Please select the lauguage you need: Contact us
Powerful File Rules Callback and Change
File Displaying Runtime Management
Copy / Print Protection / License Control
Online Authentication / Monitoring
Defeat API Hook / Against Most Debuggers
PKI Featuring up to 1024 bit Public Key
SSL & CA Online Security Data Transfer
Run Time Encryption/Decryption
Defeat Reverse Engineering.........more
Waha 3/4 editon
Waha Home edition
Waha SoHo edition

Waha Digital Security Plat...
Basic Structure
System benefit
System Function
System Smart
Management Functions
Terminal Function


Digital information security platform system feature:

• Complete Security Turn Key System.
• End User File Security.
• Keeps original file reading behavior.
• File security synchronization control.
• Printing Management.
• Web Interface Central Management.
• International security standard.

• Complete security turn key system:
Centering with file security mastering, each sub-system of the Waha platform includes organization security maintenance, security rule management, system environment safety, communication security, access controlling system, automatic security detection, synchronizing Client/Server controlling system, security file batch maker, central web interface management system, risk call-back, remote online/offline smart system, printing control, bottom layer encryption, hardware security detection, automatic recording & monitoring, floating random digital signature, and application program security detection.

• End User File Security :
With a great management of server, user-end bottom layer and application layer technology and behavior mode monitoring, it totally prevents data revealing, maintains file security for example: against deliberate breakage, API Hook, Trojan horse?spy program, online transmission: Email & Ftp access, copy, paste, available numbers of time, seconds, time frame, etc.

• Keeping File Reading Behavior:
With the clear protection system, the security file keeps the same format. There is no need to change the original use behavior.

• Web Interface Central Management:
With secured tele-communication and environment detection (including SSL, CA, Hardware ID recognition, IPsec, etc.), complete and simple web management system, it makes it a lot easier to master and maintain the system for all around file security.

• File security using synchronization management:
Having control of both internal and external security file access: duties managed by security rules, responsible for the whole process of security for executing files or accepting manager synchronized callback/renew/delete command, against illegal security accesses such as HDD, USB, SD-card, etc.; therefore, carried out offline files are protected completely by online management.

• Printing Management:
Effectively prevents files being printed. This function is not only being controlled by security rules, but it also prevents the end user from any form of printing. For example, security policy permitted personnel or printer, etc.

• Web Interface Central Management:
With security telecommunication and environment detection, which includes SSL, CA, hardware certification, IPsec, etc., applying simple and complete web management to protect and maintain the file security has become a lot easier.

• Accredited for International Security Standard:

copyright © 2007 waha Inc. All rights reserved