• <abbr id="ck0wi"><source id="ck0wi"></source></abbr>
    <li id="ck0wi"></li>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li><button id="ck0wi"><input id="ck0wi"></input></button>
  • <abbr id="ck0wi"></abbr>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li>
  • Home >

    Four Trends In Pparent Document Encryption

    2011/3/31 17:44:00 131

    Transparent Encryption For Document Management

    Foreword: data security has been paid more and more attention by government, army, military units and enterprise users.

    Various types of encryption software have been gradually used, to a certain extent, reduce the risk of data leakage, and play a role in protecting data security.

    However, data leakage is not just an encryption software, but it can solve the problem.

    The improvement of information level and the increase of data leakage risks coexist. Users have already put forward more, higher and higher demands on data security. Only by grasping the needs of users can we clearly see the future of pparent encryption industry.


    Transparent encryption is just the beginning.


    Since 2002, a software industry that aims to encrypt core data and prevent insider leaking has begun to rise and develop rapidly. This is often referred to as the "electronic document security industry", or "encryption industry".

    The encryption industry usually adopts pparent encryption technology to enforce mandatory, real-time and pparent encryption of different types of electronic documents, and protect them from the whole process of file creation, storage, use, circulation and destruction.

    Even if the document is lost to the outside, it can not be opened because of encryption, ensuring that core secrets are not leaked.

    This industry is often referred to as the "pparent encryption industry".


    Encryption software has been widely used.

    In China, a large number of users, such as government, army, military industry, manufacturing industry, communication industry, R & D and design industry, have adopted encryption software.

    A group of influential users such as the Ministry of foreign affairs, the Jiuquan satellite launch center, the Second Artillery Force of the people's Liberation Army, China Mobile group, CHINT group, BYD, Chinese communications, and BOE, etc., after using encryption software, have very high evaluation of the encryption software.

    There are also a large number of encryption software companies headed by a large number of Beijing Internet company, which is estimated to have nearly 300.

    From the sales situation, the encryption industry was less than 100 million yuan in 2006, and it reached 110 million yuan in 2007. In 2008, the estimated total market will reach 170 million yuan, which is expected to reach 380 million yuan in 2010.

    The annual growth rate of encryption software market is over 50%, and sales account for 6.34% of the total information security market.


    Although the development of encryption software industry is booming, encryption software is only one of the core components of data leakage protection. It is impossible for encryption software to assume all functions of data leakage protection.

    From the perspective of the development of information security, encryption software is only the beginning of data security.


    One of the trends is:


     

    Intelligent dynamic encryption and decryption

    Will become the development direction of encryption software.


    There are two ways to encrypt the encryption software. One is automatic, compulsory and pparent encryption. The other is manual encryption. The latter is mainly determined by the content of the document's author or document administrator to encrypt the documents manually.


    Although the two encryption methods satisfy the needs of users to some extent, they are not the final solution.

    For users, encryption software also needs the following functions:


    1, the system automatically identifies the contents of the document and determines whether it belongs to the classified document. This is because, for mandatory encryption software, only file types are encrypted.

    The encryption for file types will encrypt all types of files, but the core data of most enterprises only account for 5% to 10%. If you want to encrypt files of the file type, there must be a large amount of decryption work when the files need to be sent to the outside world. This will reduce the work efficiency. If you use second encryption methods and manually encrypt, you will not be able to prevent the author or file administrator from divulging the documents before encrypting them.


    2, the system automatically encrypt documents that are classified as classified. For manual encryption, encrypted files can only ensure that the next user of the document will not divulge secrets, but can not prevent the document's creator or document manager from divulge.

    To prevent manual encrypted leak, encryption software must have the function of automatically encrypt confidential documents.


    Integrating the functions of the existing encryption software and the needs of users, the existing encryption software still can not fully meet the needs of users, so the next generation of encryption software should be intelligent and dynamic encryption software.

    {page_break}


    Trend two:


    Document encryption will integrate with the functions of document storage, backup and disaster recovery, and become the overall solution of document management.


    Symantec CEO John Thompson said: "I believe we will find that the boundaries between archiving, backup and disaster recovery are getting blurred."

    He added: "the individual products you purchased in the past will come together. As a whole solution, you will have better performance and will enable you to manage your information more effectively."

    Mr. John Thompson's prediction is correct, but there is still one missing point, that is, document encryption.

    Document encryption will also be integrated with document archiving, backup, disaster recovery and other functions into a document management overall solution.


    Document encryption and backup of documents and disaster recovery are the same as solving data security problems. Therefore, backup and disaster recovery of documents have natural affinity with document encryption.

    Under the new security threat situation, content based deep security analysis has become a hot topic of data security at present, including depth analysis based on feature matching and content analysis technology based on behavior recognition.

    From the creation, use, circulation, storage and destruction of the entire life cycle of documents, it inevitably includes the protection of documents.

    The means of document security protection can be subdivided into: document encryption processing, document backup, document storage management, document disaster recovery and so on.


    Judging from the current market applications, for small and medium users, it is still the majority of users who purchase encrypted software separately.

    But for large enterprise users, generally do not directly purchase encryption software, but through the system integrator, corresponding to the entire document management needs, to develop a complete document management solution.

    In the long run, the integration of document encryption and document management is a big trend.


