• <abbr id="ck0wi"><source id="ck0wi"></source></abbr>
    <li id="ck0wi"></li>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li><button id="ck0wi"><input id="ck0wi"></input></button>
  • <abbr id="ck0wi"></abbr>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li>
  • Home >

    How Can Client Documents Be "Tall" To Prevent Disclosure?

    2014/5/19 17:11:00 164

    ClientDocumentLeak

       Special attention focused scanning - strengthening pertinence


       File The scan is only for the type defined in the policy, and the scan does not depend on whether the terminal is installing the document editor. The types of documents currently supported include: Word (97-2010), Excel (97-2010), PPT (2003-2010), PDF, TXT, RTF. The parsed document type is interface oriented, and users can customize the type of document concerned according to their actual document application environment. The scope of document checking includes file name, file attribute, file content, and also supports checking of embedded text, such as the Excel table contained in WORD.


      Identification of sensitive documents - improvement Effectiveness


    Document scanning is also a process of keyword matching. In document strategy, sensitive information can be defined as needed, that is, sensitive keywords. All documents containing keywords are marked as sensitive documents. Keywords are server preset or manually added by administrators, which can be single words, but also with different words or combinations, and can also support regular expressions. By tagging documents, management work can only aim at sensitive documents containing key words without requiring all documents to be controlled and audited, thus improving the effectiveness of document management.


    Guard against Leak Protection guarantee reliability


    The document inspection strategy adopts real-time scanning and real-time protection mechanism. When end-users try to copy or transmit a sensitive document through network sharing, U disk, compressed files, e-mail attachments, browsers, etc., the terminal will give information on the violation according to the policy settings, and prevent the document from being transmitted, thereby effectively preventing the spread of sensitive information (leakage), and ensuring the reliability of document management.


    Firewall, private network and intrusion detection can prevent illegal access to external personnel, but can not prevent insiders from sending sensitive documents to others. This is the main way to cause electronic documents to leak. How to balance the high security without hindering the normal work of the staff? The host monitoring and auditing system provides a simple strategy to realize the powerful document protection function.


       Mobile storage protection - protection of comprehensiveness


    If the mobile storage protection is selected in the strategy, the document checking strategy can monitor the mobile storage medium, but the type of the monitored document is limited to the type set in the policy. Mobile storage protection allows end users to copy files that are monitored in mobile storage to local disks, but does not allow new, edited, renamed, copied and cut operations in mobile storage media. Warning messages will be given during violation.


       Encrypting file processing - handling particularity


    Encrypted file processing is used to specify the way to process encrypted files. When choosing to ignore the encrypted file, the policy does not control the encrypted file; instead, when the selection is regarded as a sensitive file, whether the encrypted file contains sensitive keywords, the strategy adds it to the list of sensitive documents, and any operation of the user will be monitored and audited.


       Detailed audit logs - Historical traceability


    Audit information is generated for new documents, modification and other operations of sensitive documents. Audit information includes information such as operator, responsible person IP, operation generation time, operation file path, operation type, operation result, and permitted information. Through a full scan, administrators can fully grasp the sensitive documents that each client owns. At the same time, through the real-time audit function, the administrator can clearly understand when and where the document is executed by the user, and can make timely response to the illegal operation administrator to avoid the leakage of confidential information. It not only achieves user document leakage prevention, but also traceability historical data of document operation.

    • Related reading

    Edoc2 PDMS Cracking Enterprise Project Document Management Problems

    Document management
    |
    2014/4/20 15:37:00
    32

    云存儲時代來臨 企業文檔何去何從

    Document management
    |
    2014/4/20 15:32:00
    14

    兩大高新技術達成合作 文檔管理系統登陸“云”端

    Document management
    |
    2014/4/20 15:27:00
    20

    國家認監委關于對國家文檔軟件產品質量監督檢驗中心授權的通知

    Document management
    |
    2014/4/20 15:22:00
    38

    Information Security: Document Permissions Are The Key To Security Control.

    Document management
    |
    2014/4/20 15:09:00
    17
    Read the next article

    Baby, Children'S Shoes And Children'S Clothing To Catch Brand New Business Opportunities

    After years of development, China's children's shoes children's clothing has gone unanimously toward the development of branding, while the market has gradually matured, and has entered an important stage. With the upgrading of the economic level and the change of consumption concept, the consumption demand of children's shoes and children's clothing market in China has shifted from the past to meet the basic living and practical type, and to turn to the beautiful fashion sty

    主站蜘蛛池模板: 亚洲av无码国产精品色 | 日韩精品专区av无码| 国产91精品高清一区二区三区| 国产精品香蕉在线| 国产午夜在线视频| 香港三级日本三级三级韩级2| 欧美人体一区二区三区| 国产99视频精品免视看7| 老司机福利在线免费观看| 午夜视频免费国产在线| 久久久久亚洲AV无码麻豆| 日本丰满毛茸茸**| 一个人看的www免费高清| 国产高清在线精品一区| 欧美人与牲动交xxxxbbbb| 国产一国产一级毛片视频在线 | 一级特级黄色片| 国产综合色在线视频| 韩国午夜理伦三级2020韩| 又色又爽又黄的视频网站| 欧美精品色婷婷五月综合| 久久精品中文字幕| 女同午夜三级在线观看| …久久精品99久久香蕉国产| 国产精品天天在线午夜更新| 草莓视频成人在线观看| 亚洲精品美女久久久久99| 日韩在线看片免费人成视频播放| zooslook欧美另类dogs| 国产成人精品久久一区二区三区 | 亚洲人成色7777在线观看不卡| 日本换爱交换乱理伦片| 久久久久国色av免费观看| 奇米影视7777久久精品| 91精品久久久久| 四虎精品成人免费视频| 欧美色欧美亚洲高清在线视频| 亚洲欧洲在线播放| 成年女人在线视频| aaaa级少妇高潮大片在线观看| 在线亚洲人成电影网站色www|