Ways of
dissemination
Supplier
Platform
Reader/
Install DVC
Open file for USB authentication
supervisor
decryption
Improper outflow
cannot be opened
Audit Supervisor Declassified
Research Director
DVC automatic audit
Open/encrypt file
R&D/Drawing
Smart Encryption /
Encryption Slot
Business/Finance
Upload decryption/
download encryption
NAS encryption
and decryption
Documentation
Specific site
management
Folder
permission control
File Situation Room and Alarm System
different permissions
Prohibition of circulation
R & D agent
DVCBackup
Mass copy/delete
Alarm system
desktop watermark
Features:
Complete confidential business management
While using commercial secrets, through the management of the process, the risk of leaks caused by users' illegal operations can be effectively reduced.
Trade secret security protection
Through the protection of the entire life cycle of commercial secrets through file encryption technology, the risk of commercial secret leakage is effectively reduced.
Trade secrets are not relaxed
Through flexible encryption technology and outgoing platform security technology, the diversification and fragmentation of business secrets are managed uniformly and effectively, effectively protecting the risk of leakage of business secrets caused by loss.
User behavior can be traced
Detect internal enterprise risk threats, which can easily detect and predict potential damage, data theft or related abnormal user behavior.