Plan Golden Armor (Former TFG)
Category: Smart Products Solutions
Exhibitor: SECWARD TECHNOLOGIES INC.
Booth No: N008
Characteristic
Key function:Encryption + Access Control + File Logs and Alerts
File Encryption ‒
Automatically encrypt base on application-defined rules.
Control text and screenshot clipboard copy/paste
Capable to assign different keys to each department to isolate file exchange
Capable to periodically change keys to comply with ISO information security regulations
Outbound file protection mechanism, allowing to configure file permissions.
Control Software Disablement, USB External Storage Devices, Web transmission, and Printing ‒
Software disabling or time-limited
USB read/write Permission Control
Control web file uploads and downloads
Print Control and Watermarking
Detail Log Records of File Operations ‒
Recording local machine, network drive, USB, and other operations such as copying, deleting, and renaming.
Recording file outbound via communication software and printing activities.
Recording specific webpage activities such as file uploads, downloads, copy-paste actions.
Backup Leakage Files, with the ability to quickly filter logs by keyword within the content.
Capture screen images when transmitting files and provide the ability to play them online.
Complete logs of file decryption requests and audit approvals.
Operational Alerts ‒
Set up alerts for high-risk actions, and send immediate alert emails when the threshold is reached.
Capable of monitoring various external transfers and modification counts on local, network drives, and USB devices.
Capable of monitoring the number of files leaked through communication software and browsers.
Capable of monitoring the number or size of files decrypted and released.
File Operation Report ‒
Presenting information about file destinations, outbound channels, and department affiliations.
Rapidly identifying suspicious channels and individuals.
Effective Management of Software and Hardware Assets ‒
Inventorying user assets such as software, hardware, printers, USB devices, etc..
Support for Mobile Devices (Optional) ‒
Compatible with a mobile app for convenient approval.
Receive alerts on your phone for real-time detect anomalies.
It is more convenient to view encrypted files in emails and communication software on mobile phones.
Other Products
Products you may be interested in
Highest Rated Products