SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Questions are never indiscreet ANSWERS SOME TIMES ARE Protect against the indiscreet answers of the Internet
“ Nine out of 10 children aged between eight and 16 have viewed pornography on the Internet. In most cases, the sex sites were accessed unintentionally.” LSE 2002  “ 26 popular children's characters, such as Pokemon, My Little Pony and Action Man, revealed thousands of links to porn sites. 30% of which were hard-core.” Envisional 2000
[object Object],[object Object],[object Object],[object Object],“ 70% of porn traffic occurs between  9- 5” The Industry Standard “ Worker Internet misuse ‘a problem’: two-thirds of companies have disciplined employees” CBS Marketwarch "The employer is vicariously liable. An employer should make sure that the people it employs know how to behave and if they're causing offence to others then they should do something about it,"  Sarah Veale of the TUC – on BBC Radio "Today's change will force employers to take their responsibilities towards providing a harassment-free working environment more seriously. “ TUC general secretary Brendan Barber
The Guardware Solution “ Cyber Snoop, CYBERsitter and Optenet are the 3 tools that are in the lead of our evaluation. But nevertheless Cyber Snoop and especially CYBERsitter are not the best tools from a blocking effectiveness point of view (respectively  65%  and  46% ). On the other hand, Optenet is the best tool from a blocking  effectiveness point of view only ( 79% ).” European Union Report -  A European prototype NetProtect of Internet Access Filtering, 2002. Guardware are “96% Accurate on WWW” “ Internet Pornography  & its Social Impact” Dr. Mishaal Al Kadhi Director General of Internet Services Unit, Saudi Arabia
Protection for  For Home, Educational & ISP Users
Image Analysis ,[object Object],[object Object],[object Object],[object Object],[object Object],Decision Skin Tones Skin Textures Edges Blobs Limbs Faces
Text Analysis ,[object Object],[object Object],[object Object],[object Object],[object Object]
WITHOUT e-Safe
WITH e-Safe
 
Media
Media
Awards & Recognition PIKOM Computimes ICT Awards 2004 -  WINNER “ ICT Product of the Year” MSC - Asia Pacific ICT Awards 2004 - WINNER “ Best of Applications and Infrastructure Tools” International Asia Pacific ICT Awards 2004 Hong Kong - MERIT AWARD “ Best of Applications and Infrastructure Tools” MSC - APICTA 2003 - MERIT AWARD “ Best of R&D” Asian Innovation Awards 2004  -  FINALIST  Far East Economic Review “ Improving Productivity, Efficiency & Quality of Life” Asian Conference on Computer Vision 2004  28-30 January 2004, Juju Island, Korea. Detecting Pornographic Images MSC-APICTA 2005,  Malaysia – WINNER URLChecker   "Best of Application and Infrastructure Tools” APICTA 2008, SS3 - WINNER “ e-Community & e-Inclusion' category” “ Surprisingly, perhaps, it works brilliantly”
  Mr. Supachai Chearavanont, President and CEO of  True Corporation Plc ,  Thailand’s Largest ISP   Mr. Manas Vongsuvan, CEO of Compumation Co Ltd TRUE Corporation  is using iShield for its users on subscription basis.  (TRUE ISP using iShield by name of  WHITENET   www.asianet.co.th ) 3rd May, 2005 Launch of "WhiteNet" (iShield) in Bangkok, Thailand.
26th July 2005 -  Senior   Systems Consultant, Muhammad Anis Ur Rehman  With Dr. Mishaal Al Kadhi, Deputy Director General Internet Service Units  signing-off the project "URLChecker" in Riyadh, Saudi Arabia. ULR Checker Project – Saudi Arabia
“ Over the past four months, it has been my distinct pleasure to work closely with APIIT in the development of the URLChecker product (Automatic Porn URL Classifier).  I have found the company and it’s employees to be professional, responsive and knowledgeable.   I am very happy with the way the project was handled both administratively and technically,  I look forward to have the opportunity to work with them on other projects again in the future" Dr. Mishaal Al Kadhi Deputy Director General Internet Services Unit King Abdul Aziz City of Science & Technology , Saudi Arabia
Agreement with AwalNet ISP Saudi Arabia ,[object Object]
Media
Media
Media
Worldwide Interest
Worldwide Interest
The  Screen Shield™ Suite Enterprise - Client / Server application: (Sold in UK as e-safe Prism) Captures and analyses everything displayed on the screen and stored within the hard-drive for pornographic material. Customisable to suit the needs of organisations. Remote management and viewing of incidences via the Internet. E-safe Prism is a total GRC Management solution Browser plug-in: (Sold in UK as e-Safe Screen) Replaces pornographic images in web-pages with a neutral image. Records URLs of pornographic pages visited.  ™ Standalone: (Sold in UK as e-safe Protect) Captures and analyses everything displayed on the screen and stored within the hard-drive for pornographic material on a standalone machine. URL Checker A robot application that automatically searches out and categorizes websites as being i) highly likely to be pornographic, ii) highly likely to be non-pornographic, or iii) boundary (requiring manual categorisation). It maintains a database of previously categorized websites, allowing the entries to be edited using a web interface and the contents to be exported into a suitably structured file for uploading to third party URL blocking solutions. Designed for ISP & Large Corporate / Educational installation ™ ™
THANK YOU Ensuring the Responsible Use of I.T.  ™

