Facing the general needs of enterprises and institutions, adhering to the core concept of "making anti-leakage management simpler and more effective", and based on the successful application experience of a large number of customers, the "Yuyun Enterprise Protection EDP Professional Edition" was launched. The functions of this version mainly include file encryption, file outgoing control, print content monitoring, intranet behavior management, extranet security management, file management control, email whitelist management, and USB disk authentication management.
The drawing file encryption module is a kernel-driven layer encryption system developed to prevent electronic drawings from being leaked by internal employees of the unit. On the premise that it does not affect any normal operation of the computer by employees, drawing files are forced to be automatically encrypted by the system when they are copied, created, and modified. Encrypted drawing files can only be used normally on the internal computer of the unit. Once they are separated from the internal network environment of the unit, they will be garbled or cannot be opened when used on external computers. The drawing file can only be used normally after it is decrypted by the administrator and taken out of the unit.
If you need to send out drawing files, you only need to apply for outgoing, and then they can be sent out in plain text after being reviewed and confirmed by the unit's senior management. At the same time, you can also set the number of times to open the outgoing files, the validity period of use, whether to open on the designated computer, etc., effectively preventing Secondary diffusion of outgoing documents.
Monitor printing behavior, record printing information completely and truly, and provide rich logs and reports, allowing managers to effectively observe and control printing resources, and prevent printing leaks!
Effective desktop and behavioral management of computers within the unit's internal LAN, including setting up software's black and white lists, remote assistance, screen recording, computer asset management, ARP firewall, window monitoring, chat tool control, etc.
Comprehensive control of unit WAN traffic provides network managers with network usage analysis and prediction. Through traffic grouping settings, unit bandwidth allocation is optimized and website black and white lists can be set to effectively improve work efficiency.
The mobile U disk authentication management system is a system for registering and authenticating U disks, and manages U disks connected to the unit. Only USB flash drives that have been certified in advance can be used in the unit.
Manage and control the unit's electronic documents, and grant different operating permissions to different folders on the document server according to different users, including whether a certain folder can be seen, whether local files can be uploaded to the server's folder, whether You can delete settings such as files in folders on the server. At the same time, there is a confidentiality level in internal document control, and only permitted personnel can view the contents of the document.
it works
it works
it works