• Synchronization Control System
Compatible with LINUX, MS and the user to ensure system security and
application flexibility.
• Membership
Provides the membership of email and non-email accounts for the users to
increase the value of business management.
• Hardware Security ID System
Allows the hardware environment of both system and user end to confirm the accuracy and security of data access through MAC?CPU?IP.. series number confirmation and enhance the standardization of Ipsec.
• Auto Audit System
During the whole protection process, including audit organization, environment, system, rules, external attack, of any data, check point in each step to ensure the data safety and accuracy, as well as prevention of confidential file leakage by internal staff.
• Access Control
Starting from the user entering the access system to get the authorization key, exchange, to detect the data transmission access policy, it is all in the system, following the procedure standard of FIPS 200?201.
• VPN
VPN is used to separate the enterprise internal and external organization.
• Floating Digital Signature
Each file in the system is using a1024 bytes random digit signature, following
the international standard of DDS & FIPS 186-2 to be the data security mark.
• File Certification System
Auto-match Standard PKI with floating digit signature to reach the security \purpose centered with files, following International Key Management & RBAC \Standard.
• File or batch Maker
• Audit Smart
Including auditing records of data producing, rules, access, execution,
following NIST Log Management.
• Data Security Access Smart
Following FIPS-approved Hash Security Standard.
|