Weitere ähnliche Inhalte

Was ist angesagt?

The Cloud and the Car
The Cloud and the CarThe Cloud and the Car
The Cloud and the CarBarry Gander
 
How the Tubes are Strangling Their Owners: Consumer Rights Bill 2014
How the Tubes are Strangling Their Owners: Consumer Rights Bill 2014How the Tubes are Strangling Their Owners: Consumer Rights Bill 2014
How the Tubes are Strangling Their Owners: Consumer Rights Bill 2014Chris Marsden
 
Manfred-Touron-resume
Manfred-Touron-resumeManfred-Touron-resume
Manfred-Touron-resumevisual_resume
 
Manfred-Touron-resume
Manfred-Touron-resumeManfred-Touron-resume
Manfred-Touron-resumevisual_resume
 
T.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirtyT.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirtyAdam Radly
 
Smart phone security ios system
Smart phone security ios systemSmart phone security ios system
Smart phone security ios systemJamil S. Alagha
 
Mobile First Solution vs Responsive Site: What's Best for Your Learners?
Mobile First Solution vs Responsive Site: What's Best for Your Learners?Mobile First Solution vs Responsive Site: What's Best for Your Learners?
Mobile First Solution vs Responsive Site: What's Best for Your Learners?Growth Engineering
 
Unleashing Superheroes: Creating a Digital Learning Solution for Modern Learn...
Unleashing Superheroes: Creating a Digital Learning Solution for Modern Learn...Unleashing Superheroes: Creating a Digital Learning Solution for Modern Learn...
Unleashing Superheroes: Creating a Digital Learning Solution for Modern Learn...Growth Engineering
 
Aipm state conference_sept_2010_presentation_mobo_dev
Aipm state conference_sept_2010_presentation_mobo_devAipm state conference_sept_2010_presentation_mobo_dev
Aipm state conference_sept_2010_presentation_mobo_devMobodev
 
Ravi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security RisksRavi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security RisksRavi namboori
 
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...
Open Source Insight: IoT, Medical Devices, Connected Cars  All Vulnerable to ...Open Source Insight: IoT, Medical Devices, Connected Cars  All Vulnerable to ...
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...Black Duck by Synopsys
 
Technology and Innovation. The Aviation of the Future: Paul Boyle, Portfolio ...
Technology and Innovation. The Aviation of the Future: Paul Boyle, Portfolio ...Technology and Innovation. The Aviation of the Future: Paul Boyle, Portfolio ...
Technology and Innovation. The Aviation of the Future: Paul Boyle, Portfolio ...SITA
 
Get With The Programme
Get With The ProgrammeGet With The Programme
Get With The ProgrammePaul Saunders
 
Social Engineering for Fun and Profit Lessons from the SECTF
Social Engineering for Fun and ProfitLessons from the SECTFSocial Engineering for Fun and ProfitLessons from the SECTF
Social Engineering for Fun and Profit Lessons from the SECTFPositive Hack Days
 
You're still doing it all wrong
You're still doing it all wrongYou're still doing it all wrong
You're still doing it all wrongPaul Saunders
 

