• <abbr id="ck0wi"><source id="ck0wi"></source></abbr>
    <li id="ck0wi"></li>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li><button id="ck0wi"><input id="ck0wi"></input></button>
  • <abbr id="ck0wi"></abbr>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li>
  • Home >

    How Can Client Documents Be "Tall" To Prevent Disclosure?

    2014/5/19 17:11:00 164

    ClientDocumentLeak

       Special attention focused scanning - strengthening pertinence


       File The scan is only for the type defined in the policy, and the scan does not depend on whether the terminal is installing the document editor. The types of documents currently supported include: Word (97-2010), Excel (97-2010), PPT (2003-2010), PDF, TXT, RTF. The parsed document type is interface oriented, and users can customize the type of document concerned according to their actual document application environment. The scope of document checking includes file name, file attribute, file content, and also supports checking of embedded text, such as the Excel table contained in WORD.


      Identification of sensitive documents - improvement Effectiveness


    Document scanning is also a process of keyword matching. In document strategy, sensitive information can be defined as needed, that is, sensitive keywords. All documents containing keywords are marked as sensitive documents. Keywords are server preset or manually added by administrators, which can be single words, but also with different words or combinations, and can also support regular expressions. By tagging documents, management work can only aim at sensitive documents containing key words without requiring all documents to be controlled and audited, thus improving the effectiveness of document management.


    Guard against Leak Protection guarantee reliability


    The document inspection strategy adopts real-time scanning and real-time protection mechanism. When end-users try to copy or transmit a sensitive document through network sharing, U disk, compressed files, e-mail attachments, browsers, etc., the terminal will give information on the violation according to the policy settings, and prevent the document from being transmitted, thereby effectively preventing the spread of sensitive information (leakage), and ensuring the reliability of document management.


    Firewall, private network and intrusion detection can prevent illegal access to external personnel, but can not prevent insiders from sending sensitive documents to others. This is the main way to cause electronic documents to leak. How to balance the high security without hindering the normal work of the staff? The host monitoring and auditing system provides a simple strategy to realize the powerful document protection function.


       Mobile storage protection - protection of comprehensiveness


    If the mobile storage protection is selected in the strategy, the document checking strategy can monitor the mobile storage medium, but the type of the monitored document is limited to the type set in the policy. Mobile storage protection allows end users to copy files that are monitored in mobile storage to local disks, but does not allow new, edited, renamed, copied and cut operations in mobile storage media. Warning messages will be given during violation.


       Encrypting file processing - handling particularity


    Encrypted file processing is used to specify the way to process encrypted files. When choosing to ignore the encrypted file, the policy does not control the encrypted file; instead, when the selection is regarded as a sensitive file, whether the encrypted file contains sensitive keywords, the strategy adds it to the list of sensitive documents, and any operation of the user will be monitored and audited.


       Detailed audit logs - Historical traceability


    Audit information is generated for new documents, modification and other operations of sensitive documents. Audit information includes information such as operator, responsible person IP, operation generation time, operation file path, operation type, operation result, and permitted information. Through a full scan, administrators can fully grasp the sensitive documents that each client owns. At the same time, through the real-time audit function, the administrator can clearly understand when and where the document is executed by the user, and can make timely response to the illegal operation administrator to avoid the leakage of confidential information. It not only achieves user document leakage prevention, but also traceability historical data of document operation.

    • Related reading

    Edoc2 PDMS Cracking Enterprise Project Document Management Problems

    Document management
    |
    2014/4/20 15:37:00
    32

    云存儲時代來臨 企業文檔何去何從

    Document management
    |
    2014/4/20 15:32:00
    14

    兩大高新技術達成合作 文檔管理系統登陸“云”端

    Document management
    |
    2014/4/20 15:27:00
    20

    國家認監委關于對國家文檔軟件產品質量監督檢驗中心授權的通知

    Document management
    |
    2014/4/20 15:22:00
    38

    Information Security: Document Permissions Are The Key To Security Control.

    Document management
    |
    2014/4/20 15:09:00
    17
    Read the next article

    Baby, Children'S Shoes And Children'S Clothing To Catch Brand New Business Opportunities

    After years of development, China's children's shoes children's clothing has gone unanimously toward the development of branding, while the market has gradually matured, and has entered an important stage. With the upgrading of the economic level and the change of consumption concept, the consumption demand of children's shoes and children's clothing market in China has shifted from the past to meet the basic living and practical type, and to turn to the beautiful fashion sty

    主站蜘蛛池模板: 国产91中文剧情在线观看| 久草福利在线观看| 禁忌2电影在线观看完整版免费观看| 毛利兰的胸被狂揉扒开吃奶| 奇米影视777色| 伊人久久大香线蕉avapp下载| 久久精品99久久香蕉国产| 97久久天天综合色天天综合色hd| 色综合久久天天综合| 日本a中文字幕| 国产电影麻豆入口| 人人狠狠综合久久亚洲婷婷 | 国产成人精品永久免费视频| 亚洲av永久无码精品水牛影视 | 亚洲成av人片不卡无码| 中国speakingathome宾馆学生| 午夜免费1000部| 欧美综合亚洲图片综合区| 小妇人电影中文在线观看| 国产乱子伦一区二区三区| 久久99九九99九九精品| 美女脱下裤子让男人捅| 日本媚薬痉挛在线观看免费| 国产主播在线一区| 久久精品国产精品国产精品污| 88国产精品视频一区二区三区| 真实子伦视频不卡| 在线观看国产成人AV片| 亚洲熟妇无码乱子av电影| 香蕉视频污在线观看| 日韩精品电影一区亚洲| 国产欧美在线一区二区三区| 亚洲国产精品网| 黄色香蕉视频网站| 无码人妻精品一区二| 免费看一级做a爰片久久| 99久久伊人精品综合观看| 欧美人与物videos另类xxxxx | 无码人妻精品一区二| 免费国产a国产片高清网站| 92午夜少妇极品福利无码电影|