WABA Workspace is safety-oriented where workers use their own machines.
It is an advantage for the company not to worry about provisioning additional hardware resources or additional IT efforts to enable remote workers who have their own equipment; however, it must guaranteed that the staff can work in a secure and controlled way from their own machines.
The employee's device will no longer be a security breach or concern for the company when working remotely, and the owner of the device will not be affected when using it for personal purposes. When the user ends their session, they recover control of their machine as normal, and all monitoring for the session is completely turned off.
For analysis and decision making purposes, the system has an agent that monitors the user's activities within the Workspace created on demand for the session. This information is useful to determine what the user was focused on, what programs he/she was using, what pages he/she was visiting, and what percentage of idle time is registered per session.
1. Monitoring
2. Restrictive process configuration
The system allows the company to define a set of processes (applications) to which the user must have access during a remote work session. So that the user can only have access to what is explicitly allowed. This allows the remote worker to focus on his work activities avoiding distractions that interfere with his productivity and most importantly, he will have a secure and isolated workspace different from the host space of the machine to improve the security and protection of the company's information.
3. Restrictive web site configuration
The system has a feature that allows to define a black list or a white list of web sites so that the employee can only navigate to where it is allowed to do so. This is also useful in terms of productivity at work and in terms of security, preventing the employee from accessing dangerous websites that pose a risk to information security.
4. Peripheral blocking
It is a feature that allows the employer to block access to removable media that are connected via USB. To prevent information leakage during a remote work session.
5. Data destruction
During a remote work session, a lot of temporary session-level information can be generated that may contain sensitive data that needs to be kept within the context of the secure session. The system allows a control to be activated to remove all that information before allowing the user to log out. The information that is removed includes the clipboard.
6. Clipboard locking
The clipboard is a temporary space for storing data that can be available at the level of the entire operating system; If desired, a permanent lock can be activated so that, during the remote work session, the user will not be able to save data in this memory space for use outside the secure workspace.
7. VPN integration
It is possible that a VPN connection may be required while connected to the remote work session, in this case it is feasible that we can integrate your VPN provider to work only when the secure connection of the system is active. Currently the integration works with OPENVPN. But do not hesitate to contact us to evaluate other integrations.
8. Safety with process isolation
It is important to keep in mind that when staff at work remotely use their own computers, there will always be a risk of threats such as malware, Trojans, etc. that may affect and compromise the security of the information. Workspace uses an isolation technology that makes the processes to be run within the session independent from the rest of the operating system. This way, while the employee is working inside this space, the information will remain secure regardless of whether the machine has been compromised by malware in the main host.
9. Activity reports
The system captures a lot of information within a remote work session that can be made available for consultation through our API or through the web console to which system administrators have access. In this console, you will find several standard reports that show user activity. For example, activity reports, navigation reports, timeout reports, other reports related to the origin of the connection that may contain vital information for auditing purposes.
10. Web-based system administration
The system has an administrative component with WEB access that facilitates and centralizes the administration and monitoring of all remote work activity of the collaborators. It is also possible to create policies based on groups or applicable to the whole company. It is often more relevant to be able to apply different policies depending on the group or role of the employee.