DACS provides workspaces with different security levels according to the different sensitivity of enterprise data, and gives security control policies of different strengths, making data management more controllable and clear
Data follows the one-way flow principle of "low level to high level" to ensure the mobility of data and fully realize the value of data
Enterprise data and personal data are separated to avoid mixing all data together, so that ease enterprise management and employees' use
Based on zero trust architecture, it not only provides the capability of terminal data security protection, but also provides zero trust network access control capabilities such as trusted personnel access, trusted device access, access permissions control, trusted data transmission, and business security protection, providing enterprises with the whole process of security protection from terminal to server
No need to build additional VPN, only through DACS can realize the enterprise employees' secure remote office anytime and anywhere
Enterprise data is only allowed to be shared within a secure workspace of the same or higher level of DACS, ensuring that data is always used in a secure environment
Realize multi-level outgoing approval mechanism for individual files, and control the distribution rights of data at a fine granularity to effectively prevent the leakage and spread of highly confidential and sensitive data
Analysis and judgment of all data generated on terminals and networks will generate a large amount of alarm information, which requires manual tracking and auditing. In addition, if the protection effect of DLP is to be guaranteed, strict policy protection is required, which will result in the normal operation of terminals being intercepted, requiring continuous human input to solve problems for users, so the operation and maintenance cost of DLP is very high.
点击切换项目
Core Technology
Based on zero trust architecture, innovative new generation kernel-level security sandbox technology
Pre-emptive Interception
Secure workspace is built to block threats and effectively protect enterprise data assets
In-process Defense
Fine-grained monitoring of access and operations in the secure workspace, accurately detecting and blocking abnormal behavior
Post-audit
Support comprehensive and detailed behavior audit analysis and logging
Asset Management
Comprehensive real-time control of terminals, applications and data
Network Control
The isolated secure workspace supports enterprises to customize and configure flexible network access policies, and conduct fine-grained 7-layer network access control
Remote Access
Zero trust SDP architecture for secure remote access anytime, anywhere
Data Secondary Distribution Control
Effectively control the sharing and outgoing of sensitive data to ensure convenience and security
Usage Experience
Separation of enterprise data and personal data, does not affect personal operational behavior
Network Environment Dependency
Compared with the native network bandwidth of the applications, DACS has no significant incremental overhead on network bandwidth
Operation and Maintenance Cost
Perfect O&M system and automated O&M process, combined with adaptive security mechanisms to automatically and dynamically adjust the security policy, greatly reducing the cost of O&M
Contact Us