|
|
Digital information security platform system feature:
• Complete Security Turn Key System.
• End User File Security.
• Keeps original file reading behavior.
• File security synchronization control.
• Printing Management.
• Web Interface Central Management.
• International security standard.
• Complete security turn key system:
Centering with file security mastering, each sub-system of the Waha platform includes organization security maintenance, security rule management, system environment safety, communication security, access controlling system, automatic security detection, synchronizing Client/Server controlling system, security file batch maker, central web interface management system, risk call-back, remote online/offline smart system, printing control, bottom layer encryption, hardware security detection, automatic recording & monitoring, floating random digital signature, and application program security detection.
• End User File Security :
With a great management of server, user-end bottom layer and application layer technology and behavior mode monitoring, it totally prevents data revealing, maintains file security for example: against deliberate breakage, API Hook, Trojan horse?spy program, online transmission: Email & Ftp access, copy, paste, available numbers of time, seconds, time frame, etc.
• Keeping File Reading Behavior:
With the clear protection system, the security file keeps the same format. There is no need to change the original use behavior.
• Web Interface Central Management:
With secured tele-communication and environment detection (including SSL, CA, Hardware ID recognition, IPsec, etc.), complete and simple web management system, it makes it a lot easier to master and maintain the system for all around file security.
• File security using synchronization management:
Having control of both internal and external security file access: duties managed by security rules, responsible for the whole process of security for executing files or accepting manager synchronized callback/renew/delete command, against illegal security accesses such as HDD, USB, SD-card, etc.; therefore, carried out offline files are protected completely by online management.
• Printing Management:
Effectively prevents files being printed. This function is not only being controlled by security rules, but it also prevents the end user from any form of printing. For example, security policy permitted personnel or printer, etc.
• Web Interface Central Management:
With security telecommunication and environment detection, which includes SSL, CA, hardware certification, IPsec, etc., applying simple and complete web management to protect and maintain the file security has become a lot easier.
• Accredited for International Security Standard:
FISMA?FIPS200?201?SP800?RBAC?BS7799
|