Ways of
dissemination


Supplier
Platform
Reader/
Install DVC
.png)
Open file for USB authentication

supervisor
decryption

Improper outflow
cannot be opened
Audit Supervisor Declassified

Research Director


DVC automatic audit
Open/encrypt file

R&D/Drawing

.png)
Smart Encryption /
Encryption Slot

Business/Finance


Upload decryption/
download encryption
NAS encryption
and decryption
Documentation


Specific site
management
Folder
permission control

File Situation Room and Alarm System
different permissions
Prohibition of circulation
R & D agent

DVCBackup
.png)
Mass copy/delete
Alarm system

desktop watermark
Features:
Complete confidential business management
While using commercial secrets, through the management of the process, the risk of leaks caused by users' illegal operations can be effectively reduced.
Trade secret security protection
Through the protection of the entire life cycle of commercial secrets through file encryption technology, the risk of commercial secret leakage is effectively reduced.
Trade secrets are not relaxed
Through flexible encryption technology and outgoing platform security technology, the diversification and fragmentation of business secrets are managed uniformly and effectively, effectively protecting the risk of leakage of business secrets caused by loss.
User behavior can be traced
Detect internal enterprise risk threats, which can easily detect and predict potential damage, data theft or related abnormal user behavior.