Online service

Online service

360 Yifang Cloud File Security Solution

Preventing the leakage of confidential document data
Comprehensive and end-to-end guarantee of enterprise document security
Document content security
Employee operation control
Encrypted storage
Safe circulation
Free trial

360 Yifang Cloud File Security Solution

Preventing the leakage of confidential document data
Comprehensive and end-to-end guarantee of enterprise document security
Document content security
Employee operation control
Encrypted storage
Safe circulation
Free trial

360 Yifang Cloud helps enterprises cope with data leakage risks

  • Avoiding leakage caused by external materials

    Avoiding leakage caused by external materials

    Encrypt storage through the enterprise's exclusive cloud drive, Transfer of office materials, Avoid downloading, Share files, Or through WeChat, DingTalk, Information leakage caused during the process of sending files via email or other means.

  • Avoiding leakage caused by device loss

    Avoiding leakage caused by device loss

    Confidential documents are uniformly encrypted and stored in the enterprise cloud drive, And not stored on the computer, U disc, In fixed devices such as portable hard drives, Avoid equipment loss, Data leakage caused by damage or loss of control.

  • Avoiding leaks caused by taking photos and screenshots

    Avoiding leaks caused by taking photos and screenshots

    Confidential documents are stored in the enterprise cloud drive, Photography can be prohibited, Screenshot, copy, Download and other operational behaviors, Eliminate the leakage of file information.

  • Avoiding leakage caused by personnel mobility

    Avoiding leakage caused by personnel mobility

    Confidential documents "Can only be used" "Can't take it away" , Avoiding intentional acquisition by departing employees before leaving, Information leakage caused by taking away important documents.

Cloud based-local-Comprehensive leakage prevention for external documents

  • 360 Security Brain Empowers Enterprise Document Security Protection. Accurately match document security requirements in various scenarios of the enterprise, Generate documents in the cloud/the circulation/file, Local document generation/the circulation/file, And throughout the entire process of document dissemination, Adopt document encryption on the ground, Flow control, Cloud synchronization, Storage encryption, Operational behavior control, Permission control, A series of measures including sharing control, Guarding the security of enterprise documents throughout their entire lifecycle.

    Cloud based-local-Comprehensive anti leakage plan diagram for external documents 1
  • 360 Security Brain Empowers Enterprise Document Security Protection. Accurately match document security requirements in various scenarios of the enterprise, Generate documents in the cloud/the circulation/file, Local document generation/the circulation/file, And throughout the entire process of document dissemination, Adopt document encryption on the ground, Flow control, Cloud synchronization, Storage encryption, Operational behavior control, Permission control, A series of measures including sharing control, Guarding the security of enterprise documents throughout their entire lifecycle.

    Cloud based-local-Comprehensive anti leakage plan diagram for external documents 2

Comprehensive control of local document security

application 360 Yifang Cloud Enterprise Cloud Storage Management Document Enterprise, Can be encrypted locally, Document content control, A series of abilities including offline document management, Ensure the security of enterprise documents synchronized from the cloud to the local environment.

Automatic encryption of documents upon landing

Automatic encryption of documents upon landing

Office scenario

If the document lands on the local terminal disk, Users can freely access it through WeChat, DingTalk, U disc, Copy of hard disk, etc, the circulation, Causing document leakage. Especially before employees leave, they may download confidential documents in bulk, And take away for personal gain.


Solutions

Confidential documents stored on Yifang Cloud Enterprise Cloud Drive will be automatically encrypted once they land. When employees are employed, Can be accessed through enterprise controlled terminal devices (Such as the computers provided by the company to employees) see, edit, If an employee opens a file on their own computer after leaving, it will be in encrypted state, Unable to view.

Document content security control

Document content security control

Office scenario

After the document lands on the local terminal disk, Regarding the specific content of the main text in the document, Users can take photos, videotape, Obtain through screenshot and other methods, And it is impossible to trace the audit afterwards, Causing information leakage.


Solutions

Employees open files on Yifang Cloud Enterprise Cloud Drive, Employees' personal watermarks will be attached to the screen, Deterrence of user behavior, It is also convenient for later behavior tracing; You can set the document to prohibit screenshots, Prohibit printing, Copying is only allowed within this document, Prohibited from using A Copy the content from the document to B Documents, etc.

Terminal offline security control

Terminal offline security control

Office scenario

After the document lands on the local terminal disk, If a staff member accidentally loses a computer device containing core confidential documents of the enterprise, It is highly likely to cause the leakage of disk information in the device.


Solutions

Terminal devices controlled by the company's network (Office computers provided to employees by the company) Once disconnected from the company's network, And beyond a certain period of time, Confidential documents landed on the local disk will not be able to be opened in plaintext, Cannot be viewed, So as to ensure even if the computer is lost, The document will not be leaked either.

Automatic encryption of documents upon landing "

Office scenario

If the document lands on the local terminal disk, Users can freely access it through WeChat, DingTalk, U disc, Copy of hard disk, etc, the circulation, Causing document leakage. Especially before employees leave, they may download confidential documents in bulk, And take away for personal gain.


