Security Suite

McAfee Public Cloud Server Security Suite Installation Guide McAfee Public Cloud Server Security Suite For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the

More information

DON T BE AN EASY TARGET

DON T BE AN EASY TARGET CORPORATE SECURITY DON T BE AN EASY TARGET Pekka Usva Capital Market Day 16 Sept 2015 1 AGENDA Corporate Security in brief Market overview and key trends Offering and channels Competition Enabling growth

More information

South East of Process Main Building / 1F. North East of Process Main Building / 1F. At 14:05 April 16, 2011. Sample not collected

South East of Process Main Building / 1F. North East of Process Main Building / 1F. At 14:05 April 16, 2011. Sample not collected At 14:05 April 16, 2011 At 13:55 April 16, 2011 At 14:20 April 16, 2011 ND ND 3.6E-01 ND ND 3.6E-01 1.3E-01 9.1E-02 5.0E-01 ND 3.7E-02 4.5E-01 ND ND 2.2E-02 ND 3.3E-02 4.5E-01 At 11:37 April 17, 2011 At

More information

Deploying the DisplayLink Software using the MSI files

Deploying the DisplayLink Software using the MSI files How to deploy DisplayLink MSI files in a corporate environment with GPO or SCCM Go to: http://support.displaylink.com/knowledgebase/articles/615840 Introduction Or This article is intended to give a Windows

More information

ViewPower. User s Manual. Management Software for Uninterruptible Power Supply Systems

ViewPower. User s Manual. Management Software for Uninterruptible Power Supply Systems ViewPower User s Manual Management Software for Uninterruptible Power Supply Systems Table of Contents 1. ViewPower Overview... 2 1.1. Introduction...2 1.2. Structure...2 1.3. Applications...2 1.4. Features...2

More information

Manually Add Programs to Your Firewall or Anti-Virus Programs Trusted List. ZoneAlarm

Manually Add Programs to Your Firewall or Anti-Virus Programs Trusted List. ZoneAlarm Manually Add Programs to Your Firewall or Anti-Virus Programs Trusted List ZoneAlarm AVG Open the AVG Anti-Virus plus Firewall. Double-click the Firewall button to configure the Firewall. Add the programs

More information

Click below for details about which Operating Systems work with UMT Plus and UMT Audit :

Click below for details about which Operating Systems work with UMT Plus and UMT Audit : Compatibility Grid for UMT Plus V18 and UMT Audit V3 Click below for details about which Operating Systems work with UMT Plus and UMT Audit : Windows Mobile OS Palm OS (also known as Garnet) Android OS

More information

The All-in-One Support Solution. Easy & Secure. Secure Advisor

The All-in-One Support Solution. Easy & Secure. Secure Advisor The All-in-One Support Solution. Easy & Secure. Secure Advisor Secure Advisor - A Perfect Solution for Online Support Fast and easy remote support from anywhere Problems that often sound complicated on

More information

HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances

HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances Introduction............................................................ 2 What is Virtualization?....................................................2

More information

QUICK START GUIDE FOR CORE AND SELECT SECURITY CENTER 10 ENDPOINT SECURITY 10

QUICK START GUIDE FOR CORE AND SELECT SECURITY CENTER 10 ENDPOINT SECURITY 10 QUICK START GUIDE FOR CORE AND SELECT SECURITY CENTER 10 ENDPOINT SECURITY 10 About This Guide The intention of this guide is to provide a step through of the initial installation of Kaspersky Security

More information

Symantec Client Management Suite 8.0

Symantec Client Management Suite 8.0 IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,

More information

Hi! I m Andy and I m a school ICT technician. We ve been using NetSupport School here for a while now and I want to tell you how it works for us...

Hi! I m Andy and I m a school ICT technician. We ve been using NetSupport School here for a while now and I want to tell you how it works for us... 1 A Technician s Perspective Hi! I m Andy and I m a school ICT technician. We ve been using NetSupport School here for a while now and I want to tell you how it works for us... Most people think of classroom

More information

CLICK XT. Marketplace solution E F F I C I E N T S E C U R I T I E S T R A N S A C T I O N S

CLICK XT. Marketplace solution E F F I C I E N T S E C U R I T I E S T R A N S A C T I O N S CLICK XT Marketplace solution E F F I C I E N T S E C U R I T I E S T R A N S A C T I O N S The world s most widespread marketplace solution The CLICK XT marketplace solution from OMX Deregulation, consolidation,

