最新发布|DACS-Gaming游戏行业解决方案重磅升级
了解更多
DATACLOAK LOGO
  • Requirement Challenges
  • R&D Code Security
  • Art Asset Security
  • Solution Highlights
  • Value of Solutions

Game Industry is Facing Data Security Challenges

  • Protecting the core data assets of game companies

    High-quality games are the lifeblood of game companies. Core technical frameworks and game component models are key to keeping high quality content produced and iterated quickly. Securing these frameworks and models is especially important.

  • Balancing R&D data security and efficiency

    Game companies often use intranet and extranet isolation (dual-computer mode) to protect R&D code, and employees need to switch between the two devices frequently, which seriously affects development efficiency. The game industry needs data security solutions that enable employees to remain efficient.

  • Compatible with a wide range of game R&D external devices

    Game content production requires a large number of external devices, including graphics tablets, motion capture devices, etc. Data security solutions for the game industry need to be perfectly compatible with external devices and allow employees to fully utilize the value of these devices.

  • Support secure information sharing with partners

    In the game development process, in addition to information and file sharing within the game development team, there are also creative exchanges and crowd testing and collaboration with external publishers and partners. Game companies need data security solutions that can provide a secure information and file flow environment.

Game Code Security

  • Common problems
    • Low work efficiency and poor experience of "Isolation of intranet and extranet"

      Adopting the dual-computer mode to physically isolate the Internet and the extranet, although it secures the game development environment to a certain extent, it seriously affects the development efficiency and user experience.

    • High procurement and operation and maintenance costs of "Isolation of intranet and extranet”

      The dual-computer mode requires additional procurement of external network machines and supporting software, which results in high overall construction cost and operation and maintenance investment.

    • Disorganized game code data permission management

      The data stored in SVN or Git code repository has unauthorized access in the intranet environment, which cannot be controlled and audited by fine-grained policies.

    • Limited capability of traditional terminal control methods

      Even if the terminal has control means (lock box, DLP), the risk of leakage still exists, such as real machine debugging, using SVN, Samba and other shared network disk or remote file service, a common system tool for data flow.

  • DACS-Gaming solution
    • Good experience and low cost of enterprise-personal data separation

      DACS-Gaming builds a secure computing environment (secure workspace) at the terminal, and the environment outside the secure workspace is personal space. The secure workspace and personal space are deeply isolated on the same device and do not interfere with each other, which is a good experience and easy to promote.

    • One-way data flow prevents sensitive data leakage

      All behaviors of employees in the secure workspace are controlled by enterprise policies, and data cannot be transferred to personal space without authorization, but data from personal space can be transferred to the secure workspace. DACS-Gaming can effectively replace the traditional internal and external network isolation mode.

    • Fine-grained, orderly permission control

      DACS-Gaming supports fine-grained user permission control and flexible setting of security policies (clipboard blocking, watermarking, outgoing permissions, etc.). Authorized employees can only access and handle core code assets such as SVN or Git code repository in the secure workspace. Even in the case of unauthorized access, DACS-Gaming can still restrict the code data to spread only within the controlled boundary, so that the data cannot escape.

Security of Art and Other Content Asset

  • Common problems
    • Open work environment is more prone to data leakage

      The office environment of art design positions is relatively open, and art resources stored on local computers, shared network drives such as Samba or remote file services, and advanced workstations may be leaked in a variety of ways such as outgoing network transfers and copies from external devices.

    • Traditional solutions have poor performance and user experience

      The process of art production requires the use of professional production software and external devices such as graphics tablets, and traditional security solutions consume a lot of performance of terminal devices, resulting in lagging.

  • DACS-Gaming solution
    • Content asset security guaranteed

      DACS-Gaming allows authorized users to access only the network addresses of art production assets and game ready assets within the secure workspace through software defined network perimeter, and downloaded content assets are stored in the secure workspace.

    • Good performance, good experience

      With leading lightweight trusted computing technology, DACS-Gaming makes full use of local computing resources and is perfectly compatible with external devices (such as graphics tablets), ensuring data security and performance without changing the original usage habits of designers and engineers.

Why choose DACS-Gaming

  • Leading technology

    Combining the zero-trust concept with the HyperCloak zero-trust framework and trusted computing technology, we have the leading technological advantage.

  • Software defined

    Both endpoint environment, policy configuration, network design, and system upgrade are implemented in a unified console through software definition.

  • Customer recognition

    Tailor-made for game development enterprises, adapting to the full scenario of game development and production and industry characteristics. Recognized and widely used by famous game companies including FPS, chess, MMO, ACT, etc.

  • Excellent performance

    Supporting large software and environment in the game industry, it keeps the software running smoothly and consumes no more than 5% of local performance on the basis of implementing security measures such as transparent encryption and decryption, bright and dark watermark, and continuous verification.

  • High cost performance

    Compared with traditional solutions, it has the advantages of flexible deployment, simple implementation, and controllable cost.

  • Deployment flexibility

    It supports docking to existing business systems of enterprises, such as authentication and IM tools, as well as the requirements of multi-location offices and redundant disaster mechanisms.

Value to Enterprises

  • Industry-specific

    Good compatibility with specialized software and external devices, low cost of employee office environment movement.

  • Secure and efficient

    Encryption protection from the time of data production collection and project file generation to achieve full lifecycle data security.

  • Smooth use experience

    Provides a friendly experience with no need to change software operations and usage habits.

  • Simple operation and maintenance

    No need to invest in additional construction costs for internal and external network isolation; naturally supports remote security office without special equipment.

Application Scenarios

  • Code development and art creation

    DACS-Gaming is applied to the whole process of game production, so that core assets such as code repository and art resource network disk can only be accessed through secure workspace, and support policy control and audit under real machine debugging.

  • Game Distribution Collaboration

    Share information and product demos with publishers through DACS-Gaming end system to ensure that game products are "available and untakeable".

  • Remote Operation and Maintenance

    Support enterprise staff to realize remote security operation and maintenance through DACS-Gaming endpoints to monitor and maintain the business status and business operation on the server side in real time, while protecting the security of game products, logs and all kinds of data.

  • Outsourcing R&D

    Support outsourced art or R&D personnel to participate in game R&D projects through DACS-Gaming. The operations and process data of outsourced personnel are protected in the secure workspace, and realize collaborative R&D with game project team. Companies can adjust and close the access permissions of outsourced personnel at any time.

Supported Operating Systems and Software Environments

DACS-Gaming supports Windows and macOS operating systems, covering x86 and ARM architecture chips, and supports running mainstream game engines or user-customized game engines, IDEs, design software, mobile emulators and many other software in a secure workspace.

  • Game engines

    UE4, Unity, Cocos and other mainstream game engines

  • IDE

    VSCODE, VS, Jetbrains, Navicat, Xcode, Android Studio

  • Design software

    Maya, 3dsmax, PS, Sketch, etc.

  • Testing software

    LDPlayer, NOX

Resource Center

Contact Us

  • Hotline: 400-688-5600
  • Contact Email: contact@datacloak.com

Follow Us

  • Follow us
    DataCloak

DATACLOAK

  • DataCloak is committed to the development of a zero trust data security platform to help enterprises quickly complete the digital transformation and infrastructure upgrades required in the cloud era, and achieve global borderless data security.
START YOUR TRIAL

Copyright © 2024 DataCloak, Inc. All Rights Reserved.

Privacy Policy | Terms of Service

Contact Us