Welcome To b2b168.com, Join Free | Sign In
中文(简体) |
中文(繁體) |
Francés |Español |Deutsch |Pусский |
| No.13700647

- Product Categories
- Friendly Links
Information Name: | Suzhou Wenham Germany Drawing secure encryption system |
Published: | 2015-04-15 |
Validity: | 1000 |
Specifications: | |
Quantity: | 1000.00 |
Price Description: | |
Detailed Product Description: | Suzhou Wei Hudson Drawing security encryption system of modern enterprise has entered the era of electronic office, internal leaks core business of electronic data, external theft, malicious removal, disorderly management, storage has become a senior disaster management confusion, electronic data order management, centralized storage, security, permissions management and control has become the consensus of many mainstream companies. ● The importance of data security - According to the survey, corporate secrets leaked by 30% -40% is caused by leakage of electronic documents - Former Fortune Rank Company 1, 1,000, each electronic document leaked average loss is $ 500,000. - domestic 500 large enterprises protected against electronic document security issues than 3% ● electronic map document - internal employee turnover, quit the confidential documents to the rival company! - Competitors use hacking techniques theft of confidential data! - Storage devices (U disk, CD, laptop, hard drive) is lost or stolen, the data is open! ● WEHAND Drawing security encryption solutions by WEHAND to load the Windows kernel, you can monitor all related documents to read and write, printer output and data communications, and other Windows implementation process, and thus to control unauthorized access to, and sensitive data Real-time encryption. WEHAND innovative file protection security policies and achieve real-time protection map document file. Starting point WEHAND security policy has not been brought out by preventing the file; but to do anybody any way out of the file is in a protected state, but also can not be used, it is not afraid of the file is illegal to steal. Specifically WEHAND by ensuring that electronic documents from creation to open, edit, browse, save, delete transmission until the entire life cycle is always in the protection of the state, any person (including the creator of the file and the legitimate user) always reach files unprotected, so that no one can take away the effect of non-protected files safe. Because everything invasion via e-mail, network, means a removable storage device (floppy disk, U disk, laptop, etc.), Bluetooth devices, infrared devices, such as stealing Trojans are only protected files, and these files out of the enterprise the computer will not work properly. ● The system features an advanced encryption technology: commercial encryption algorithm uses advanced encryption algorithm AES, 256-bit key length. AES encryption algorithm with a safe, fast operation characteristics, are widely used in high security classification requirements of military, commercial data encryption. The system uses Windows underlying transparent encryption technology for drawing any format (Office / Image / 2D / 3D / EDA, etc.) can be carried out in real-time force encryption; plus too close after drawings or documents, without the company's permission, either any form of U disk, mobile hard disk, email, etc. leaked out, will be a bunch of gibberish, not open. 2, flexible policy definition: according to different people, departments, organizations define different encryption policy, the encryption policy includes a file format definition strategy, print control strategy, screenshots replication strategy, backup strategy, group policies, security classification strategy, tactics offline ; enterprises can easily according to their needs the flexibility to define strategies for their management needs, such as adding a special file in an encrypted format, print control definition screenshots, the notebook offline management strategy definitions. 3, super backup disaster recovery: drawings and documents can be generated by the client to force an automatic backup, the client without any user interface, backstage mandatory automatic backup, file backup can backup cycle in accordance with the time, you can also follow different backup version, you can also choose incremental backups to maximize the protection of the integrity of the file, does not affect the network speed; prevent sudden power failure, and other factors have led to the loss of precious accidentally deleted files, or delete files on staff turnover malicious or format the hard disk caused loss of electronic information company. 4, print screenshots and other control: The graphic information taken in the application save, copy, cut, print, any unsafe operation may leak screenshots, videos, etc., shall be decrypted before being effective; prevents unauthorized users from copying, Paste important documents, and leaks through E-mail, MSN, QQ, USB and other means. 5, the perfect stable integration: with the operating system, antivirus software, PDM, ERP, OA and other systems for seamless integration and stable operation perfect; not affect the customer's other systems management and operation, security and encryption software to manage customer perfectly integrated, stable operation. 6 practical role authorization: different roles within the enterprise can view different security classification file, if drawing different departments can not be shared among enterprises, but also can be controlled through role; different departments can be done in accordance with the role of internal secrecy classification measures. For example: Managers can modify and view the employee's documents, but employees can not view the document manager. 7, standardized management decryption: decryption can be divided manually decrypt the encrypted center, set up credible mailbox decrypt decrypt multi-level approval process (and domain users can integrate): superuser and decrypt user privilege separation, separation of auditing and decryption authority, decryption key to decrypt the password and authorization isolated authorized to install serial number and authorization key decryption separation; customers can choose different ways of combining the decryption key ways and according to different management needs, easy to use decryption process operation. 8, automatic scanning encryption: After installing encryption software without manual to set the scanning strategy and wait for the scan results directly scan in the background, without any client interface and perceived. Save a lot of time scanning encrypted, and can prevent people stop scanning action is in part a result of the scanning process is not scan encrypted files. 9, automatic scanning backup: After installing encryption software without having to manually set the backup strategy and wait for the results of the backup directly scan in the background to automatically backup data to prevent excessive queuing orderly client automatically backup data. And can set the time to repeat the relevant scan, to maximize the complete enterprise file backup. Previous practice is only open file backup, so there will be a large number of files will not be backed up in a short time, but a lot of people will go out and copy the file to delete computer files to the enterprise losses. ● Support applications and document formats - Microsoft OFFICE Series: WORD, EXCEL, POWERPOINT, PDF, other; - two-dimensional design software: AUTOCAD, other; - three-dimensional engineering software: SOLIDWORKS, SOLID EDGE, Pro / E, UG, CATIA, other; - Graphic Design: PHOTOSHOP, CORELDRAW, other; - electronic CAD class: PROTEL DXP, MENTOR, other. ● System Highlights: underlying driver: The original bottom-driven techniques to ensure that all files on the windows completely encrypted; rock solid: the system is stable, after 3000 users, 100,000 units of installed capacity; free space: Running does not affect the user habits, not affect the computer speed; inclusive: has an excellent system compatibility, can be a good OA, PDM / PLM systems are compatible with the internal management system, such as. Wehand in the industry first proposed the "focus of massive data technology" business position, and quickly complete the layout of the data in the technology industry chain, to provide users with data security, data integration, data services, data storage, content management, data backup, data . disaster recovery, data analysis, data mining and other customized solutions for data technology company specialized technical experts for your massive data Q QQ: 951143788 Micro Signal: wehand2007 website: http://www.wehand.cn Company: Suzhou Wenham Electronics Technology Co., public concern number: wehand2011 more information, please sweep swept away! |
Admin>>>
You are the 9499 visitor
Copyright © GuangDong ICP No. 10089450, Wenham Suzhou Electronics Technology Co., Ltd. All rights reserved.
Technical support: ShenZhen AllWays Technology Development Co., Ltd.
AllSources Network's Disclaimer: The legitimacy of the enterprise information does not undertake any guarantee responsibility
You are the 9499 visitor
Copyright © GuangDong ICP No. 10089450, Wenham Suzhou Electronics Technology Co., Ltd. All rights reserved.
Technical support: ShenZhen AllWays Technology Development Co., Ltd.
AllSources Network's Disclaimer: The legitimacy of the enterprise information does not undertake any guarantee responsibility