More information

APS PACKAGE LISTEQ CLOUD DESKTOP Specification

APS PACKAGE LISTEQ CLOUD DESKTOP Specification 1. INTRODUCTION The LISTEQ Cloud Desktop software is delivered by LISTEQ to Hosting/Service Providers and Telcos (Service Providers). For the integration, provisioning, user settings, control and billing,

More information

VirtualXP Users Guide

VirtualXP Users Guide VirtualXP Users Guide Contents Chapter 1: Introduction... 2 Chapter 2: Install and Uninstall VirtualXP... 3 2.1 System Requirement... 3 2.2 Installing VirtualXP... 3 2.3 Uninstalling VirtualXP... 3 Chapter

More information

User's voice CYBERSIEVE. Make the interface nicer. It is old fashioned. Comprehensibility: Look and Feel: Time to install and configure: 45 minutes

User's voice CYBERSIEVE. Make the interface nicer. It is old fashioned. Comprehensibility: Look and Feel: Time to install and configure: 45 minutes NAME CYBERSIEVE Company SoftForYou Version 3.0 Type of product Devices supported Operating systems Client Computer Microsoft Vista (32/64 bit) Windows 7 (32/64 bit) Price* 1-3 licences 27 3-6 licences

More information

Unit C: Computer Software

Unit C: Computer Software Unit C: Computer Software Learning Objectives List and describe computer software categories Explain copyright law and define the different software licenses Explain how to install and uninstall software

More information

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home. Remote Desktop Gateway Accessing a Campus Managed Device (Windows Only) from home. Contents Introduction... 2 Quick Reference... 2 Gateway Setup - Windows Desktop... 3 Gateway Setup Windows App... 4 Gateway

More information

AV1200 TL-PA8030P KIT. 3-Port Gigabit Passthrough Powerline Starter Kit. Highlights

AV1200 TL-PA8030P KIT. 3-Port Gigabit Passthrough Powerline Starter Kit. Highlights AV1200 3-Port Gigabit Passthrough Powerline Starter Kit Highlights AV1200 HomePlug AV2 standard compliant, high-speed data transfer rates of up to 1200Mbps, supports all your online needs MIMO Technology

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

Cyber Security Solutions:

Cyber Security Solutions: ThisIsCable for Business Report Series Cyber Security Solutions: A Sampling of Cyber Security Solutions Designed for the Small Business Community Comparison Report Produced by BizTechReports.com Editorial

More information

Symantec Mobile Management Suite

Symantec Mobile Management Suite Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the

More information

Home Use Installation Guide For Symantec Endpoint Protection (SEP) 11 For Mac

Home Use Installation Guide For Symantec Endpoint Protection (SEP) 11 For Mac Home Use Installation Guide For Symantec Endpoint Protection (SEP) 11 For Mac May 2010 Table of Content 1 INTRODUCTION... 2 2 AntiVirus Software Home Use License Policy... 2 2.1 Authorized Users:...2 2.2

More information

10 Security Packages for Mac OS X: No less than 5 products achieved a perfect score of 100 percent in detection (AV-TEST April 2015).

10 Security Packages for Mac OS X: No less than 5 products achieved a perfect score of 100 percent in detection (AV-TEST April 2015). 28th April 2015 created by Markus Selinger Mac OS X under attack 10 security packages put to the test The legend that Mac OS X is supposedly invincible is not borne out by the facts. In the aftermath of

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Course Outline Module 01: Foundations of Security Essential Terminologies Computer Security Why Security? Potential Losses Due to Security Attacks Elements of Security The

More information

Choosing a Single Sign-on solution FIVE things you MUST consider 1

Choosing a Single Sign-on solution FIVE things you MUST consider 1 Choosing a Single Sign-on solution FIVE things you MUST consider 1 System Compatibility Will the product I choose work with every business system? A key consideration when choosing a Single Sign- on (SSO)

More information

Using, Monitoring and Controlling online resources and the Internet within the modern classroom.

Using, Monitoring and Controlling online resources and the Internet within the modern classroom. 1 P a g e Using, Monitoring and Controlling online resources and the Internet within the modern classroom. 2 P a g e INTRODUCTION Increasingly in the modern classroom the Internet provides a wealth of

More information

Testing of Cloud Services The Approach: From Risks to Test Measures

Testing of Cloud Services The Approach: From Risks to Test Measures Testing of Cloud Services The Approach: From Risks to Test Measures Kees Blokland and Jeroen Mengerink, Polteq www.eurostarconferences.com @esconfs #esconfs Testing of Cloud Services The Approach: From

More information

Security Suites for Mac OS X: For on-demand detection, only four products achieved the 100-percent mark (AV-TEST August 2014).