Was ist angesagt? (17)

The Cloud and the Car
The Cloud and the CarThe Cloud and the Car
The Cloud and the Car
 
Car hackers handbook
Car hackers handbookCar hackers handbook
Car hackers handbook
 
How the Tubes are Strangling Their Owners: Consumer Rights Bill 2014
How the Tubes are Strangling Their Owners: Consumer Rights Bill 2014How the Tubes are Strangling Their Owners: Consumer Rights Bill 2014
How the Tubes are Strangling Their Owners: Consumer Rights Bill 2014
 
Manfred-Touron-resume
Manfred-Touron-resumeManfred-Touron-resume
Manfred-Touron-resume
 
Manfred-Touron-resume
Manfred-Touron-resumeManfred-Touron-resume
Manfred-Touron-resume
 
T.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirtyT.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirty
 
Smart phone security ios system
Smart phone security ios systemSmart phone security ios system
Smart phone security ios system
 
Mobile First Solution vs Responsive Site: What's Best for Your Learners?
Mobile First Solution vs Responsive Site: What's Best for Your Learners?Mobile First Solution vs Responsive Site: What's Best for Your Learners?
Mobile First Solution vs Responsive Site: What's Best for Your Learners?
 
Unleashing Superheroes: Creating a Digital Learning Solution for Modern Learn...
Unleashing Superheroes: Creating a Digital Learning Solution for Modern Learn...Unleashing Superheroes: Creating a Digital Learning Solution for Modern Learn...
Unleashing Superheroes: Creating a Digital Learning Solution for Modern Learn...
 
Aipm state conference_sept_2010_presentation_mobo_dev
Aipm state conference_sept_2010_presentation_mobo_devAipm state conference_sept_2010_presentation_mobo_dev
Aipm state conference_sept_2010_presentation_mobo_dev
 
Au2Go
Au2GoAu2Go
Au2Go
 
Ravi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security RisksRavi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security Risks
 
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...
Open Source Insight: IoT, Medical Devices, Connected Cars  All Vulnerable to ...Open Source Insight: IoT, Medical Devices, Connected Cars  All Vulnerable to ...
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...
 
Technology and Innovation. The Aviation of the Future: Paul Boyle, Portfolio ...
Technology and Innovation. The Aviation of the Future: Paul Boyle, Portfolio ...Technology and Innovation. The Aviation of the Future: Paul Boyle, Portfolio ...
Technology and Innovation. The Aviation of the Future: Paul Boyle, Portfolio ...
 
Get With The Programme
Get With The ProgrammeGet With The Programme
Get With The Programme
 
Social Engineering for Fun and Profit Lessons from the SECTF
Social Engineering for Fun and ProfitLessons from the SECTFSocial Engineering for Fun and ProfitLessons from the SECTF
Social Engineering for Fun and Profit Lessons from the SECTF
 
You're still doing it all wrong
You're still doing it all wrongYou're still doing it all wrong
You're still doing it all wrong
 

Andere mochten auch

Boses Ng Kabataan Competition Paper
Boses Ng Kabataan Competition PaperBoses Ng Kabataan Competition Paper
Boses Ng Kabataan Competition Paperguest6b6bedc
 
Präs baujournal
Präs baujournalPräs baujournal
Präs baujournalTom Treber
 
Regio alueyhteistyömalli 2012
Regio alueyhteistyömalli 2012Regio alueyhteistyömalli 2012
Regio alueyhteistyömalli 2012Vesa Sarmia
 
Presentation1
Presentation1Presentation1
Presentation1Rasha.g
 
Mayflower Capital im Sozialen Netz
Mayflower Capital im Sozialen NetzMayflower Capital im Sozialen Netz
Mayflower Capital im Sozialen NetzTom Treber
 

Andere mochten auch (7)

Präs plank
Präs plankPräs plank
Präs plank
 
Boses Ng Kabataan Competition Paper
Boses Ng Kabataan Competition PaperBoses Ng Kabataan Competition Paper
Boses Ng Kabataan Competition Paper
 
Komm 2.0
Komm 2.0Komm 2.0
Komm 2.0
 
Präs baujournal
Präs baujournalPräs baujournal
Präs baujournal
 
Regio alueyhteistyömalli 2012
Regio alueyhteistyömalli 2012Regio alueyhteistyömalli 2012
Regio alueyhteistyömalli 2012
 