    Trend three:


    Encryption software is integrated into the data leakage protection (DLP) system and becomes part of the DLP solution.


    The basic idea of early encryption software is to encrypt the core documents, control the use of documents from the source, and prevent disclosure.

    However, with the development of information technology and management concepts, the single encryption function can no longer meet the needs of current users.


    Many encryption software vendors are still at a fairly elementary stage in the product design concept. They consider the encryption software as a product only, and think that as long as the function of the encryption software is more complex, the stability and security will be higher enough.

    However, judging from the trend of the development of information security, this idea is rather primitive.

    {page_break}


    In terms of information security management, the concept of multi-level protection is already the mainstream.

    In many areas of a network, layered protection of various schemes is usually adopted to ensure information security. This method can avoid the failure of single point security defense.

    Although the encryption software combines the functions of authentication, permission management, automatic backup, log audit and so on, it already has the rudiment of hierarchical protection. However, from the products in the market, these functions are relatively simple and have not been thoroughly done.


    From the perspective of international and domestic information security vendors, the integration of document encryption software into data leakage protection (DLP) system has become the mainstream.

    This can be seen from the increasing tide of mergers and acquisitions among foreign information security vendors.

    Sophos acquired Utimaco, McAfee, a German data security company, and bought SafeBoot last autumn.

    At home, China's earliest encryption software company and leader, Beijing Internet company, also foresaw this trend, and rapidly developed its product line since 2007. From a simple encryption software company, it has become the first provider of the overall solution provider of data leakage protection products in China.


    Trend four:


    With the wide application of virtualization technology, data leakage protection (DLP) will become the best solution for data security.


      

    Virtualization

    It is the pformation of physical resources into logically manageable resources, breaking the barriers between physical structures, and physical resources running pparently on all kinds of physical platforms. The management of resources will be carried out in a logical way, thus fully realizing the automatic allocation of resources.

    Virtualization is the trend of IT, including server virtualization, storage virtualization, network virtualization, terminal virtualization, desktop virtualization, and so on.


      

    Encryption software

    Most of them use C/S framework to encrypt documents on physical location such as hosts, servers and terminals.

    Virtualization technology will have a huge impact on encryption software, first of all, the virtualization of terminals.

    Because the terminal no longer stores documents, all documents will be stored on the virtual server. The documents operated by the terminal are only virtual image files, so they do not need to manage the local documents.

    The influence of storage virtualization is more direct.

    Virtual storage will store the document in a virtual area, no longer stored like the old one or uploaded to the server.

    Network virtualization will make great changes in the way of document circulation. The virtualization of servers will make the storage location of documents more disorder.


    Taking all these factors into account, the document management and encryption software in the era of virtualization will be useless, instead of data leakage protection (DLP).

    DLP is a complete data security protection system. It will intelligently filter documents, distinguish documents from secret or ordinary documents, and then encrypt confidential documents automatically, compulsorily and pparently.

    In the creation, use, pfer and storage of documents, the technology of "tracking encryption" will be adopted.

    At the same time, DLP will prevent illegal users from connecting to virtual servers through effective terminal management, network boundary management, e-mail management and network access management, and prevent secret information from illegally exporting internal networks.

    And when confidential documents are pferred to the internal network, they can also manage classified documents.


     

    • Related reading

    Status Of Document Management In Knowledge Management

    Document management
    |
    2011/3/31 17:40:00
    65

    Differences Between Knowledge Management And Document Management

    Document management
    |
    2011/3/31 17:35:00
    57

    Database Management

    Document management
    |
    2011/3/14 16:54:00
    87

    Computerization Strategy For Document Management

    Document management
    |
    2011/3/4 10:31:00
    93

    Document Management Model

    Document management
    |
    2011/1/14 17:49:00
    89
    Read the next article

    Face Injury &Nbsp, All Hair Stylist.

    主站蜘蛛池模板: 浮力影院亚洲国产第一页| 真实国产乱子伦在线视频不卡| 亚洲欧美日韩精品专区| 亚洲黄色激情视频| 亚洲国产高清美女在线观看| 大西瓜pron| 亚洲一区二区免费视频| 九歌电影免费全集在线观看| 久久久噜噜噜久久中文字幕色伊伊| 亚洲深深色噜噜狠狠爱网站| 亚洲中文字幕在线观看| 久久久久999| 99在线精品视频在线观看| wwwxx在线| 美女网站色在线观看| 里番acg※里番acg本子全彩| 黄色网页在线免费观看| 黄网站在线观看| 精品国产第一国产综合精品| 欧美综合在线视频| 欧美成人一区二区三区在线观看 | 好大好爽快点视频| 国产视频一区在线观看| 国产凌凌漆国语| 人妻av无码一区二区三区| 久久精品国产96精品亚洲| freehdxxx2018| 668溜溜吧成人影院| 色综合久久天天影视网| 欧美日韩人妻精品一区二区三区 | 狠狠综合久久综合88亚洲| 樱花草在线播放免费| 欧美、另类亚洲日本一区二区 | 亚洲日本一区二区一本一道| 亚洲日韩精品欧美一区二区一 | 国产三级三级三级三级| 你懂的在线播放| 亚洲欧洲在线播放| 久久精品国产亚洲AV蜜臀色欲| 九色视频在线观看| gav男人天堂|