User: Password:
   Keep me logged in.
Register  |  I forgot my password

Login  |  Register

Universal Directory / Article Details
RSS Feed
Article Details
Centralized Control
Date Added: April 14, 2018 05:17:08 PM
Author: Zora Legg
Category: Arts & Humanities: Reference
product description: Bo Ruiqin electronic document leak prevention management system - centralized management and control version, is a data security management system based on cloud computing architecture, the system supports centralized storage of client controlled data, divided into two centralized storage modes: client initiative The centralized centralized storage and centralized storage of the system are centralized. The centrally stored data is processed through high-intensity encryption, which ensures the security and ease of management of the data. Bo Ruiqin electronic document anti-leakage management system is based on the Windows operating system, using virtualization technology to build a new safe working environment to ensure that all data is absolutely safe. Synchronization in design leading international technology, computing locally stored on the server, to \u0026 ldquo; end was sealed with leaving no adhesion \u0026 rdquo; effect, to ensure that the data from the generation, storage, access, destroying other lifecycle dynamic encryption management . The classified data stores centralized output, blocks all possible leaks on the various terminal computers, and all file operations have detailed operation records to ensure the core data will be audited in the future. feature of product: Provide a perspective safe working environment The Borui anti-leakage system creates a new 'secure desktop' on the client's original operating system for users to use. The secure desktop is the core part of Borrei's diligence system. Working on secure desktops can prevent users from leaking important data through various means. It can also effectively prevent illegal users from multiple intrusions. The secure desktop includes the following features: 1)\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;Verification of software legality The system policy defines a list of software that is allowed to run within the secure desktop. Only the usb backup recovery software listed in the list can be run on the secure desktop, ensuring the legality of software programs running on the secure desktop of the client system. 2)\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;Software Behavior Control The Bertrand system prevents the applications on the secure desktop from writing data outside the secure desktop. This ensures that controlled files are always in a secure environment without authorization. 3)\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;Clipboard protection Operations such as copy, paste, drag, and save as are all available within the secure desktop, but the contents of the clipboard cannot be saved outside the secure desktop. This preserves the user's original operating habits and ensures data security. 4)\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;Preventing Multiple Hacking Actions The Bertrand anti-leakage system was strictly isolated at the core layer of the operating system, blocking the interaction between the safe working environment and the general environment (such as clipboard sharing data, etc.), effective protection screen capture, video recording, window retrieval, COM Leakage activities such as /OLE, memory dump, etc., to prevent loss of confidentiality caused by hacker attacks and active leaks by insiders. 5)\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;Network Access Control The Borui anti-leakage system controls the network access behavior of the running program on the client's secure desktop, restricting access to the network's IP address, port, and half so on. 6)\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;Network Security Transmission In the secure desktop, the transmission between the user and user, user and document server, and the application server protected by the Borrei anti-leakage system is encrypted to prevent interception of the transmitted information through the network sniffing. 7)\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;Preventing illegal computer access The application system server controlled by Borei's diligence system, such as the financial system server, can only be accessed by the user after logging in to the secure desktop of the Borei anti-disclosure client system. For computers that are externally brought in, even if they know the application system The login password is also unable to connect to the protected application and cannot obtain any important data. 8)\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;Print Control Open or disable the printing function of the client, and can restrict the name of the printer and effectively control the printing of documents within the management enterprise/organization.

Booking.com

  • Booking.com