Online service
Phone consultation
File storage and transmission control
Cloud control, Local control, Comprehensive combination of outsourcing management and control, Prevent losses caused by the leakage of important information of the enterprise.
Full link encrypted transmission
Cloud files are stored as ciphertext, upload, Downloads, Flow full link encryption.
Important documents are not implemented
Important files are only allowed to be stored in the cloud, preview, edit, Prohibit downloading to PC End and mobile end, Avoid document leakage or damage through unsafe terminals.
Safety outsourcing
Select a file from the cloud disk/Folder to make outsourcing documents with specific permissions, When the outsourcing documents are shared/After downloading, Will be subject to security control, Include watermark, Anti copy, Anti printing, Limit open times/duration, Password protection, etc.
Content level document security control
Provide fine-grained to content level file security protection, Ensure that the contents of the file are not lost.
Sensitive content identification
Intelligent identification of document content according to detection rules, Audit or isolate sensitive documents, Ensure enterprise document content compliance, Protect confidential enterprise information.
Historical version backup
Supports the maximum number of files saved 100 Historical versions, It can be restored to any historical version at any time, No longer worry about overwriting the original version due to document modification errors.
Recycle bin multiple backup
Enterprise files deleted by employees, It will still be saved in the recycle bin of the enterprise administrator, Ensure that enterprise documents are not lost.
User behavior control
Comprehensively control user behavior in various ways, Prevent file leakage.
Watermark Preview
Watermark preview can be enabled for important folders, Track user operation path.
User behavior restrictions
Can restrict collaborative users from copying, Screenshot, Downloading files and other behaviors, Sensitive behavior automatically triggers approval, It can be operated only after approval.
Operation record
Any operations performed by members on files have dynamic records and operation logs, For later backtracking and audit.
User identity control
Set up a rigorous user access mechanism, Prevent and eliminate safety risks from the source.
Log in IP limit
Restrict members to log in to Yifang cloud only in the areas allowed by the enterprise.
Login device restrictions and management
Limited members can only log in to Yifang cloud through the operating devices allowed by the enterprise. You can view the devices that are logging into Yifang cloud, And delete untrusted devices, Modify the login password in time.
Login secondary authentication
Conduct secondary verification of the user's account during login, Prevent data leakage caused by account and password theft.
File storage and transmission control
Cloud control, Local control, Comprehensive combination of outsourcing management and control, Prevent losses caused by the leakage of important information of the enterprise.
Full link encrypted transmission
Cloud files are stored as ciphertext, upload, Downloads, Flow full link encryption.
Important documents are not implemented
Important files are only allowed to be stored in the cloud, preview, edit, Prohibit downloading to PC End and mobile end, Avoid document leakage or damage through unsafe terminals.
Safety outsourcing
Select a file from the cloud disk/Folder to make outsourcing documents with specific permissions, When the outsourcing documents are shared/After downloading, Will be subject to security control, Include watermark, Anti copy, Anti printing, Limit open times/duration, Password protection, etc.
Content level document security control
Provide fine-grained to content level file security protection, Ensure that the contents of the file are not lost.
Sensitive content identification
Intelligent identification of document content according to detection rules, Audit or isolate sensitive documents, Ensure enterprise document content compliance, Protect confidential enterprise information.
Historical version backup
Supports the maximum number of files saved 100 Historical versions, It can be restored to any historical version at any time, No longer worry about overwriting the original version due to document modification errors.
Recycle bin multiple backup
Enterprise files deleted by employees, It will still be saved in the recycle bin of the enterprise administrator, Ensure that enterprise documents are not lost.
User behavior control
Comprehensively control user behavior in various ways, Prevent file leakage.
Watermark Preview
Watermark preview can be enabled for important folders, Track user operation path.
User behavior restrictions
Can restrict collaborative users from copying, Screenshot, Downloading files and other behaviors, Sensitive behavior automatically triggers approval, It can be operated only after approval.
Operation record
Any operations performed by members on files have dynamic records and operation logs, For later backtracking and audit.
User identity control
Set up a rigorous user access mechanism, Prevent and eliminate safety risks from the source.
Log in IP limit
Restrict members to log in to Yifang cloud only in the areas allowed by the enterprise.
Login device restrictions and management
Limited members can only log in to Yifang cloud through the operating devices allowed by the enterprise. You can view the devices that are logging into Yifang cloud, And delete untrusted devices, Modify the login password in time.
Login secondary authentication
Conduct secondary verification of the user's account during login, Prevent data leakage caused by account and password theft.