Worried about how to quickly encrypt sensitive data on your personal computer?
Select... [Encrypt after scanning], and encrypt the file name and sub-file name you specified in the background at a speed of 20G~50G per minute for encryption protection.
Employees are about to leave, how to quickly decrypt the sensitive data on the personal computer?
Select...[Decrypt after scanning], and encrypt the file name and sub-file name you specified in the background at a speed of 20G~50G per minute for decryption protection.
Encryption Slot/Decryption Slot
Designate multiple network folders as encrypted slots, the files inside will remain encrypted, and only the supervisor can decrypt them
Make sure that sensitive data in this folder remains encrypted. Cannot be used by outsiders.
backup mechanism
After the employee leaves the company, all the hard work invested by the boss is taken away by the employee. Have you ever thought about backing up the files on the personal computer to FTP storage every day through the DVC backup mechanism?
Prevent resignation without leaving documents
Files cannot be quickly recovered after preventing hijacking software attacks
Prevent computer hardware damage
The most effective remedies to prevent file loss in various circumstances
controlled software
Are you still worried that the software used by the company is too special to be encrypted?
DVC built-in up to 400 common software types
custom software
DVC allows MIS to customize software and file formats, without relying on the original factory and paying
Upload web page decryption
The biggest weakness of the encryption system is the inability to upload webpages for decryption
It will cause each file to be decrypted by the supervisor, which is a waste of time
The encryption and decryption function of the DVC website is capable of uploading and decrypting. As long as the network domain is correct, there is no need to find a supervisor to decrypt and then upload the file to the website.
Encrypted file sub-rights management
1. The company installs DVC, and the boss wants to limit the RD data to RD only.
When DVC encrypts files, it will automatically bring in applications that can be opened by anyone, subdivided into [read-only] [no printing] [open time], for you to use freely.
Employee offline file control
DVC offline control file enable function
When the computer is disconnected from the main console, the number of minutes is not set, which means that the encrypted files and protection functions will take effect even if the employees are offline.
When the computer is disconnected from the main console and connected, if it is set to 20,000 minutes, it means that employees can only open encrypted texts for about two weeks when they are offline [or on a business trip].
Of course, it can also prevent files from being opened and used by interested people after the laptop is lost.
Audit authority agent
Audit supervisor is often out of office
DVC has designed an automatic agent mechanism,
Let the applicants send the application notice as well,
But [agent] handles the decryption application.
How an Employee Can Request Declassification from a Supervisor
Encrypted files can be opened and edited inside.
If an external vendor needs this file, you can find a supervisor or agent to decrypt it
Application for decryption report
Where the applicant applies for declassification, the supervisor agrees. The time, document, and consent are all recorded in detail
read online
The new external control technology [online reading] means that the manufacturer receives a set of URL links, you only need to make sure that the URL you copied is correct, and the external manufacturer can open the file online. Of course, to maintain the excellent lineage of DVC, there are still multiple control items such as time, frequency, watermark, and password, and it is super simple.
Online reading URL
External manufacturers directly click on the URL to support PCs, mobile phones and other devices.
Direct online reading, the implementation of documents and archives does not land.
mail white list
If this vendor has been cooperating with you for many years, even as a source of technology, do you still need to protect this vendor?
Therefore, DVC has designed a [Mail Whitelist], which will automatically decrypt when it is sent to this manufacturer
Client Report Statistics
Record DVC users' decryption, opening, copying, printing, renaming, deleting files, and other related actions.
host integrity
DVC host has
Install on the fly
Synchronize and backup organizational policies with AD on a regular basis
Host disconnection does not affect user use
Waiting for three major features
AD同步
After installing the DVC main console, by synchronizing AD regularly, you can ensure that the registered users are consistent with AD
And by regularly backing up organizations and policies, it is ensured that users will not be affected and users can be quickly restored when a disaster occurs.
Watermark
Let encrypted files be prohibited from being "copied to non-encrypted files" and "prohibited screenshot function", but if you are still worried about the file being opened arbitrarily to take pictures, there are two methods of watermark printing display and screen display to provide you with more advanced Protect
desktop watermark
Make every page important, full of safety, no need to worry
DVC not only has printing watermarks and screen watermarks, but also adds desktop watermarks in the new version 6.0.
DVC alarm system
Details, nothing to hide. Give more power to management
The client has reached various thresholds, and this function cannot be used any more today
mass delete
mass copy
Bulk Copy USB
mass printing
Lots of decryption...
DVC USB client
Encrypted external communication, more convenient, smarter and faster communication
If the external file needs to be edited by the manufacturer in an encrypted state, it is necessary to install the client, DVC’s USB client, so that the client that the manufacturer must install should be changed to a plug-in type, so as to ensure that the manufacturer will not resist and troublesome operation, and ensure that The research and development map has never been decrypted, and it can achieve the characteristics of joint editing.