Online service
Phone consultation
Encrypt storage through the enterprise's exclusive cloud drive, Transfer of office materials, Avoid downloading, Share files, Or through WeChat, DingTalk, Information leakage caused during the process of sending files via email or other means.
Confidential documents are uniformly encrypted and stored in the enterprise cloud drive, And not stored on the computer, U disc, In fixed devices such as portable hard drives, Avoid equipment loss, Data leakage caused by damage or loss of control.
Confidential documents are stored in the enterprise cloud drive, Photography can be prohibited, Screenshot, copy, Download and other operational behaviors, Eliminate the leakage of file information.
Confidential documents "Can only be used" "Can't take it away" , Avoiding intentional acquisition by departing employees before leaving, Information leakage caused by taking away important documents.
application 360 Yifang Cloud Enterprise Cloud Storage Management Document Enterprise, Can be encrypted locally, Document content control, A series of abilities including offline document management, Ensure the security of enterprise documents synchronized from the cloud to the local environment.
Office scenario
If the document lands on the local terminal disk, Users can freely access it through WeChat, DingTalk, U disc, Copy of hard disk, etc, the circulation, Causing document leakage. Especially before employees leave, they may download confidential documents in bulk, And take away for personal gain.
Solutions
Confidential documents stored on Yifang Cloud Enterprise Cloud Drive will be automatically encrypted once they land. When employees are employed, Can be accessed through enterprise controlled terminal devices (Such as the computers provided by the company to employees) see, edit, If an employee opens a file on their own computer after leaving, it will be in encrypted state, Unable to view.
Office scenario
After the document lands on the local terminal disk, Regarding the specific content of the main text in the document, Users can take photos, videotape, Obtain through screenshot and other methods, And it is impossible to trace the audit afterwards, Causing information leakage.
Solutions
Employees open files on Yifang Cloud Enterprise Cloud Drive, Employees' personal watermarks will be attached to the screen, Deterrence of user behavior, It is also convenient for later behavior tracing; You can set the document to prohibit screenshots, Prohibit printing, Copying is only allowed within this document, Prohibited from using A Copy the content from the document to B Documents, etc.
Office scenario
After the document lands on the local terminal disk, If a staff member accidentally loses a computer device containing core confidential documents of the enterprise, It is highly likely to cause the leakage of disk information in the device.
Solutions
Terminal devices controlled by the company's network (Office computers provided to employees by the company) Once disconnected from the company's network, And beyond a certain period of time, Confidential documents landed on the local disk will not be able to be opened in plaintext, Cannot be viewed, So as to ensure even if the computer is lost, The document will not be leaked either.
Office scenario
If the document lands on the local terminal disk, Users can freely access it through WeChat, DingTalk, U disc, Copy of hard disk, etc, the circulation, Causing document leakage. Especially before employees leave, they may download confidential documents in bulk, And take away for personal gain.
Solutions
Confidential documents stored on Yifang Cloud Enterprise Cloud Drive will be automatically encrypted once they land. When employees are employed, Can be accessed through enterprise controlled terminal devices (Such as the computers provided by the company to employees) see, edit, If an employee opens a file on their own computer after leaving, it will be in encrypted state, Unable to view.
Office scenario
After the document lands on the local terminal disk, Regarding the specific content of the main text in the document, Users can take photos, videotape, Obtain through screenshot and other methods, And it is impossible to trace the audit afterwards, Causing information leakage.
Solutions
Employees open files on Yifang Cloud Enterprise Cloud Drive, Employees' personal watermarks will be attached to the screen, Deterrence of user behavior, It is also convenient for later behavior tracing; You can set the document to prohibit screenshots, Prohibit printing, Copying is only allowed within this document, Prohibited from using A Copy the content from the document to B Documents, etc.
Office scenario
After the document lands on the local terminal disk, If a staff member accidentally loses a computer device containing core confidential documents of the enterprise, It is highly likely to cause the leakage of disk information in the device.