Solutions

Confidential documents stored on Yifang Cloud Enterprise Cloud Drive will be automatically encrypted once they land. When employees are employed, Can be accessed through enterprise controlled terminal devices (Such as the computers provided by the company to employees) see, edit, If an employee opens a file on their own computer after leaving, it will be in encrypted state, Unable to view.

Automatic encryption of documents upon landing

Document content security control "

Office scenario

After the document lands on the local terminal disk, Regarding the specific content of the main text in the document, Users can take photos, videotape, Obtain through screenshot and other methods, And it is impossible to trace the audit afterwards, Causing information leakage.


Solutions

Employees open files on Yifang Cloud Enterprise Cloud Drive, Employees' personal watermarks will be attached to the screen, Deterrence of user behavior, It is also convenient for later behavior tracing; You can set the document to prohibit screenshots, Prohibit printing, Copying is only allowed within this document, Prohibited from using A Copy the content from the document to B Documents, etc.

Document content security control

Terminal offline security control "

Office scenario

After the document lands on the local terminal disk, If a staff member accidentally loses a computer device containing core confidential documents of the enterprise, It is highly likely to cause the leakage of disk information in the device.


Solutions

Terminal devices controlled by the company's network (Office computers provided to employees by the company) Once disconnected from the company's network, And beyond a certain period of time, Confidential documents landed on the local disk will not be able to be opened in plaintext, Cannot be viewed, So as to ensure even if the computer is lost, The document will not be leaked either.

Terminal offline security control

Cloud document security comprehensive control

application 360 Yifang Cloud Enterprise Cloud Storage stores enterprise documents in the cloud, Can be managed through permission management, behavior control , Virus defense, Storage backup, Sensitive word detection, A series of abilities including content auditing, Ensure document security and prevent leakage.

Triple copy encrypted storage

Triple copy encrypted storage

Office scenario

The file was accidentally deleted or modified by an employee, The previous version of the file cannot be retrieved, Causing loss of data assets.


Solutions

Each document is divided into data blocks of uniform size, The data block is processed using non plaintext encryption algorithm, Adopting a three copy storage method, Balanced distribution across all nodes of the system, Ensure that document information is not lost or leaked.

9 Fine grained permission management

9 Fine grained permission management

Office scenario

IfThe document should not be viewed, Preview by the operator, Edited, May cause information leakage, In addition, file loss may also be caused by employee misoperation.


Solutions

The system finely controls the permissions of documents, Different employees have different permissions, So as to upload to employees, preview, Downloads, edit, 移动, Control the behavior of sharing files, Unauthorized personnel are not allowed to perform related operations.

Sensitive behavior triggers approval

Sensitive behavior triggers approval

Office scenario

Users move confidential documents in the cloud, copy, Sensitive operations such as sharing, Possible risk of document leakage.


Solution

When users perform sensitive operations on cloud controlled documents, Will automatically trigger approval from relevant security personnel, Only after approval can the operation continue to be completed, Thus ensuring document security. It is also possible to periodically analyze the frequency of user operations on cloud disk documents, The level of confidentiality of the operated documents, etc, Identify high-risk behaviors of users, And regularly generate risk reports, Provide risk warning for enterprise document security management.

Sensitive word detection

Sensitive word detection

Office scenario

Enterprises need to avoid non compliant documents in the database, Audit and exposure risks brought by sensitive documents, Therefore, it is necessary to promptly filter out files containing sensitive content.


Solution

Automatically scan files when uploading to cloud storage, Users can also perform content recognition on the entire cloud drive, Isolate sensitive files upon discovery, Notification alarm, Prohibit sharing, downloading, etc, Ensure that sensitive information does not spread.

Avoiding virus infection

Avoiding virus infection

Office scenario

Careless internal personnel of the enterprise (Or intentionally) Upload virus-infected files to the enterprise database, Causing the spread of virus files.


Solution

open "Automatic drug detection" after, The system will upload (increment) Automatically check the document for viruses and mark the status of being checked for viruses; Users can perform virus scanning on all files in the background. After finding the virus document, The system will automatically transfer the virus document to the quarantine area, And there are message prompts, Prevent other documents from being contaminated by viruses.

Triple copy encrypted storage "

Office scenario

The file was accidentally deleted or modified by an employee, The previous version of the file cannot be retrieved, Causing loss of data assets.


Solutions

Each document is divided into data blocks of uniform size, The data block is processed using non plaintext encryption algorithm, Adopting a three copy storage method, Balanced distribution across all nodes of the system, Ensure that document information is not lost or leaked.

Triple copy encrypted storage

9 Fine grained permission management "

Office scenario

IfThe document should not be viewed, Preview by the operator, Edited, May cause information leakage, In addition, file loss may also be caused by employee misoperation.


Solutions

The system finely controls the permissions of documents, Different employees have different permissions, So as to upload to employees, preview, Downloads, edit, 移动, Control the behavior of sharing files, Unauthorized personnel are not allowed to perform related operations.

