Based on the native operating system, it naturally supports mainstream system platforms such as Windows, Mac, Linux, Android, iOS, etc.
Make full use of terminal local computing resources to better support 3D HD applications, video applications, graphics rendering, peripheral connection, terminal data acquisition and other scenes
Deeply integrated with the kernel at the operating system level, the hardware encryption acceleration capability is fully utilized, resulting in extremely low performance overhead and smooth usage without lag
Compared with the native network bandwidth of the application, DACS has no obvious incremental overhead on the network bandwidth and can maintain stable access without latency even in the case of network jitter
Keep consistent operating experience with the native system, no forced changes to user habits, smooth operation
Distributed and weakly centralized design, less reliance on server resources, less resource overhead, and saving server resource costs
Less reliance on network bandwidth, saving the cost of large bandwidth network construction
Perfect operation and maintenance system and automated operation and maintenance process, combined with adaptive security mechanism to automatically and dynamically adjust security policies, greatly reducing operation and maintenance costs
No matter office documents, design drawings, financial statements or personal data are all mixed together and managed in a "one-size-fits-all" manner, resulting in "important data cannot be managed", ""value data is difficult to flow ", "over-control of personal data" and other situations.
Physical isolation, DLP, VDI and other data security solutions almost all require different degrees of sacrifice of efficiency and experience to enhance security, making security and efficiency a difficult trade-off.
点击切换项目
Core Technology
Based on zero trust architecture, innovative new generation kernel-level security sandbox technology
Pre-emptive Interception
Secure workspace is built to block threats and effectively protect enterprise data assets
In-process Defense
Fine-grained monitoring of access and operations in the secure workspace, accurately detecting and blocking abnormal behavior
Post-audit
Support comprehensive and detailed behavior audit analysis and logging
Network Control
The isolated secure workspace supports enterprises to customize and configure flexible network access policies, and conduct fine-grained 7-layer network access control
Data Flow Analysis
Support data monitoring and protection of the whole process, and can analyze the flow of data, monitoring the source, path and end point of data
Data Secondary Distribution Control
Effectively control the sharing and outgoing of sensitive data to ensure convenience and security
Usage Experience
Support mainstream operating systems such as Windows, Mac, Linux, Android, iOS,and maintain consistent operating habits and experience with native systems
Performance Overhead
Deeply integrated with the kernel at the operating system level, the hardware encryption acceleration capability is fully utilized, resulting in extremely low performance overhead
Network Overhead
Compared with the native network bandwidth of the applications, DACS has no significant incremental overhead on network bandwidth
Construction Costs
Distributed and weakly centralized design, less reliance on server resources, less resource overhead
Operation and Maintenance Cost
Perfect O&M system and automated O&M process, combined with adaptive security mechanisms to automatically and dynamically adjust the security policy, greatly reducing the cost of O&M
Contact Us