Home
Products
Anti-phishing data encryption waterproof wall drawing file encryption file security encryption
Anti-phishing data encryption waterproof wall drawing file encryption file security encryption
Anti-phishing data encryption waterproof wall drawing file encryption file security encryption
Excellent shield intelligent anti-leak system information and technology high encryption OF: high and Technology 2010-01-30 0:06:06 Source: Tianjin high and Security Technology Co., Ltd. [font: medium and small] browse 4371 times Abstract: excellent shield intelligent information leak prevention system - professional electronic document encryption - encryption system professional documents _ Tianjin Tianjin enterprise encryption software file encryption _ _ _ drawing document security encryption _ Confidential Tags: excellent anti-leak system documentation shield shield excellent anti-phishing software enterprise excellent encryption software shield Excellent Excellent Shield Shield TM enterprise document security management system mainly uses a unique encryption technology enterprise important to protect the confidential document. Through business critical file data is encrypted, a fundamental effectively protect corporate intellectual property and trade secrets. In data communications and file storage means for rapid development, more frequent movement of persons today, the encrypted file is no longer worry about being copied or rumor, enterprise managers also can no longer order the enterprise technology secrets leak and a headache. Excellent documentation detailed instructions for installing the shield document security management system: supports the proper functioning of the information age is inseparable from information resources, enterprise, including enterprise business business plan, intellectual property, patents, production processes, process formula, drawing program, customers resources as well as a variety of important data, these are the companies invest a lot of manpower, financial and material resources and set all the staff work hard, study hard, great care, long-term accumulated wisdom, is the core competitiveness of enterprises, rapid and healthy development, about the survival and development of enterprises, important information was leaked once companies make enterprises lose their competitive advantage, and even suffered disaster. Thus, the effective protection of internal information security funded without delay, information security core of the core is the effective protection of internal documents related to security, to prevent protected files from being stolen ... 1. System Overview :( shield excellent document encryption system) Description: Excellent shield information security management software is a professional enterprise network security management software, an effective management transparent encryption, internal network within the LAN file will effectively combine the powerful, to meet the different types of business users Information security needs. It consists of the file encryption module, network security management module two parts, can effectively prevent internal information leaks out online and offline, the main features are as follows: First, the file encryption module by optimizing shield information security management software, the system does not change user workflow and document existing usage of the premise of the need to protect the document mandatory encryption, and monitor the entire process using the file effectively prevents passive and active leakage, eliminate internal security risks in the invisible. 1. Force, automatically and transparently encrypted electronic documents, the first author to prevent leakage 2. Set document permissions to read, to prevent unauthorized read the encrypted document 3. The automatic backup, to prevent malicious delete the entire log file operation behavior 4. 5. Effective control transmission channels : equipment limitations (USB storage devices, CD-ROM / software-only or disabled, the printer is disabled); prohibit screenshots, drag and drop; 6. Copy the contents prohibit multiple key management, secure, reliable and flexible 7. offline strategy, facilitate short-term staff to go out, home office or a long business trip, while still preventing leaks 8. online decryption application, after authorizing the executive to decrypt the file sent outside before 9. outgoing document control, you can set the number of outgoing documents to read, read a few days, the need for passwords and other settings ensure the safety of two outgoing documents, preferably within the network management module shield information security management software in addition to file encryption, also it has powerful within the network management function for all surveillance operations after the computer is turned on, to prevent the abuse of computer, to prevent information leaks. (1) file management, directory management (2) Removable Storage Manager, optical drive, U disk, etc. (3) Application Management, specify procedures prohibit running (4) Clients use state management three excellent shield intelligent information leak prevention system: ☆ long as there is confidential information on your company computer, you need to install our products ☆ leading enterprises, network managers, CIOs do you have the following concerns: 〖core staff that will take away confidential business information company it? 〗 〖Your drawings, research, customer records, financial information will be leaked it? 〗 〖Internal information how can you not by email, USB, chat leaked? 〗 〖Hackers breached the firewall will enter the company's computers to steal information? 〗 〖Personnel computer is stolen or lost, the important confidential information on your computer how to not be leaked? 〗 〖Will someone pass important information related to printer company go? 〗 〖Company how important electronic files stored on the computer that was safe? 