Solutions
Terminal devices controlled by the company's network (Office computers provided to employees by the company) Once disconnected from the company's network, And beyond a certain period of time, Confidential documents landed on the local disk will not be able to be opened in plaintext, Cannot be viewed, So as to ensure even if the computer is lost, The document will not be leaked either.
application 360 Yifang Cloud Enterprise Cloud Storage stores enterprise documents in the cloud, Can be managed through permission management, behavior control , Virus defense, Storage backup, Sensitive word detection, A series of abilities including content auditing, Ensure document security and prevent leakage.
Office scenario
The file was accidentally deleted or modified by an employee, The previous version of the file cannot be retrieved, Causing loss of data assets.
Solutions
Each document is divided into data blocks of uniform size, The data block is processed using non plaintext encryption algorithm, Adopting a three copy storage method, Balanced distribution across all nodes of the system, Ensure that document information is not lost or leaked.
Office scenario
IfThe document should not be viewed, Preview by the operator, Edited, May cause information leakage, In addition, file loss may also be caused by employee misoperation.
Solutions
The system finely controls the permissions of documents, Different employees have different permissions, So as to upload to employees, preview, Downloads, edit, 移动, Control the behavior of sharing files, Unauthorized personnel are not allowed to perform related operations.
Office scenario
Users move confidential documents in the cloud, copy, Sensitive operations such as sharing, Possible risk of document leakage.
Solution
When users perform sensitive operations on cloud controlled documents, Will automatically trigger approval from relevant security personnel, Only after approval can the operation continue to be completed, Thus ensuring document security. It is also possible to periodically analyze the frequency of user operations on cloud disk documents, The level of confidentiality of the operated documents, etc, Identify high-risk behaviors of users, And regularly generate risk reports, Provide risk warning for enterprise document security management.
Office scenario
Enterprises need to avoid non compliant documents in the database, Audit and exposure risks brought by sensitive documents, Therefore, it is necessary to promptly filter out files containing sensitive content.
Solution
Automatically scan files when uploading to cloud storage, Users can also perform content recognition on the entire cloud drive, Isolate sensitive files upon discovery, Notification alarm, Prohibit sharing, downloading, etc, Ensure that sensitive information does not spread.
Office scenario
Careless internal personnel of the enterprise (Or intentionally) Upload virus-infected files to the enterprise database, Causing the spread of virus files.
Solution
open "Automatic drug detection" after, The system will upload (increment) Automatically check the document for viruses and mark the status of being checked for viruses; Users can perform virus scanning on all files in the background. After finding the virus document, The system will automatically transfer the virus document to the quarantine area, And there are message prompts, Prevent other documents from being contaminated by viruses.
Office scenario
The file was accidentally deleted or modified by an employee, The previous version of the file cannot be retrieved, Causing loss of data assets.
Solutions
Each document is divided into data blocks of uniform size, The data block is processed using non plaintext encryption algorithm, Adopting a three copy storage method, Balanced distribution across all nodes of the system, Ensure that document information is not lost or leaked.
Office scenario
IfThe document should not be viewed, Preview by the operator, Edited, May cause information leakage, In addition, file loss may also be caused by employee misoperation.
Solutions
The system finely controls the permissions of documents, Different employees have different permissions, So as to upload to employees, preview, Downloads, edit, 移动, Control the behavior of sharing files, Unauthorized personnel are not allowed to perform related operations.
Office scenario
Users move confidential documents in the cloud, copy, Sensitive operations such as sharing, Possible risk of document leakage.
Solution
When users perform sensitive operations on cloud controlled documents, Will automatically trigger approval from relevant security personnel, Only after approval can the operation continue to be completed, Thus ensuring document security. It is also possible to periodically analyze the frequency of user operations on cloud disk documents, The level of confidentiality of the operated documents, etc, Identify high-risk behaviors of users, And regularly generate risk reports, Provide risk warning for enterprise document security management.
Office scenario
Enterprises need to avoid non compliant documents in the database, Audit and exposure risks brought by sensitive documents, Therefore, it is necessary to promptly filter out files containing sensitive content.
