Please select the lauguage you need: Contact us
Powerful File Rules Callback and Change
File Displaying Runtime Management
Copy / Print Protection / License Control
Online Authentication / Monitoring
Defeat API Hook / Against Most Debuggers
PKI Featuring up to 1024 bit Public Key
SSL & CA Online Security Data Transfer
Run Time Encryption/Decryption
Defeat Reverse Engineering.........more
Waha 3/4 editon
Waha Home edition
Waha SoHo edition

Waha Digital Security Plat...
Basic Structure
System benefit
System Function
System Smart
Management Functions
Terminal Function

Enterprise System Smart

• Synchronization Control System
Compatible with LINUX, MS and the user to ensure system security and
application flexibility.

• Membership
Provides the membership of email and non-email accounts for the users to
increase the value of business management.

• Hardware Security ID System
Allows the hardware environment of both system and user end to confirm the accuracy and security of data access through MAC?CPU?IP.. series number confirmation and enhance the standardization of Ipsec.

• Auto Audit System
During the whole protection process, including audit organization, environment, system, rules, external attack, of any data, check point in each step to ensure the data safety and accuracy, as well as prevention of confidential file leakage by internal staff.

• Access Control
Starting from the user entering the access system to get the authorization key, exchange, to detect the data transmission access policy, it is all in the system, following the procedure standard of FIPS 200?201.

VPN is used to separate the enterprise internal and external organization.

• Floating Digital Signature
Each file in the system is using a1024 bytes random digit signature, following
the international standard of DDS & FIPS 186-2 to be the data security mark.

• File Certification System
Auto-match Standard PKI with floating digit signature to reach the security \purpose centered with files, following International Key Management & RBAC \Standard.

• File or batch Maker

• Audit Smart
Including auditing records of data producing, rules, access, execution,
following NIST Log Management.

• Data Security Access Smart
Following FIPS-approved Hash Security Standard.

copyright © 2007 waha Inc. All rights reserved