With innovative kernel-level security sandbox technology, multiple workspaces of different security levels can be virtualized at the same time in a terminal device, and they are isolated from each other. Each independent secure workspace is equivalent to an isolated physical terminal, for data of different security levels can realize isolation control policies of different strengths to achieve fine-grained classification management
Rather than needing two endpoint devices, DACS allows users to access the enterprise network and the Internet at the same time on the same terminal device, with the internal and external networks are isolated from each other
DACS provides secure, convenient and efficient data sharing and outgoing approval capabilities, breaking the original physical isolation of data barriers, allowing data to fully flow under the premise of security, achieving data value and enhancing efficiency
Secure workspace can be opened anytime, anywhere without the restriction of office place, moving the secure and isolated office environment to anywhere worldwide
Directly use employees' BYOD devices, no need to purchase a large number of terminal devices, reducing hardware investment costs
Unified management personnel, devices, applications and networks, unified configuration, issuance and recovery of access permissions and security policies, eliminating complex network isolation rules, significantly reducing management and operation and maintenance costs
点击切换项目
Implementation Method
Install the DACS client in the terminal device to achieve data, network and application isolation and protection
Security
Kernel-level security sandbox technology, data in the secure workspace can not be leaked by any means
Data Flowability
Data can be securely shared among trusted personnel without breaking the boundary of the secure workspace, based on the principle of "one-way flow" which only allows data transfer from low-level to high-level secure workspaces
Accessibility
One machine for two uses, open secure workspaces to access enterprise data anytime, anywhere
Network Access Control
Supports enterprises to customize and configure flexible network access policies, and conduct fine-grained 7-layer network access control
Operation and Maintenance Cost
Perfect O&M system and automated O&M process, combined with adaptive security mechanisms to automatically and dynamically adjust the security policy, greatly reducing the cost of O&M
Contact Us