Recommend a domain wisdom shield software commonly used by enterprises. Because the diversification of functions can meet the intentions of many enterprises, it is very popular with enterprise managers.
Main functions:
1, document is encrypted transparently.
The system can automatically and transparently encrypt all electronic documents of the company's core departments,
The encrypted file is the same as the original file (without changing the format and form) and can only be used on computers in a specific range. number
Even if the files are transferred in any way (such as copying on a U disk, sending emails, accessing a network disk, disassembling a hard disk, stealing a computer, etc.). ), as long as you leave the encryption environment, you can't open it for use, so as to realize the controllability of the company's important files. The system supports a full range of windows operating systems including win 10, Linux system and Apple Mac system.
2. File operation monitoring (screen capture prevention and copy prevention)
The system records the operations (who, when and what) of copying, cutting, copying, printing and decrypting files for future investigation. In particular, the system can prohibit all screen shots that lead to leaks, and at the same time, it is forbidden to copy and paste the contents of encrypted files into uncontrolled programs, such as copying the contents of documents into QQ and email body.
3. File decryption
File decryption is operated by specific personnel of the company, and the file can only be taken out of the company for use after decryption. The system can also set the decryption approval process as required (multi-level approval can be set) and support parallel approval.
4. File output control
You can set outgoing files (such as sending encrypted files to other companies and customers) to be readable, but not to be copied, modified or printed, and set the effective time and opening times of the files. If the valid time and reading times are exceeded, the file cannot be opened, and the expired self-destruction can be set. You can set the outgoing file to be used only on the other party's specific computer or specific USB flash drive. , effectively prevent the secondary proliferation of confidential documents.
5. Classified management
Encrypted files can be set as top secret, confidential, secret, etc. According to the importance of the company's departmental documents. Senior personnel can open low-level files, while junior personnel cannot open high-level files.
6. Print control
You can set to prohibit printing all controlled files. If you need to print, you must apply to the management and agree to print before you can print the file. You can also limit the types of documents that only printers are allowed to print (for example, WORD documents are allowed to print, but CAD drawings are prohibited). The system also provides detailed print logs, such as when and which files were printed by "who". What is the content of the document?