The company's easy-to-use anti-leakage software.

Tian Rui Green Shield Automatic Intelligent Transparent Encryption Anti-leakage Software System

0 1? Prevent data leakage within the company.

Through dynamic encryption and decryption technology, we can effectively prevent internal data leakage. That is, when employees create and edit documents, they will automatically encrypt and store them on the hard disk to prevent employees from intentionally or unintentionally leaking or maliciously destroying documents.

Management thought >>

● Do not change employee habits, file formats, company network structure, office efficiency, company network and company computer peripheral ports;

●? A similar "user-unknown encrypted network" is formed within the enterprise. Without authorization, employees can't view the data normally, and there is no way.

●? Only with the approval of the company can users access files within the granted permissions;

●? Make the internal documents of the company interact and circulate freely without any influence.

02? Prevent confidential documents from spreading within the company.

Management thought >>

● After obtaining confidential documents, authorized employees must enter the correct password set by licensor when opening them, so as to access confidential documents;

●? After legal identity authentication, authorized employees can only access confidential documents within the given authority;

●? Access control of confidential documents includes: reading times, printing times, screen capture, editing, reading time, prohibition of deletion, expired self-destruction, etc.

03? Prevent employees from leaking secrets when they go out to work.

Management thought >>

Short-term outing: it is convenient for employees to go home at night or at home on weekends to encrypt and decrypt files normally without additional operation.

Going out for a long time: You can work normally outside with your notebook within the specified time limit. After the time limit is exceeded, you will not be able to open the encrypted document.

Go out permanently: For users in branches or offices, you can use permanent offline to ensure that the data between headquarters and branches are encrypted and can be accessed, and you can control the data of branches to prevent leakage.

04? Prevent employees from leaving their jobs and leaking secrets.

Management thought >>

● When employees create or edit important files (such as CAD files and design drawings), the server automatically backs up the important files and saves them in the hidden directory designated by the server, so as to avoid the losses caused to the enterprise by deliberately deleting or formatting the computer when employees leave the company;

●? By transparently encrypting the data on the company's computer, it effectively avoids the behavior of employees who want to take away a lot of important information when they leave their jobs.

05? Prevent documents from being leaked after they are issued.

Frequent information exchange with the outside world has become a necessary business model of the company, and these interactive information may involve the core information of the enterprise, and once it flows out of the enterprise, it will get out of control. In order to solve the worries of foreign business interaction, we provide information release management ideas:

Management thought >>

●? When it is necessary to send files to customers or partners, first apply to the superior leader for delivery, and then have the right to package the files into controlled files and send them to customers and partners;

●? After authorized customers or partners obtain the controlled outgoing documents, they need to be legally authenticated before they can access them within the granted authority;

●? The ways of identity authentication are: password authentication, machine code authentication and networking authentication;

●? Access rights include: reading times, printing, screen capture, editing, reading period, expired self-destruction, recycling, etc.

●? Authorized customers or partners can access this file without installing any plug-ins on their computers.

06? Prevent computer loss and leakage

Today, when computers are widely used, the loss of notebook computers will bring us great trouble. In addition to economic losses, the disclosure of confidential information and personal privacy stored in computers will become another potential threat, which may bring us irreparable losses. The encryption of data ensures that even if the notebook computer is lost, the data stored in the computer will not be leaked.

07? Prevent employees from printing leaks.

Management thought >>

●? Control in advance whether employees can print, which workstation they can print and what type of documents they can print; ?

●? Record the printed contents and provide detailed print log report for audit; ?

●? Provide watermark function, and play the role of anti-counterfeiting.

08? Prevent office leaks of mobile terminals.

Combined with iPad and iPhone, the encrypted data of company server can be accessed online through iPad and iPhone, which improves the office efficiency of company leaders.

09? Avoid the complex environment of the server and prevent the server data from leaking.

Management thought >>

●? When the encrypted data in the company is uploaded to the whitelist server designated by the company, the data will be automatically decrypted into plaintext and stored on the server;

●? When employees download plaintext data from the server to the internal terminal of the company, the data is automatically encrypted to avoid data leakage;

●? When employees access the data on the company server online outside the company, they can access it normally;

●? When employees download plaintext data from servers outside the company, they are automatically prohibited from downloading to avoid leaking plaintext data after downloading.

10? Desktop management reduces the risk of leakage.

Management thought >>

● Standardized management of terminal hardware: standardized management of USB flash drives, recorders and printers.

●? Standardized management of terminal software use: stipulate which software should be installed uniformly in computers of different departments of the enterprise, and prohibit the installation of all other software;

●? Standardized management of employees' online behavior: standardized management of employees' online behavior;

●? After standardized management of the software and hardware environment and online behavior of employees' terminals, employees can subtly develop good work habits, improve confidentiality awareness and office efficiency, and reduce the risk of data leakage.

Finally realized >>

●? Standardize the management of employees' software and hardware environment and network behavior, so that employees can develop good work habits, improve their sense of confidentiality and reduce the risk of leakage;

●? After transparent encryption of internal files, the existing working mode and operating habits are not changed, the file format is not changed, and the network and peripheral ports are not closed, thus ensuring office efficiency, realizing data leakage prevention management, and forming a management effect of "blocking outside and blocking inside";

●? Without the authorization of the company, data cannot be accessed normally without the company. Access can only be made within the scope of authority granted by the company after approval by legal procedures;

●? Supervise, track and record all the operations of all employees throughout the process, and trace the whole process of leakage in real time.

Shenzhen Derenhe Technology Co., Ltd. provides software system and technical support.