9 Fine grained permission management

Sensitive behavior triggers approval "

Office scenario

Users move confidential documents in the cloud, copy, Sensitive operations such as sharing, Possible risk of document leakage.


Solution

When users perform sensitive operations on cloud controlled documents, Will automatically trigger approval from relevant security personnel, Only after approval can the operation continue to be completed, Thus ensuring document security. It is also possible to periodically analyze the frequency of user operations on cloud disk documents, The level of confidentiality of the operated documents, etc, Identify high-risk behaviors of users, And regularly generate risk reports, Provide risk warning for enterprise document security management.

Sensitive behavior triggers approval

Sensitive word detection "

Office scenario

Enterprises need to avoid non compliant documents in the database, Audit and exposure risks brought by sensitive documents, Therefore, it is necessary to promptly filter out files containing sensitive content.


Solution

Automatically scan files when uploading to cloud storage, Users can also perform content recognition on the entire cloud drive, Isolate sensitive files upon discovery, Notification alarm, Prohibit sharing, downloading, etc, Ensure that sensitive information does not spread.

Sensitive word detection

Avoiding virus infection "

Office scenario

Careless internal personnel of the enterprise (Or intentionally) Upload virus-infected files to the enterprise database, Causing the spread of virus files.


Solution

open "Automatic drug detection" after, The system will upload (increment) Automatically check the document for viruses and mark the status of being checked for viruses; Users can perform virus scanning on all files in the background. After finding the virus document, The system will automatically transfer the virus document to the quarantine area, And there are message prompts, Prevent other documents from being contaminated by viruses.

Avoiding virus infection

Comprehensive security control of outsourced documents

application 360 Yifang Cloud Enterprise Cloud Storage Management Document Enterprise, Can be used for internal sharing of files/External transmission, Scenarios such as file interaction between internal and external networks, Conduct comprehensive document security protection.

Document sharing control

Document sharing control

Office scenario

Important information within the company, During customer negotiations, During the process of supplier cooperation, etc, Inevitably, outsourcing is required, During this process, it is necessary to avoid sending files externally, Leakage occurred during use.


Solutions

When sharing documents, You can set the number of times a shared document can be previewed, The number of times allowed to be downloaded, And the sharing deadline, Extract password, Whether to add watermarks, etc.

Encryption outsourcing

Encryption outsourcing

Office scenario

With customers, Supplier cooperation requires outsourcing company documents.


Solutions

Create encrypted external packages for document interaction with external parties, External third-party customers need to pass password verification to open and use outsourcing normally. The ciphertext outsourcing has anti screenshot capabilities, Anti printing, Anti duplication function, And when the number of openings is exhausted or the usage time exceeds the limit, The outsourced document will be automatically destroyed, Prevent secondary leakage of external documents.

Secure file exchange between internal and external networks

Secure file exchange between internal and external networks

Office scenario

government affairs, medical care, Science and Technology Innovation Laboratory, State owned enterprises and central enterprises, Large enterprises and others with internal networks, External network, Office Network, Multiple network systems such as R&D website, To ensure data security, Physically isolated from each other, The efficiency of cross network file exchange is low, The process is complicated, Difficulties in auditing and other related issues, And there are compliance risks involved.


Solutions

Deploy multiple cloud drives in multiple network spaces, Realize security through the cloud disk's inter network shuttle system, Compliance, Convenient cross network file exchange.

Document sharing control "

Office scenario

Important information within the company, During customer negotiations, During the process of supplier cooperation, etc, Inevitably, outsourcing is required, During this process, it is necessary to avoid sending files externally, Leakage occurred during use.


Solutions

When sharing documents, You can set the number of times a shared document can be previewed, The number of times allowed to be downloaded, And the sharing deadline, Extract password, Whether to add watermarks, etc.

Document sharing control

Encryption outsourcing "

Office scenario

With customers, Supplier cooperation requires outsourcing company documents.


Solutions

Create encrypted external packages for document interaction with external parties, External third-party customers need to pass password verification to open and use outsourcing normally. The ciphertext outsourcing has anti screenshot capabilities, Anti printing, Anti duplication function, And when the number of openings is exhausted or the usage time exceeds the limit, The outsourced document will be automatically destroyed, Prevent secondary leakage of external documents.

Encryption outsourcing

Secure file exchange between internal and external networks "

Office scenario

government affairs, medical care, Science and Technology Innovation Laboratory, State owned enterprises and central enterprises, Large enterprises and others with internal networks, External network, Office Network, Multiple network systems such as R&D website, To ensure data security, Physically isolated from each other, The efficiency of cross network file exchange is low, The process is complicated, Difficulties in auditing and other related issues, And there are compliance risks involved.


Solutions

Deploy multiple cloud drives in multiple network spaces, Realize security through the cloud disk's inter network shuttle system, Compliance, Convenient cross network file exchange.

Secure file exchange between internal and external networks

Diversified deployment plan, Meet the diverse needs of different types of users

Typical cases of excellent enterprises and institutions

Use FangCloud immediately, Start a simple job
Use FangCloud immediately, Start a simple job

reminder

X

Join WeChat, We will contact you as soon as possible!

determine