Security Suites for Mac OS X: For on-demand detection, only four products achieved the 100-percent mark (AV-TEST August 2014). 18th September 2014 created by Markus Selinger Mac OS X in the Crosshairs 18 Malware Scanners Put to the Test For a long time, Mac OS users believed they were safe, that there was no malware for their

More information

McAfee Multi Access from ø. Step-by-step guide to protecting your devices. Always.

McAfee Multi Access from ø. Step-by-step guide to protecting your devices. Always. McAfee Multi Access from ø Step-by-step guide to protecting your devices. Always. Contents 3 Welcome to McAfee Multi Access 5 Setting up your Windows PC Setting up McAfee Multi Access on your Windows PC

More information

Comprehensibility: Look and Feel: Time to install and configure: 130 minutes NAME PROFIL PARENTAL FILTER 2. Profil Technology. Company. Version 2.4.

Comprehensibility: Look and Feel: Time to install and configure: 130 minutes NAME PROFIL PARENTAL FILTER 2. Profil Technology. Company. Version 2.4. NAME PROFIL PARENTAL FILTER 2 Company Profil Technology Version 2.4.0 Type of product Devices supported Operating systems Client Computer Windows 7 (32/64 bit) Windows XP (32/64 bit) Windows Vista (32/64

More information

Central Management System

Central Management System Central Management System Software Installation Guide Ver. 1.5.0.101115.001 ... ii System Introduction... 3 Client/Server Architecture...3 System Requirements... 4 System Setup...4 Multiple Monitor Configuration...5

More information

Integrated SSL Scanning

Integrated SSL Scanning Software Version 9.0 Copyright Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive

More information

Upgrade of TrustPort Products

Upgrade of TrustPort Products Upgrade of TrustPort Products Since July 1 st TrustPort is going to release the virus definition updates for Argon engine in new more effective format. Updates for the Argon engine will be released more

More information

Wireless Presentation Gateway. User Guide

Wireless Presentation Gateway. User Guide User Guide Table of Contents 1 Initial Setup Present Anything Without Wires p. 3 2 From A Laptop (Windows or Mac) First, download he client p. 4 Now connect p. 5 Additional Features p. 6 3 From An ios

More information

N750 Wireless Dual Band Gigabit Router Premium Edition

N750 Wireless Dual Band Gigabit Router Premium Edition Performance & Use N750 750 DUAL BAND 300+450 RANGE Faster WiFi speed 300+450 Up to 750 Mbps WiFi range for medium to large homes Wirelessly access & share USB hard drive & printer ReadySHARE Cloud** Access

More information

SECURALIVE WEB SECURITY GATEWAY

SECURALIVE WEB SECURITY GATEWAY SECURALIVE WEB SECURITY GATEWAY allows you to filter users DNS queries using filtering categories and black and white lists of forbidden hosts. On access to a particular site being denied through DNS filtering,

More information

Embracing Complete BYOD Security with MDM and NAC

Embracing Complete BYOD Security with MDM and NAC Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP

More information

User Manual. Gold Lock 3G Military Grade Encryption For Android OS 2.1 and Later

User Manual. Gold Lock 3G Military Grade Encryption For Android OS 2.1 and Later User Manual Gold Lock 3G Military Grade Encryption For Android OS 2.1 and Later 1 Table of Contents 1. Security Warnings...3 2. Installation...3 3. Configuration...4 4. Usage...5 2 Security Warnings -

More information

Director Test Research: David Walkiewicz

Director Test Research: David Walkiewicz 7th August 2015 created by Markus Selinger Test: Parental control software for Windows and Mac OS X Those who don't want their children to be exposed to early unattended lessons in the birds and the bees

More information

DisplayLink Corporate Install Guide

DisplayLink Corporate Install Guide This document s classification is: Public This means: It can be freely distributed to Customers without an NDA needing to be in place Document Analysis Title Document number DisplayLink Corporate Install

More information

Trends in Zero-Day Kernel Exploits and Protection 2015

Trends in Zero-Day Kernel Exploits and Protection 2015 Trends in Zero-Day Kernel Exploits and Protection 2015 Overview of Key Protection Technologies and Their Limitations in Dealing With Zero-Day Kernel Attacks Executive Summary Legacy security solutions

More information