• Organization and Personnel Security
Organize authorization and personnel certification to follow PIV-I standard and list as an important item in the security check list.
• Environment Security
Start up the driver security detection program before using every file, and enhance the application of SP800-53, to assure the system and internet to be under a secure environment to detect and protect every file.
• Rule Security
Servers are collected and managed to ensure the security.
• Encryption Security
Follow AES standard, with bottom layer encryption to keep the original files’ using behavior.
• Web Management Interface
It is faster, easier and more convenient for the organizer to fulfill total security.
• Data Security
Follow SHA256?SHA512 & AES Standards.
|