Home
Products
Drawings document encryption WaterBox secure encrypted files encrypted file encryption software anti-phishing
Drawings document encryption WaterBox secure encrypted files encrypted file encryption software anti-phishing
Drawings document encryption WaterBox secure encrypted files encrypted file encryption software anti-phishing
Database Security Solution Overview of core information security is the security of the database, that database encryption is the core issue of information security. Database security issues more and more attention, the application database encryption technology to solve the security problems of great data in the database. Database includes not only corporate effort, also contain business critical data, database encryption gifted shield, can effectively secure enterprise database. By encrypting the database, only the user has permission to access the data properly, and the database is always stored encrypted exist, effectively preventing the passive and active leaks, eliminate internal security risks in the invisible. Encryption, backup content databases becomes ciphertext, which can reduce the losses due to theft or loss of backup media caused. Solve the problem: Database encryption system can effectively ensure data security, even hackers stealing critical data, he is still difficult to obtain the required information, because all the data is encrypted. In addition, through encryption, back up the content of the database has become a ciphertext, which can reduce losses due to theft or loss of backup media caused. Thus, the database encryption for internal security management, is indispensable. Access Control Solution Overview ban on U disks, optical disks, removable hard disk access to files to prevent viruses and resource leaks; restrict the use of a variety of applications, improving efficiency, the use of staff time to prevent non-designated procedures to prevent employees dry private live, then private live; encrypted file control management, you can define file access permissions, which departments can see which departments can not see, file access entirely by my master; mobile storage management, optical drive, U disk, etc., can all removable storage media such as: U disk, removable hard disk, burner, and the phone memory card to encrypt all the files control. Including mandatory encryption, mandatory decryption, write and read but not write to save several ways refusal; application management, prohibit running specified procedures, such as the prohibition to run QQ, prohibit running Thunder, prohibit running MSN, prohibit running specific games and so on; when employees leave, you can disable the file on his own computer, as well as any encrypted files on the network access to the computer to read or delete. The client runtime process management, at any time to view the client running. Solve the problem: Prohibits mobile storage, reducing virus and resource leaks; · prevent staff time using illegal procedures to prevent employees do private, then private living; · Detailed file access mechanisms, file access permissions are controlled by my master; * Application Management, prohibit running the specified program; · former employee management, to prevent vandalism, and delete. The documents made program: As the saying goes, "turning back." Use excellent shield outgoing packaging tools, you can control the outgoing file read privileges. Including open password, the expiration date files, whether you need to specify the recipient's computer, whether to allow print, whether to allow the screenshots and more. If the outgoing internal documents, but have to be strictly controlled outgoing documents, do not have any communication, by authorizing the corresponding file, the control computer can open the ciphertext. File authorization can only be opened after the specified computer. You can set the time limit, whether to allow printing. Password setting, time limit, the number of restrictions, binding the hardware, copy control, screen shots, control, printing control, no file format limitations. Read mode can do to limit outgoing documents, which including limiting the number of open, restricted only in a predetermined period of time can be opened only limit on a single computer to open, and set passwords. This makes it easy, flexible control over outgoing documents, while information sharing, it is possible to prevent unauthorized data reads, outgoing documents to prevent secondary spread, to ensure information security. Offline programs: such as internal staff need to bring a laptop out of a local area network (business or home to view the encrypted document), you can use the excellent shield offline strategy (customer valid properties). Offline strategy requires the administrator to set the administrator set up later, or offline import file can be imported. And offline strategies can be flexibly set time and days off, so that facilitate the employees outside the office while also effectively ensure the security of the document. You can also use the dongle to work offline, offline dongle can decrypt the file set, you can set permissions dongle dongle use see: How to make the encryption device? Dongle features! System workflow: Excellent shield information security management software works as follows: ? System Administrator through excellent management side shield tailored for each end-user file encryption policy, security policy and special privileges; · When terminal starts from obtaining the corresponding server security policy and key, when a file security policy within the scope of protection to be stored, the client will automatically be encrypted (while whether to open a plain text or cipher text) is read legal process, users do not change the original Some workflow and document usage; - confidential documents in use, the client will conduct process monitoring user operation; ? System has a powerful self-protection function, any malicious terminate, withdraw or uninstall the client program's behavior will be in vain; · After reinstall the system, the file remains on the computer is encrypted, and only after reinstall excellent shield clients to open these encrypted files again. Multi-OS encryption management: system support: Windows 8, Windows 7, Windows XP, Vista, 2003,2000 if you are interested in this product can contact us, we will provide you with a detailed description of the product documentation and trial CD. Tianjin high and Technology Co., Ltd. gifted Shield software encryption Sales Hotline: 022--27550713 15522518472 Contact: Miss Liu E-mail: info@yoodon.com QQ: 625810313 Homepage: http: //www.yoodon.com/ Company Address: Tianjin Heping District, Fu'an Street Jinmao Plaza, Room 1713, Building 4, excellent shield enterprise encryption security management system that uses low-level driver memory double buffering transparent encryption technology, completely without changing the original enterprise workflow and document usage of the premise, to critical data files within the enterprise to exercise control and enforce encryption protection, effectively prevent passive and active leakage. Excellent shield for drawings encryption software, encryption support a variety of file types, leaked documents from the source to prevent and solve the foreign thief treatment, home thief difficult to prevent the management of the situation. Excellent shield intelligent information leakage prevention system uses low-level driver transparent encryption technology, in full without changing the original enterprise workflow and document usage of the premise of critical data files within the enterprise to monitor and enforce the implementation of encryption protection, effectively prevent passive and proactive disclosure.
Contact Detail
Company Name: | Tianjin high and Technology Co., Ltd. |
---|---|
Employee Number: | |
Annual export: | |
Year Established: | |
Contact Person: | Mr. Miss Liu() |
Telephone Number: | 022-27550713 |
Company Address: | Peace, , Tianjin, China |
Zip/Postal Code: |
Find More Related Products
- Firewall or waterproof wall..
- Binzhou Jining Huawei lates..
- Zhongshan Coin Stamp quick ..
- One hundred million Gitzo f..
- One hundred million Gitzo i..
- FORTINETFortiGate50B Fortin..
- Nanjing car rental provider..
- Supply of Guangxi factory o..
- Huawei's next-generation fi..
- Jining Jining Linyi Huawei ..
- Huawei's next-generation fi..
- Lightweight honeycomb panel..
- Beijing reasonable lightwei..
- Used equipment for recyclin..
- Qingdao three public proxy ..
- Stall 4G portable wireless ..
- New products wander stall p..
- Firewall log analysis softw..
- Zhaoqing water trap company
- Fuzhou Environmental wallpa..
- Anti-phishing data encrypti..