BACKGROUND OF DEMAND

The rapid development of the information society and the need for enterprise informatization construction have led to the gradual concentration of business secrets in electronic documents, such as CAD drawings, Office documents, etc., which have also become the biggest threat to internal data security of enterprises. How to protect the security of documents carrying important information has become an unavoidable issue. Information leakage prevention solutions not only provide solutions to prevent information leakage through USB drives, emails, etc., but also have greater significance in helping enterprises build a comprehensive information security protection system. Through detailed and meticulous operation audits, comprehensive and strict operation authorizations, and secure and reliable transparent encryption triple protection, the information assets of the enterprise are comprehensively protected, enabling the enterprise to achieve a complete information leakage prevention process of "pre defense, in-process control, and post audit", and the information security protection is impeccable.


SOLUTION

Information leakage prevention solution, three-dimensional intelligent control. Dimension 1: Transparent encryption of pre protection documents, Dimension 2: In process control of circulation channels, Dimension 3: Post audit of content level behavior


Dimension 1: Transparent encryption of pre protected documents

Mandatory Transparent Encryption: Mandatory transparent encryption is applied to electronic documents. In a credit environment, encrypted documents can be used normally, but in a non credit environment, encrypted documents cannot be used

Internal permission management: For multi departmental and multi-level organizations, flexibly correspond user permissions with sensitive information of different confidentiality levels, achieve authorization and use of information by department and level, and effectively reduce the risk of internal leakage.

Document outsourcing management: By assigning readers, enterprises can fully control the legitimate readers, effective access time, and access frequency of outsourced encrypted documents, thereby effectively avoiding secondary leaks of documents after they are sent out to the enterprise.

Disaster prevention backup mechanism: Adopting a backup server mechanism to cope with various software, hardware, and network failures, ensuring the continuous and stable operation of the encryption system. Emergency events can be set to deal with network instability or failure issues. The plaintext backup server can provide real-time backup of modified encrypted documents, ensuring that even in the event of unexpected situations, the encrypted original files are still intact and usable.


Dimension 2: In process control of circulation channels

Document operation control: Control users' operation permissions on files and even folders in various locations such as local and network, including access, copying, modification, deletion, etc., to prevent illegal access and operation.

Mobile storage control: Standardize the use of mobile storage devices within the enterprise, prohibit the use of external USB drives within the enterprise, and ensure external use of external drives. It is also possible to encrypt the internal mobile drive as a whole, so that it can only be used within the enterprise, achieving internal use within the drive.

Terminal device specification: It can restrict the use of various computer external devices such as USB devices, burning, Bluetooth, etc., effectively preventing information from leaking out through external devices.

Network communication control: Control users to send confidential documents through instant messaging tools and network applications such as email, while also preventing information leakage through uploading, downloading, and illegal external connections.


Dimension Three: Post audit Content level Behavioral Audit

Full lifecycle audit of documents: Detailed records of every operation throughout the entire lifecycle of documents, from creation to access, modify, delete, etc

Record shared documents being modified or deleted by other computers.

Audit of the entire process of document dissemination: Carefully record the process of document dissemination through printers, external devices, instant messaging tools, emails, and other tools, effectively preventing important information from being copied or moved at will and causing leakage.

Desktop behavior comprehensive audit: It can conduct a comprehensive and intuitive audit of user behavior, and enterprises can even understand what operations users have performed in information systems such as ERP systems or financial systems


Fully comply with the security theory model


Shenzhen Baifujia Software Co., Ltd
1407 Baoshan Times Building, Longhua Avenue, Longhua District, Shenzhen
400-777-9560

WeChat official account

WeChat Consultation

版权所有   © 2025   深圳市百富嘉软件有限公司   粤ICP备09206173号   技术支持:人网网络