Through the above analysis, we generally understand your company's internal needs and problems, but also generally clear, your company hopes to be able to achieve the goal of data leakage prevention through electronic document protection system.
At present, the hacker software prevails, the traditional port management, Internet behavior management, mobile storage, access control firewall has been unable to meet the requirements of modern enterprise, we believe that the iron rolling electronic document security system is very consistent with the electronic document protection system of the company business needs, from the source control, to meet the needs of almost 100%.
The iron volume electronic document security system enables all important documents to be stored in ciphertext state. For illegal information, it is only encrypted garbled files, to ensure that the data, no matter when, where, under what state are in a safe state. That is to say: no matter how you take the document out of any way, without the authorization of a certain company, open these documents will only see a pile of garbled.
These are very important for certain company business software are under protection of iron volume, save, save, export and other functions output documents are mandatory encryption, other software can not open, can not open the company from the environment. Really guarantee your document security.
How users originally used documents, and now still how to use the document, no need to manually decrypt the document and then open a series of tedious operations. There is no need to use a dedicated reader to open encrypted documents, nor will it restrict the menus in Auto CAD software to cause any inconvenience to the user.
The server interface is simple and elegant, administrators do not even need to read the manual, you can easily start, the enterprise confidential documents management in good order.
The iron coil client is simple to install and has no installation interface. It is very suitable for push, Active, X and other installation methods of the domain. Client supports remote management and upgrade of server.
The iron coil is encrypted and decrypted at the bottom of the system, and is hardly coupled with the upper application system. That is to say: the output file to save hard disk when the upper application system, data encryption and control of the iron roll; when the upper application system need to open the message file, the iron will be the first to be decrypted and then transmitted to the data application system layer. Everything is done automatically, and all you have to do is to import the application's strategy into the protection process of the iron coil. As a terminal security product, the iron coil is compatible with a variety of popular operating systems and applications:
For laptops that need to be removed from the corporate network, you can secure the travel needs and the safety of your laptop through offline authorization or USB mode.
Outgoing documents must be reviewed and licensed. For outgoing documents, there is backup on the company's server;
At the same time, files sent outside can be set life cycle, expired, destroyed, and the number of open, the use of passwords, whether to allow printing, etc..
Email:hyzulin @ yeah.net
Website：http: // www.squeakystroller.com