The popularization and application of computers and networks makes the production, storage, acquisition, sharing and dissemination of information more convenient.Risk of important internal information leaks. According to a Gartner survey, more than 85% of security threats come from within the Organization.Among the losses caused by security vulnerabilities, 30%-40% are caused by leakage of electronic files. Among the top 1000 Companies in fortune,The average loss caused by each electronic file leakage is USD 0.5 million. Digital assets have become the lifeline for long-term survival and development of enterprises,Protecting the security of digital assets has become a top priority for enterprises, and information security has become an important security topic in the 21st century.
Traditional Information security solutions, such as firewalls, private networks, and intrusion detection, can prevent unauthorized access by external personnel, but cannotPrevent internal staff and authors from copying and disseminating confidential documents. As we all know, copying electronic documents is very easy,The dissemination is extremely confidential. Copying and spreading confidential documents is the main cause of information leaks.
Currently, the mainstream document encryption products on the market are mainly divided into two categories, one is to use document format conversion encryption, centralized authorization managementEncryption mode; the other is automatic and transparent encryption and decryption, centralized authorization management, without changing users' existing work habits and Business ProcessesPassword mode.
Encryption Products Based on document format conversion can control attributes such as read-only, edit, print, print, and read count of a document,However, whether the document is encrypted or not is determined by the user. The user determines the document circulation, and only the document transmission path can be entered.At the same time, due to the early development of the product, there is a certain degree of background in technology and application.
The automatic and transparent encryption and decryption product protects documents throughout the entire process, and protects files during file generation and dissemination.Control, there is no risk of leaks, and you can also control file content copying, cutting, dragging, printing, screenshots, and so on.How Computers leak data.
Transparent encryption and decryption products have the following advantages:
1. Forced encryption: After the system is installed, all specified types of files are forcibly encrypted.
2. Easy to use: it does not affect the original operation habits and does not need to restrict ports. It does not affect internal communication and does not need to be done in any way.Can communicate.
3. External obstruction: Once a file leaves the use environment, the file will automatically become invalid, thus protecting intellectual property rights.Based on the above advantages, as an encryption product catering to the Intranet security trend, transparent encryption is increasingly popular with modern enterprises.Industry favor and praise, market demand trend is increasing day by day.The Huawei smart anti-information leak system emerged to meet the needs of Intranet security: it not only continued the advantages of intranet information sharing,It also ensures the security of confidential internal information.
It is a comprehensive file security system based on user requirements, data encryption, and user-oriented. InWithout changing the original workflow and user habits of the Enterprise, you can perform operations on confidential files that comply with the encryption policy.Real-time Monitoring enforces encryption protection on confidential files, effectively preventing security risks caused by passive and active leaks, and eliminating internalSecurity risks are invisible.
Features
★Mandatory and automatic Encryption
Work on the bottom layer of the computer to protect the file content. As long as the user has read and write operations on the disk, the file is automatically addedPassword, which saves the user time for Manual encryption operations, but does not control the transmission and sharing of files, and does not affectFiles are always ciphertext during creation and transmission. In addition, the operation of this technology is fully transparent to users.Users can enjoy security in their normal work without knowing it.
★Automatic and transparent
Work in pure background mode, monitors user operations in real time, intelligently expands security policies, and achieves invisible protection. Multiple filesThe automatic version Backup recovery function further ensures file security, so that users have no worries. TrueEverything in a sense is virtually all-in-one protection.
★Powerful Outbound Security Protection
To send files to partners or customers in the Enterprise Intranet environment, we can use the packaging tool to package the ciphertext and generateThe decompressed package automatically contains ciphertext, digital certificates, and invisible clients. After the files are sent out of the IntranetFor example, in a normal Intranet environment, you can use external files normally. You can also perform lifecycle andOther security policy settings to effectively prevent the spread and dissemination of outgoing files to third parties, and protect external documents from the root causeParts security.