〗 Conventional solution: install monitoring software, set access permissions, sealed USB port, sensitive sectors prohibit access, does not allow the use of a disk, copying files requested in writing, and ideological education of employees now solutions: Install shield superior intelligence information leak prevention system software, automatically force all the important information on the company's computer encryption encryption process does not require manual operation. Files can only be used on the company's internal computer, whether in any way take away the files on the computer company other than the unauthorized decryption The file could be used. China's first research and development of professional enterprise information security systems - excellent shield intelligent information leak prevention system that can understand your worries print anti-phishing, anti-copy leak, prevent computer theft phishing, anti-hacker to steal information leaks!. Fourth, excellent shield outgoing file security management system: As the saying goes, "turning back." Use excellent shield outgoing packaging tools, but can be controlled outgoing documents read access, including open password, the expiration date files, whether you need to specify the recipient's computer, whether to allow print, whether to allow the screenshots and more. Can support all file formats outgoing control, high-strength encryption algorithm is effective against any illegal hack attack, you can start reading the outgoing files directly to the corresponding application, flexible, using fingerprint technology to prevent file modifications, substitutions and rename ultra vires, password setting, time limit, the number of restrictions, binding the hardware, copy control, screenshots control, print control, no file format restrictions, specified groups, flexible control and then spread. Currently, excellent shield encryption products have been widely used in many fields of manufacturing, advertising, clothing, IC (integrated circuit), software companies, major sites, multimedia design, consulting services, government departments, ships, military, etc., are He was highly evaluated. Are you still worried about the safety of numerous corporate documents it? Excellent shield using the most advanced Windows drivers underlying file filtering technology, the computer itself and peripheral data storage device encryption and decryption strictly controlled by the computer to achieve the underlying operating system. Excellent shield transparent encryption technology, without changing the original business users work habits and workflows case, the specified application and specify the file suffix automatically add the decryption process, without manual input password encryption and decryption. At the same time, through flexible configuration of encryption policies, grouping and classification authority control, fully meet the business-to-file security and management of human dual requirements. The product of the secret file on the client for centralized management of unified authorization, according to users, groups of users different permissions to grant different permissions to different users can have access to the file. Structural principle: excellent shield system architecture simple explanation: Internal (1) the corporate sector can be transparent (no password) to open an encrypted file, the normal interaction. Can not open encrypted files between each other (2) sector. (3) through various channels (mail, U disk, instant messaging, etc.) If there is no outgoing documents through the normal process for authorization to decrypt the recipient opens garbled. You can get permission to view the encrypted shared between (4) sectors. (5) offline computer can still be controlled by encryption. If you are interested in this product can contact us, we will provide you with a detailed description of the product documentation and trial CD. Tianjin high and Technology Co., Ltd. gifted Shield software encryption Sales Hotline: 022--27550713 15522518472 Contact: Miss Liu E-mail: info@yoodon.com QQ: 625810313 Homepage: http: //www.yoodon.com/ Company Address: Tianjin Heping District, Fu'an Street Jinmao Plaza, Room 1713, Building 4, excellent shield enterprise encryption security management system that uses low-level driver memory double buffering transparent encryption technology, completely without changing the original enterprise workflow and document usage of the premise, to critical data files within the enterprise to exercise control and enforce encryption protection, effectively prevent passive and active leakage. Excellent shield for drawings encryption software, encryption support a variety of file types, leaked documents from the source to prevent and solve the foreign thief treatment, home thief difficult to prevent the management of the situation. Excellent shield intelligent information leakage prevention system uses low-level driver transparent encryption technology, in full without changing the original enterprise workflow and document usage of the premise of critical data files within the enterprise to monitor and enforce the implementation of encryption protection, effectively prevent passive and proactive disclosure.
Contact Detail
Company Name: | Tianjin high and Technology Co., Ltd. |
---|---|
Employee Number: | |
Annual export: | |
Year Established: | |
Contact Person: | Mr. Miss Liu() |
Telephone Number: | 022-27550713 |
Company Address: | Peace, , Tianjin, China |
Zip/Postal Code: |
Find More Related Products
- HuaweiAC6605-26-PWR Wireles..
- Cross Fire props Malay swor..
- MAITE-928G through police e..
- Wander stall profits produc..
- Radar Radar Radar network r..
- Crack WPA, WPA2 password is..
- AD Domain Management AD Bul..
- Oracle log analysis log ana..
- 18 call a single system wit..
- Session Border Controller S..
- Cat Power Cat Power manufac..
- Cat Power Cat Power manufac..
- Cat Power Cat Power manufac..
- Cat Power analysis and shar..
- Wan domain name resolution
- Enterprise network marketing
- Weifang Weifang patent appl..
- Jining City, double soft ce..
- Dezhou most professional pa..
- How to double soft certific..
- SFR200-02, QSLA-L20, AF40-N..