1. Document encryption
Transparent document encryption can be used to encrypt common office document types in computers. When you open the encrypted document, the file will be automatically encrypted, and the encrypted file can only be used in the current LAN. The encrypted file to be sent needs to be submitted to the management terminal for approval. Files can only be issued after approval, and files issued without management approval are garbled after opening.
2. Document output routing management
With document security, you can manage various ways to send files. For example, you can select chat programs, e-mail clients and browsers among files that prohibit the following programs from sending files, and you can also customize the process of programs to restrict employees from sending files in multiple ways.
3. Restrict outgoing documents of web pages
In website access control, you can restrict the use of outgoing files of web pages according to the following websites that are forbidden and only allowed, and you can customize which pages employees are forbidden or allowed to visit, which can not only restrict outgoing files, but also effectively manage employees' online behavior.
4. Restrict programs from sending documents
In the black-and-white list of programs controlled by application, you can choose to prohibit the use of the following programs, and only allow the use of the following programs. You can prohibit employees from using programs that send or upload files on their own computers, and you can also prohibit employees from using programs that send files and manage employees' use of applications on their own computers.
5. Restrict sending files by email
The outgoing mail can be controlled by mail sending control, and the body content, sender and recipient of the mail can be restricted by matching rules that prohibit mail sending. In addition, you can prohibit sending email attachments, limit the type of mailbox, or specify an address where only emails are allowed.