Presentation1
Presentation1Presentation1
Presentation1
 
Mayflower Capital im Sozialen Netz
Mayflower Capital im Sozialen NetzMayflower Capital im Sozialen Netz
Mayflower Capital im Sozialen Netz
 

Ähnlich wie Protection for Single PCs

Network GRC Delivery
Network GRC DeliveryNetwork GRC Delivery
Network GRC Deliveryiansadler
 
Audit PC content
Audit PC content Audit PC content
Audit PC content iansadler
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldBrad Nicholas
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Securitysudip pudasaini
 
How Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile DevicesHow Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile DevicesSkycure
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Managementipspat
 
Why we need a more Ethical Web
Why we need a more Ethical Web   Why we need a more Ethical Web
Why we need a more Ethical Web Daniel Appelquist
 
Close the Security Gaps of a Remote Workforce
Close the Security Gaps of a Remote WorkforceClose the Security Gaps of a Remote Workforce
Close the Security Gaps of a Remote Workforcejlieberman07
 
Three Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security SuperheroThree Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security SuperheroSkycure
 
Review Paper ( Research Articles )
Review Paper ( Research Articles )Review Paper ( Research Articles )
Review Paper ( Research Articles )SaadSaif6
 
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.ITCamp
 
Unified application security analyser
Unified application security analyserUnified application security analyser
Unified application security analyserTim Youm
 
Digital IQ in managing risk and cyber threats
Digital IQ in managing risk and cyber threatsDigital IQ in managing risk and cyber threats
Digital IQ in managing risk and cyber threatsMaganathin Veeraragaloo
 
Essentials of Web Application Security: what it is, why it matters and how to...
Essentials of Web Application Security: what it is, why it matters and how to...Essentials of Web Application Security: what it is, why it matters and how to...
Essentials of Web Application Security: what it is, why it matters and how to...Cenzic
 

Ähnlich wie Protection for Single PCs (20)

Network GRC Delivery
Network GRC DeliveryNetwork GRC Delivery
Network GRC Delivery
 
Audit PC content
Audit PC content Audit PC content
Audit PC content
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
How Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile DevicesHow Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile Devices
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Why we need a more Ethical Web
Why we need a more Ethical Web   Why we need a more Ethical Web
Why we need a more Ethical Web
 
Close the Security Gaps of a Remote Workforce
Close the Security Gaps of a Remote WorkforceClose the Security Gaps of a Remote Workforce
Close the Security Gaps of a Remote Workforce
 
Three Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security SuperheroThree Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security Superhero
 
Review Paper ( Research Articles )
Review Paper ( Research Articles )Review Paper ( Research Articles )
Review Paper ( Research Articles )
 
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
 
Automotive Cybersecurity: The Gap Still Exists
Automotive Cybersecurity: The Gap Still ExistsAutomotive Cybersecurity: The Gap Still Exists
Automotive Cybersecurity: The Gap Still Exists
 
MIS ppt 1
MIS ppt 1MIS ppt 1
MIS ppt 1
 
Unified application security analyser
Unified application security analyserUnified application security analyser
Unified application security analyser
 
Secure Web Apps Training at Corporate College
Secure Web Apps Training at Corporate CollegeSecure Web Apps Training at Corporate College
Secure Web Apps Training at Corporate College
 
Security Firm Program - Corporate College
Security Firm Program - Corporate CollegeSecurity Firm Program - Corporate College
Security Firm Program - Corporate College
 
Digital IQ in managing risk and cyber threats
Digital IQ in managing risk and cyber threatsDigital IQ in managing risk and cyber threats
Digital IQ in managing risk and cyber threats
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
Essentials of Web Application Security: what it is, why it matters and how to...
Essentials of Web Application Security: what it is, why it matters and how to...Essentials of Web Application Security: what it is, why it matters and how to...
Essentials of Web Application Security: what it is, why it matters and how to...
 
