SOLUTION
Data Leakage Protection
Purpose
On the premise of doing a good job in data classification and grading, identify and control the scope of sending and recipients of sensitive data, so that sensitive information can be traced, and the way of dissemination and storage can be controlled.
Introduction
Based on content identification technology, this solution provides security protection for financial statements, listed company financial reports, software and hardware development source codes, design drawings, contract texts, etc. that are defined as sensitive texts Prevent data leakage through mobile storage copy, IM chat tool, email, cloud disk/network disk, printing, scanning and faxing Measures of record, alarm and block are adopted for the behavior of user leakage, and the user behavior is audited Effectively identify sensitive data, monitor the usage of sensitive data, and prevent leakage of sensitive data Effectively cultivate and improve employees' awareness of confidentiality of sensitive documents
Value
Relying on the experience and advantages of its own information security consulting services, do a good job in the programmatic requirements of data classification and grading, and conduct senior management propaganda and implementation and employee data protection awareness training Based on years of research on data leakage prevention products at home and abroad, according to the current solution of different customers, recommend suitable manufacturers to communicate with customers Avoid the fatigue and workload caused by customers' direct contact with various types of manufacturers, and improve the efficiency of model selection Glorytime has established a long-term cooperative relationship with mainstream data leakage prevention manufacturers at home and abroad, and helps customers save costs through channel prices Glorytime can participate in the discussion and formulation of the plan as a consultant to reduce the workload of customers Glorytime can be used as the supervision company for the implementation of the plan, and carry out project management and quality control
Data Protection Principles
Identify sensitive information through the network (deploy network identification equipment)
SOLUTION
Comprehensive document management
Purpose
Manage documents in a reasonable way, and effectively reduce the risk of leakage and cost of enterprise core data
Introduction
The traditional management method adopts local management, which is similar to the current popular enterprise NAS file management Cloud management method, establish the enterprise's own private cloud, which can be accessed and managed internally and externally, and realize document management The comprehensive management method, through the combination of traditional and cloud management methods, classifies enterprise documents and core data and manages them according to permissions to meet the different needs of access, modification, storage and dissemination.
Value
Relying on the experience and advantages of its own information security consulting services, do a good job in the system requirements for data access, and conduct senior management propaganda and implementation and employee information security awareness training Based on years of research on document management products at home and abroad, select and provide suitable implementation methods for customers to meet management requirements Glorytime has established a long-term cooperative relationship with mainstream data leakage prevention manufacturers at home and abroad, and helps customers save costs through channel prices Glorytime can participate in the discussion and formulation of the plan as a consultant to reduce the workload of customers Glorytime can be used as the supervision company for the implementation of the plan, and carry out project management and quality control.
Features
Full text search engine
Intelligent full-text search engine, allowing users to quickly and easily find the required documents
Directory multi-level classification
It truly supports infinite classification of catalogs, adapting to a variety of filing and classification requirements
Information Integration
Powerful integration capabilities, allowing knowledge documents to be automatically collected from various systems or matters
Multi-dimensional access control
Provide more than 20 permission controls such as sharing, downloading, printing, and copying
Information Security Control
128-bit encryption algorithm, custom encryption technology, multi-pronged approach to ensure traffic security
Directory decentralization management
Realize that the knowledge documents of the group headquarters and subordinate companies can be operated independently or shared with each other
Application Scenario Design
According to the needs of enterprise management and work, various knowledge application scenarios can be formulated to form a knowledge map
Multiple formats supported
Support online reading in various document formats such as PPT, Word, Excel, PDF, TXT, etc.
SOLUTION
Internet Behavior Management
Purpose
Effectively prevent employees from engaging in network behaviors that have nothing to do with work Improve bandwidth resource utilization Avoid leaks and regulatory risks, and ensure intranet data security (combined with data leakage prevention products) Visual management and comprehensive control of wireless AP
Introduction
Online behavior management Information Control Wireless Network Management Application Control Illegal hotspot control Flow Control Behavior analysis
Value
Provide unified online behavior management solutions for Internet egress, 10G environment, and wired and wireless Combined with the data leakage prevention management system, it comprehensively guarantees the hierarchical authorization and access records of data, and complies with industry audit and regulatory norms.
SOLUTION
Enterprise Management Cloud
Purpose
Effectively prevent the occurrence of leaks through the terminal Significantly reduce desktop operation and maintenance costs
Introduction
The desktop cloud comprehensive solution is composed of thin clients, virtual desktop controllers, virtual machine management software, server storage devices, etc., to realize the unified deployment of corporate employees' office desktops on the server, and then through the network (local area network or wide area network). The system is quickly delivered to employees, and employees can access the office anytime and anywhere through various types of terminal devices such as thin clients, notebooks, mobile phones, and tablets, creating a new desktop office model.
Value