XBM system introduced
It is widely used network technology, trade secrets stored in the computer and network, network security requirements have become increasingly high, the need for effective security measures to protect confidential data. In fact, with the acceleration of enterprise information technology, internal leakage is becoming the largest enterprise data security threats. FBI and CSI survey shows that over 85% of security threats from within, threatening sources including internal unauthorized access, patent information is stolen, the internal staff of financial fraud, virus attacks and hacking, hard drive failures. In China, such as the design is stolen, the key to customer lists and sales data loss incidents common to the enterprise caused great economic losses.
Machine is a technology enterprise management level and management level, good co-organizing network and information security systems to achieve an effective way. Among them, the information security technology development through the use of secure computer network and equipped with the appropriate methods to achieve security products. To ensure its own security and business network security, first of all to have a reliable network, followed have a strong network management and network security management strategies and tools. With the increasing complexity of network applications, network administrators simply knowledge and experience in network management and security management, has been unable to meet the. Therefore, we must use some of the professional anti-leak device within the network to ensure information confidentiality, integrity, availability, controllability.
Key, provided by the equipment for each client a global unique key. Master key to ensure a different customer, even if the key is the same company, other companies still can not read the document.
Multi-segment, cross-VLAN andl VPN
l compatible with many popular anti-virus software
Compatible with 20 kinds of domestic and foreign anti-virus software, including the "Norton, Kaspersky (Kaspersky), McAfee, Rising, Nod32, trends.
completely transparent filel automatic, real-time encryption
Terminal operators in the open file, according to authority, automatic decryption; terminal operators in the new file, edit the file, automatically encrypted. Ensure that the hard disk for storing the ciphertext, without user intervention. These encrypted files, no matter by what means (e-mail, Network Neighborhood, U disk copy, chat transfer), leaked documents are not open.
powerful managementl capabilities
Managers can large or small, each working group to individual-end encryption, and customized management strategy, all the configuration operations can be found in the console in real time.
mobilel encryption solution
Even if the business or operational needs take-notebook for the time being to leave the enterprise environment, can set the information off-line licensing and use of time and the automatic destruction of normal time. Ershi important data is always encrypted, to avoid going intentionally or unintentionally spread.
Staff needs to file the normal take-end, the subject only after a decryption server authentication. And all the decryption operation log is saved on the server, to facilitate future audits and unified view.
l kernel-level file encryption
By file filter driver technology, working in the system kernel. Decryption speed, not break.
fully within the Networkl Management
Sub-module from the product, including screen control module, chat monitoring module, the application management module, ARP firewall, asset management, file encryption and decryption.
Ø Compatibility: good platform compatibility, support for Windows2000, Windows Xp, Windows 2003, Windows Vista, Windows 7 and other operating systems;
operational: Simple, easy toØ use, the administrator view the records at a glance;
Ø Flexibility: do not change the user's operating habits, without using any third-party viewer, customizable development of various file types of encryption;
Security: Enterprise key can beØ changed at any time;
Real-time: real-time behaviorØ of the terminal operator upload, instant viewing, the terminal once the change strategy, with immediate effect.