Solution
Automatically scan files when uploading to cloud storage, Users can also perform content recognition on the entire cloud drive, Isolate sensitive files upon discovery, Notification alarm, Prohibit sharing, downloading, etc, Ensure that sensitive information does not spread.
Office scenario
Careless internal personnel of the enterprise (Or intentionally) Upload virus-infected files to the enterprise database, Causing the spread of virus files.
Solution
open "Automatic drug detection" after, The system will upload (increment) Automatically check the document for viruses and mark the status of being checked for viruses; Users can perform virus scanning on all files in the background. After finding the virus document, The system will automatically transfer the virus document to the quarantine area, And there are message prompts, Prevent other documents from being contaminated by viruses.
application 360 Yifang Cloud Enterprise Cloud Storage Management Document Enterprise, Can be used for internal sharing of files/External transmission, Scenarios such as file interaction between internal and external networks, Conduct comprehensive document security protection.
Office scenario
Important information within the company, During customer negotiations, During the process of supplier cooperation, etc, Inevitably, outsourcing is required, During this process, it is necessary to avoid sending files externally, Leakage occurred during use.
Solutions
When sharing documents, You can set the number of times a shared document can be previewed, The number of times allowed to be downloaded, And the sharing deadline, Extract password, Whether to add watermarks, etc.
Office scenario
With customers, Supplier cooperation requires outsourcing company documents.
Solutions
Create encrypted external packages for document interaction with external parties, External third-party customers need to pass password verification to open and use outsourcing normally. The ciphertext outsourcing has anti screenshot capabilities, Anti printing, Anti duplication function, And when the number of openings is exhausted or the usage time exceeds the limit, The outsourced document will be automatically destroyed, Prevent secondary leakage of external documents.
Office scenario
government affairs, medical care, Science and Technology Innovation Laboratory, State owned enterprises and central enterprises, Large enterprises and others with internal networks, External network, Office Network, Multiple network systems such as R&D website, To ensure data security, Physically isolated from each other, The efficiency of cross network file exchange is low, The process is complicated, Difficulties in auditing and other related issues, And there are compliance risks involved.
Solutions
Deploy multiple cloud drives in multiple network spaces, Realize security through the cloud disk's inter network shuttle system, Compliance, Convenient cross network file exchange.
Office scenario
Important information within the company, During customer negotiations, During the process of supplier cooperation, etc, Inevitably, outsourcing is required, During this process, it is necessary to avoid sending files externally, Leakage occurred during use.
Solutions
When sharing documents, You can set the number of times a shared document can be previewed, The number of times allowed to be downloaded, And the sharing deadline, Extract password, Whether to add watermarks, etc.
Office scenario
With customers, Supplier cooperation requires outsourcing company documents.
Solutions
Create encrypted external packages for document interaction with external parties, External third-party customers need to pass password verification to open and use outsourcing normally. The ciphertext outsourcing has anti screenshot capabilities, Anti printing, Anti duplication function, And when the number of openings is exhausted or the usage time exceeds the limit, The outsourced document will be automatically destroyed, Prevent secondary leakage of external documents.
Office scenario
government affairs, medical care, Science and Technology Innovation Laboratory, State owned enterprises and central enterprises, Large enterprises and others with internal networks, External network, Office Network, Multiple network systems such as R&D website, To ensure data security, Physically isolated from each other, The efficiency of cross network file exchange is low, The process is complicated, Difficulties in auditing and other related issues, And there are compliance risks involved.
Solutions
Deploy multiple cloud drives in multiple network spaces, Realize security through the cloud disk's inter network shuttle system, Compliance, Convenient cross network file exchange.
Customized red and green zones, different cloud desktops can access cloud disks, But implementing different security control strategies, Realize secure circulation of scientific research achievement documents.
use "headquarters+Three Data Centers" Deployment mode, Configure cloud control, Local encryption, Document watermark and other security measures to prevent leakage.
Adopt local encryption for core assets such as courseware, Offline control, Various methods such as document watermarking, Eliminate taking photos, Screenshot, Prevent personnel from taking confidential documents away after leaving the company.