Sensitive File Interception: Automatically intercept sensitive files based on customised file names and file types to avoid leakage events.
Sensitive content desensitisation: Outgoing documents in the name, contact information, ID card number, bank card number and other basic elements of automatic desensitisation, and support for custom sensitive words.
Multi-virus engine scanning: Combine multiple virus scanning engines, one upload and multiple engines scan in parallel.
Multiple types of storage protocols: SMB, NAS, FTP and various unstructured storage systems are supported.
Multiple Login Authentication Methods: Supports multiple login methods, including face recognition, account password, work card, etc.
Operation logs throughout the record: All user behaviour can be controlled, checked and traced, document content, operation time and personnel and other full-process information records.
File backup: Support multiple file backup strategies, such as full file backup, key file backup, etc.
High availability: Through the special system architecture design, with high availability, to ensure that the system continuous working ability
Dynamic expansion: The system has the ability to dynamically expand capacity, to adapt to the needs of enterprise development
Standard API interface: Support various types of third-party system integration, such as mail, network disc, digital transfer system, ERP, OA, etc.
Multi-terminal form: Multi-type terminal form, comprehensive scene, including hardware switching station, software client, etc.