Welcome To b2b168.com, Join Free | Sign In
中文(简体) |
中文(繁體) |
Francés |Español |Deutsch |Pусский |
| No.8851020

- Product Categories
- Friendly Links
Information Name: | Supply billion Race transparent Minga decryption software SmartSec |
Published: | 2012-04-06 |
Validity: | 0 |
Specifications: | |
Quantity: | 100.00 |
Price Description: | |
Detailed Product Description: | Document transparent encryption system Product Overview At present, data security companies are most concerned about an important topic. The large number of enterprises confidential data are in the form of electronic document exists, its mode of transmission is varied. Promote the process of enterprise information to rapid development of the Internet era, but also to confidential corporate data at great risk, to protect confidential data and sensitive information from malicious or accidental disclosure, is one of the biggest security issues facing enterprises today . Million race through SmartSec (Document transparent encryption system) is a powerful and easy-to-use file encryption software products, the system uses the driver-level transparent dynamic encryption and decryption technology "to specify the types of files in real time, mandatory, transparent encryption and decryption . In normal use, the files in the computer memory is protected in clear text storage, but the data stored on the hard disk in encrypted state, if there is no legitimate use of identity, access rights and the right of safe passage, all encrypted files will be save the state of the ciphertext. SmartSec system is stable and reliable, and have good scalability, while meeting the other enterprise application system document encryption needs, and effectively prevent data loss or disclosure of, and contribute to deeper and more comprehensive implementation of the Data Protection to ensure that confidential corporate data high security. Range of applications SmartSec widely used in government departments, military, software development, telecommunications, machinery manufacturing, electronics, electrical and Design Institute and other industries. In particular, application in software development and professional design industry has formed a monopoly, has many success stories. Features Intelligent transparent encryption The system adopts the international advanced high-strength encryption algorithm for document encryption, transparent encryption and decryption process intelligence, does not change the user's operating habits, do not change the original format of the information and status. The same time, the system also has a rigorous process of signature mechanism, able to accurately identify unauthorized illegal process, greatly reducing the risk of data leakage. Superior Document Protection Normal users can open the document after being forced encryption, only to have the same key. To fine grained control of users to copy and paste the content of the document, copy the screen drag and drop, print Save to steal the document information will be garbled presented in the form; did not have the same key, the document is opened, regardless of what kind of illegal pathway are unable to read the document content. Document safe circulation The encrypted document normal use within the department, to flow between different departments, you need to make use of SmartSec circulation tool. Through the conversion of the document encryption key, the encrypted document can be achieved between the corporate sector security circulation, at the same time meet the enterprise need to protect the security of data. Terminal Offline Office The system can be set through the server terminal is offline, terminal proposed offline for a while offline, after administrator approval to offline use. Administrators have the flexibility to set the terminal off the time limit, the terminal after the Offline exceed the prescribed time limit need to continue using the administrators caught with the same code can be used to complete the offline stoppage time. Business approval process SmartSec have the perfect business application approval process, including document decryption, the terminal is offline, the client uninstall, can significantly improve the efficiency of enterprises. Working modes The system allows a specific user in a specific period of time "work mode" and "personal mode" switch in the personal mode, the system will enter a freeze, stop a Shaver decryption control behavior. This feature improves system flexibility and availability, and be able to provide effective support for home office or casual overtime. Product advantages Good compatibility System has good compatibility and seamless integration with enterprise work domain, support for user information is automatically synchronized. And the system is compatible with the current mainstream operating systems and antivirus software, to support the encryption of all file formats, to facilitate the subsequent demand for upgrades and application development. System configuration will be able to meet all application requirements of the enterprise, with strong scalability and provide a strong guarantee for the safety of the individual needs of the enterprise just by the simple strategy. A high degree of security Security, the system uses the drive-level terminal protection technology, the installation directory to the terminal program, permanent process and registry security protection against vandalism terminal operation and maintenance services, and configuration environment. Uninstall of the client must pass a rigorous certification process, once the user through illegal means to force the removal or termination of the client, encrypted terminal driver will be automatically transferred to the safe self-protection mode, the system enters the state of security only encryption, decryption, and effective in ensuring storage and use of security of all encrypted documents. Flexible policy configuration The system is equipped with a powerful strategy library, the user can edit according to business needs, policy configuration is quite flexible and simple, the actual situation of the different departments of companies can pin configuration specific security policy, diverse mix of strategies allows companies to have more in the policy configuration choice to meet the security needs of different departments. Powerful security System with hot standby feature, if the server fails to stop running, the backup server can immediately take over the system also has a disaster recovery mechanism that can effectively deal with the various special circumstances that may arise, the maximum degree of protection system is stable and reliable operation. Log audit All users (including administrators) take any action, the system will automatically monitor, track and record through the audit function of the log, the administrator can view at any time the system operation, the ability to detect abnormal operating radically reduce data leakage risk. |
Admin>>>
You are the 4910 visitor
Copyright © GuangDong ICP No. 10089450, Suzhou De Sike IT Co., Ltd. All rights reserved.
Technical support: ShenZhen AllWays Technology Development Co., Ltd.
AllSources Network's Disclaimer: The legitimacy of the enterprise information does not undertake any guarantee responsibility
You are the 4910 visitor
Copyright © GuangDong ICP No. 10089450, Suzhou De Sike IT Co., Ltd. All rights reserved.
Technical support: ShenZhen AllWays Technology Development Co., Ltd.
AllSources Network's Disclaimer: The legitimacy of the enterprise information does not undertake any guarantee responsibility