DACS supports the acquisition of deep critical data for situational analysis, such as east-west traffic between data security computing domains, and data computing details within the secure computing environment, etc. These high-quality data are extremely valuable for the construction of adaptive security policies and the formation of adaptive security closed-loops.
Combined with the unique AI engine, it analyzes and processes the status information collection, monitoring and security events, further completes independent learning, recommends the best permission assignment policy for different user tags, network locations, role attributes, etc., and gives the administrator a completed policy assignment model, and administrator can choose to use the policy or use it after slight modifications according to the actual situation, improving the operation and maintenance management efficiency of the administrator. DACS intelligently adapts to enterprise business scenarios, changes security policies according to the business situation, proactively finds and fixes problems, drives the security processes, and forms a closed-loop of the entire security management and control system.
Another unique feature of DACS is its ability to perfectly isolate the secure computing environment from the local environment. It does not collect information from the local environment, but only supervises and controls the secure computing environment. While protecting enterprise data security, it can effectively protect personal privacy from being violated and perfectly support BYOD working style.
DACS supports the acquisition of deep critical data for situational analysis, such as east-west traffic between data security computing domains, and data computing details within the secure computing environment, etc. These high-quality data are extremely valuable for the construction of adaptive security policies and the formation of adaptive security closed-loops.
Combined with the unique AI engine, it analyzes and processes the status information collection, monitoring and security events, further completes independent learning, recommends the best permission assignment policy for different user tags, network locations, role attributes, etc., and gives the administrator a completed policy assignment model, and administrator can choose to use the policy or use it after slight modifications according to the actual situation, improving the operation and maintenance management efficiency of the administrator. DACS intelligently adapts to enterprise business scenarios, changes security policies according to the business situation, proactively finds and fixes problems, drives the security processes, and forms a closed-loop of the entire security management and control system.
Another unique feature of DACS is its ability to perfectly isolate the secure computing environment from the local environment. It does not collect information from the local environment, but only supervises and controls the secure computing environment. While protecting enterprise data security, it can effectively protect personal privacy from being violated and perfectly support BYOD working style.
Contact Us