Fake News Analyzer
Fake News AnalyzerFake News Analyzer
Fake News Analyzer
 

Protection for Single PCs

  • 1. Questions are never indiscreet ANSWERS SOME TIMES ARE Protect against the indiscreet answers of the Internet
  • 2. “ Nine out of 10 children aged between eight and 16 have viewed pornography on the Internet. In most cases, the sex sites were accessed unintentionally.” LSE 2002 “ 26 popular children's characters, such as Pokemon, My Little Pony and Action Man, revealed thousands of links to porn sites. 30% of which were hard-core.” Envisional 2000
  • 3.
  • 4. The Guardware Solution “ Cyber Snoop, CYBERsitter and Optenet are the 3 tools that are in the lead of our evaluation. But nevertheless Cyber Snoop and especially CYBERsitter are not the best tools from a blocking effectiveness point of view (respectively 65% and 46% ). On the other hand, Optenet is the best tool from a blocking effectiveness point of view only ( 79% ).” European Union Report - A European prototype NetProtect of Internet Access Filtering, 2002. Guardware are “96% Accurate on WWW” “ Internet Pornography & its Social Impact” Dr. Mishaal Al Kadhi Director General of Internet Services Unit, Saudi Arabia
  • 5. Protection for For Home, Educational & ISP Users
  • 6.
  • 7.
  • 10.  
  • 11. Media
  • 12. Media
  • 13. Awards & Recognition PIKOM Computimes ICT Awards 2004 - WINNER “ ICT Product of the Year” MSC - Asia Pacific ICT Awards 2004 - WINNER “ Best of Applications and Infrastructure Tools” International Asia Pacific ICT Awards 2004 Hong Kong - MERIT AWARD “ Best of Applications and Infrastructure Tools” MSC - APICTA 2003 - MERIT AWARD “ Best of R&D” Asian Innovation Awards 2004 - FINALIST Far East Economic Review “ Improving Productivity, Efficiency & Quality of Life” Asian Conference on Computer Vision 2004 28-30 January 2004, Juju Island, Korea. Detecting Pornographic Images MSC-APICTA 2005, Malaysia – WINNER URLChecker "Best of Application and Infrastructure Tools” APICTA 2008, SS3 - WINNER “ e-Community & e-Inclusion' category” “ Surprisingly, perhaps, it works brilliantly”
  • 14.   Mr. Supachai Chearavanont, President and CEO of True Corporation Plc , Thailand’s Largest ISP Mr. Manas Vongsuvan, CEO of Compumation Co Ltd TRUE Corporation is using iShield for its users on subscription basis. (TRUE ISP using iShield by name of WHITENET www.asianet.co.th ) 3rd May, 2005 Launch of "WhiteNet" (iShield) in Bangkok, Thailand.
  • 15. 26th July 2005 - Senior Systems Consultant, Muhammad Anis Ur Rehman With Dr. Mishaal Al Kadhi, Deputy Director General Internet Service Units signing-off the project "URLChecker" in Riyadh, Saudi Arabia. ULR Checker Project – Saudi Arabia
  • 16. “ Over the past four months, it has been my distinct pleasure to work closely with APIIT in the development of the URLChecker product (Automatic Porn URL Classifier).  I have found the company and it’s employees to be professional, responsive and knowledgeable.   I am very happy with the way the project was handled both administratively and technically, I look forward to have the opportunity to work with them on other projects again in the future" Dr. Mishaal Al Kadhi Deputy Director General Internet Services Unit King Abdul Aziz City of Science & Technology , Saudi Arabia
  • 17.
  • 18. Media
  • 19. Media
  • 20. Media
  • 23. The Screen Shield™ Suite Enterprise - Client / Server application: (Sold in UK as e-safe Prism) Captures and analyses everything displayed on the screen and stored within the hard-drive for pornographic material. Customisable to suit the needs of organisations. Remote management and viewing of incidences via the Internet. E-safe Prism is a total GRC Management solution Browser plug-in: (Sold in UK as e-Safe Screen) Replaces pornographic images in web-pages with a neutral image. Records URLs of pornographic pages visited. ™ Standalone: (Sold in UK as e-safe Protect) Captures and analyses everything displayed on the screen and stored within the hard-drive for pornographic material on a standalone machine. URL Checker A robot application that automatically searches out and categorizes websites as being i) highly likely to be pornographic, ii) highly likely to be non-pornographic, or iii) boundary (requiring manual categorisation). It maintains a database of previously categorized websites, allowing the entries to be edited using a web interface and the contents to be exported into a suitably structured file for uploading to third party URL blocking solutions. Designed for ISP & Large Corporate / Educational installation ™ ™
  • 24. THANK YOU Ensuring the Responsible Use of I.T. ™

