Built -in WORD encryption, excel encryption, PDF encryption, WPS encryption, AutoCAD encryption, CAXA encryption, SolidWorks encryption, UG encryption, ProE encryption, CATIA encryption, lumion encryption, SKETCHUP encryption, SVN encryption, Eclipse encryption, etc. Encryption, completely prevent the internal documents of the enterprise from being leaked from the source.
Software function:
File encryption: Automatically encrypted after the documentation. The encrypted files are used normally in the internal environment of the company. Without authorization, employees will not be able to open the encrypted files to the company in any way.
Approval decryption: When communicating with the outside, the documents need to be decrypted. Employees can initiate application decryption. After approval, the administrator decides whether to pass the consent to decrypt. The approved files can be decrypted, and at the same time, multiple people can be set for approval and classified approval.
Permanent control: You can allocate different document permissions according to different personnel to strictly control the scope of confidentiality.
File external issuance control: In order to prevent the recipient from secondary communication and control the use permissions of the recipient, the encrypted file settings of the external issuance can be set to open the time, the number of times, and the number of times will be automatically deleted after expiry.
List of mail: For the recipients of trust, you can set the email whiter list, and automatically decrypt the encrypted files through the white list mailbox.
Mobile office strategies: For colleagues who need to travel, give limited offline licenses, allow going out to continue to use crypto documents, and the document remains encrypted and can only be used on the authorized computer.
File compulsory backup: Forced backup of encrypted files operated by employees, prevent employees from deleting important encrypted documents to cause losses to enterprises.
Software installation method:
Install the easy -control network shield encryption software: install the encrypted server and management terminal, and the encrypted client is installed in the encrypted computer;
Set up encryption strategies: Open the management end, select file encryption -encryption strategy, check the program that needs to be encrypted, such as automatic encryption of document generated by Excel, select the encrypted Excel software to save strategies, and restart the encrypted employee computer.
Test the encryption effect: After being restarted by the encrypted computer, open the Excel table software, create a new document and edit and save. The saved file will display the "lock" logo, as shown below, showing that it has been successfully encrypted.
Implementation effect: The document edited by the employee is automatically encrypted, and the encrypted documentation is not permitted. It will be unable to open it through any ways to transmit it through QQ, email, U disk, etc. The editor -in -chief of interoperability is not affected. Thoroughly guarantee the security of data from the source. In addition, if you need to send a document, you can authorize the decryption process through the application of the decryption process. At the same time, other software can be encrypted, such as office software, design software, engineering software, programming software, R & D software, etc.
it works
it works
it works