Balance between source code security and R&D efficiency
Program code and AI model are the core assets and competitiveness of science and technology innovation enterprises. In order to protect these core assets, enterprises used to take the method of physical isolation of equipment to prevent code leakage. Engineers use laptops for daily working in the office network and use special development machines to complete coding in the isolated development network. In order to further ensure security, dedicated developers connect to dedicated physical networks, lock peripheral interfaces such as USB, and isolate them in locked cabinets. But this method not only increases the IT cost and operation and maintenance expenses of enterprises, but also greatly reduces the work efficiency of development engineers when quoting the best implementation of Internet standards and reference programs.
DataCloak customize security solutions for source code protection scenarios to support code development and protection in public and private cloud environments. Development engineers only need to install the DACS client to construct a secure workspace within the operation system of the PC. Within the secure workspace, developers can habitually use mainstream development platforms and tools and communicate with code version management services (Git/SVN, etc.) at the corporate back system. Since the programs and code running in the secure workspace are encrypted, once an employee logs out, shuts down, or the enterprise deletes an account, even data saved on the local PC machine is "deleted" and can no longer be accessed. These features effectively help enterprises solve code security problems caused by employee resignation, temporary staff, and outsourcing scenarios.