Hinweis der Redaktion

  1. The Internet is now an important educational resource, a key source of information and a central medium for communication. Remove connectivity to the Internet and e-mail and the experience of both teaching staff and students will be effected but the very power that access to the World Wide Web delivers presents its own set of unique challenges to good practice How, in a busy educational environment, can You be sure that the power of the Internet is been used solely to boost the educational productivity of students and not for more nefarious activities?
  2. Like it or not alongside its undoubted benefits the Internet delivers access to a range of undesirable diversions from productive educational output. At the top of the list must be the instant access delivered to Sex sites and Pornography. Pure curiosity can draw even the most honest and up right to explore and even the most innocent of word combinations can lead to Internet sites that offer Pornography far far worse than anything available in Soho or a Licensed Sex Shop. Once such images are downloaded onto your PC network the problem faced becomes acute - as do the legal responsibilities you carry , both as guardian to your students and as an employer.
  3. ScreenShield uses a different rational and approach based on its ability to identify and evaluate the ACTUAL CONTENT of the file at the point of display on the individual users PC. ScreenShield does not depend on lists of Sites, Words or File Formats and has been recognised as the most effective answer to visual pornography
  4. i Shield is a unique plug in to the browser software used by Personal Computer users to access the Internet. It uses the award winning ScreenShield recognition engine to evaluate the content of web sites for “Unacceptable” images as they are displayed and responds to the presence of such unacceptable content in one of 3ways. i Shield has been purchased by Internet Service Providers world wide to protect their subscribers from unwanted exposure to Pornographic and unacceptable images contained within the World Wide Web Remember - More than 10,000 new sex sites are added to the internet every week! i Shield is a low cost solution that offers protection to single PCs – it is suitable for home use and offers you the opportunity, via your PTA, to extend the protection enjoyed by students whilst at school or college into the home environment. Guardware offers a promotional programme for PTA and like groups
  5. Like it or not alongside its undoubted benefits the Internet delivers access to a range of undesirable diversions from productive educational output. At the top of the list must be the instant access delivered to Sex sites and Pornography. Pure curiosity can draw even the most honest and up right to explore and even the most innocent of word combinations can lead to Internet sites that offer Pornography far far worse than anything available in Soho or a Licensed Sex Shop.
  6. i Shield answers the danger, removing the offensive images and replacing them with a neutral image or logo
  7. i Shield has received positive review from the Computer Press
  8. i Shield has received positive review from the Computer Press
  9. The ScreenShield product suite has won awards throughout Asia and is acknowledged as the leading solution to the management and control of visual pornography
  10. In Thailand it is deployed by True – The leading Internet Service Provider and within numerous educational establishments
  11. In Saudi Arabia a specialist application has been commissioned and deployed to pre-classify web sites for offensive content.
  12. A testimonial from a world leader in the prevention of internet pornography
  13. Guardware signs a supply and distribution agreement with the Internet Service Provider to the Kingdom of Saudi Arabia
  14. ScreenShield Suite is deployed throughout the world including Malaysia Thailand Singapore Pakistan UAE Saudi Arabia USA
  15. Gaining extensive media coverage
  16. In many countries
  17. It has excited interest at governmental level in many countries
  18. Throughout the world
  19. Whilst the ScreenShield suite does not provide a selection of “Silver Bullets” that will instantly banish all pornography and related misuses of Personal Computers, It does provide highly effective tools that will enable you to project a positive and pro-active service message and assist you in developing a structured and effective response to the very real danger that computer pornography presents to the well-being of staff students and the success of your enterprise as a whole. ScreenShield is the ultimate low cost, low maintenance solution to employment and conduct issues arising from misuse of computers. ScreenShield will allow you to project and enforce a protective and responsible ITC acceptable use policy and in the extreme case of your policy falling in the face of deliberate and persistent abuse save hours of preparation costs and proofing of evidence in advance of disciplinary action and help avoid costly tribunal appearances.
  20. Further information is available from