What Is an Encryption System?
"File encryption system" refers to the use of computers, network communications, and password encryption technology to encrypt all types of files that need to be encrypted (redhead files, confidential files, meeting minutes, drawings, technical information, financial statements, business data, etc.) to prevent illegal Leaked computer encryption control software.
File encryption system
- This entry lacks an overview map . Supplementing related content makes the entry more complete and can be upgraded quickly. Come on!
- Chinese name
- File encryption system
- Nature
- Computer encryption control software
- Field
- computer system
- Function
- Keep files safe
- "File encryption system" refers to the use of computers, network communications, and password encryption technology to encrypt all types of files that need to be encrypted (redhead files, confidential files, meeting minutes, drawings, technical information, financial statements, business data, etc.) to prevent illegal Leaked computer encryption control software.
- One,
- Encrypts documents generated by specified programs
- Forces encryption of documents edited by the specified program. When users access encrypted documents, they need to connect to the server (online, not offline) and have appropriate access rights. The encryption process is completely transparent and does not affect existing applications and user habits. More access control can be implemented through sharing, offline, and outbound management.
- Leak control
- The applications that open encrypted documents are controlled as follows: printing, memory stealing, dragging, and clipboard, etc. Users cannot actively or passively disclose confidential data.
- Approval management
- Supports shared, offline, and outgoing documents. Administrators can configure whether to force approval of these operations according to actual work requirements. When users perform operations such as sharing, offline, and sending encrypted documents, they will be subject to the permission of the administrator and may need to be approved by the approval administrator.
- Offline document management
- Clients need to connect to the server to access encrypted documents. With this function, you can make offline documents. Even if the client is not connected to the server, users can read these offline documents. According to the permission of the administrator, offline documents may need to be approved by the administrator. When the administrator is offline, you can control the offline time of the client and whether to allow printing when offline.
- Outgoing document management
- Outsiders cannot read the contents of encrypted documents. This function makes outgoing documents, even on machines without a client installed, you can read these outgoing documents. According to the permission of the administrator, outgoing documents may need to be reviewed and approved by the administrator. Outgoing documents are subject to encryption protection and leak control like internal use, and will not cause document leakage. At the same time, password and machine code verification are added to enhance outgoing Document security.
- User / Authentication
- Integrated unified user / authentication management, users uniformly use USB-KEY for identity authentication, and the client supports two-factor authentication.
- Audit management
- Perform detailed and effective audits of the general operations of encrypted documents. The console provides a web-based management method. The audit administrator can conveniently perform system audit management through the browser.
- Self-protection
- By self-protecting the system at the driver layer of the operating system, the client is protected from illegal destruction and always runs in a secure and trusted state. Even if the client is accidentally damaged, the encrypted documents on the client computer will not be lost or leaked. [1]