top of page
回功能說明

功能說明

錨點 1
DVC文件保險系統 各部門運用情境
如何加密
Worried about how to quickly encrypt sensitive data on your personal computer?

Select... [Encrypt after scanning], and encrypt the file name and sub-file name you specified in the background at a speed of 20G~50G per minute for encryption protection.

1.png
Employees are about to leave, how to quickly decrypt the sensitive data on the personal computer?

Select...[Decrypt after scanning], and encrypt the file name and sub-file name you specified in the background at a speed of 20G~50G per minute for decryption protection.

2.png
Encryption Slot/Decryption Slot

Designate multiple network folders as encrypted slots, the files inside will remain encrypted, and only the supervisor can decrypt them

Make sure that sensitive data in this folder remains encrypted. Cannot be used by outsiders.

3.png
backup mechanism

After the employee leaves the company, all the hard work invested by the boss is taken away by the employee. Have you ever thought about backing up the files on the personal computer to FTP storage every day through the DVC backup mechanism?

Prevent resignation without leaving documents

Files cannot be quickly recovered after preventing hijacking software attacks

Prevent computer hardware damage

The most effective remedies to prevent file loss in various circumstances

4.png
controlled software

Are you still worried that the software used by the company is too special to be encrypted?

DVC built-in up to 400 common software types

5.png
custom software

DVC allows MIS to customize software and file formats, without relying on the original factory and paying

6.png
Upload web page decryption

The biggest weakness of the encryption system is the inability to upload webpages for decryption
It will cause each file to be decrypted by the supervisor, which is a waste of time
The encryption and decryption function of the DVC website is capable of uploading and decrypting. As long as the network domain is correct, there is no need to find a supervisor to decrypt and then upload the file to the website.

7.png
Encrypted file sub-rights management

1. The company installs DVC, and the boss wants to limit the RD data to RD only.

When DVC encrypts files, it will automatically bring in applications that can be opened by anyone, subdivided into [read-only] [no printing] [open time], for you to use freely.

8.png
Employee offline file control

DVC offline control file enable function

When the computer is disconnected from the main console, the number of minutes is not set, which means that the encrypted files and protection functions will take effect even if the employees are offline.

When the computer is disconnected from the main console and connected, if it is set to 20,000 minutes, it means that employees can only open encrypted texts for about two weeks when they are offline [or on a business trip].

Of course, it can also prevent files from being opened and used by interested people after the laptop is lost.

9.png
Audit authority agent

Audit supervisor is often out of office

DVC has designed an automatic agent mechanism,

Let the applicants send the application notice as well,

But [agent] handles the decryption application.

11.png
How an Employee Can Request Declassification from a Supervisor

Encrypted files can be opened and edited inside.

If an external vendor needs this file, you can find a supervisor or agent to decrypt it

申請解密.png
​Application for decryption report

Where the applicant applies for declassification, the supervisor agrees. The time, document, and consent are all recorded in detail​

12.png
read online

The new external control technology [online reading] means that the manufacturer receives a set of URL links, you only need to make sure that the URL you copied is correct, and the external manufacturer can open the file online. Of course, to maintain the excellent lineage of DVC, there are still multiple control items such as time, frequency, watermark, and password, and it is super simple.

線上閱讀機制.png
Online reading URL

External manufacturers directly click on the URL to support PCs, mobile phones and other devices.

Direct online reading, the implementation of documents and archives does not land.

線上閱讀二.png
mail white list

If this vendor has been cooperating with you for many years, even as a source of technology, do you still need to protect this vendor?

​Therefore, DVC has designed a [Mail Whitelist], which will automatically decrypt when it is sent to this manufacturer

13.png
Client Report Statistics

Record DVC users' decryption, opening, copying, printing, renaming, deleting files, and other related actions.

14.png
host integrity

DVC host has

Install on the fly

Synchronize and backup organizational policies with AD on a regular basis

Host disconnection does not affect user use

Waiting for three major features

主機備份還原.png
AD同步

After installing the DVC main console, by synchronizing AD regularly, you can ensure that the registered users are consistent with AD

And by regularly backing up organizations and policies, it is ensured that users will not be affected and users can be quickly restored when a disaster occurs.

AD.jpg
Watermark

Let encrypted files be prohibited from being "copied to non-encrypted files" and "prohibited screenshot function", but if you are still worried about the file being opened arbitrarily to take pictures, there are two methods of watermark printing display and screen display to provide you with more advanced Protect

浮水印.png
如何解密
加解密槽
備份機制
受控軟體
自訂軟體
上傳網頁解密
加密文件權限管理
員工離線文件管制
稽核代理人
申請解密
申請解密報表
線上閱讀
用戶端報表統計
主機完整性
AD同步
線上閱讀URL
郵件白名單
浮水印
desktop watermark

Make every page important, full of safety, no need to worry

​DVC not only has printing watermarks and screen watermarks, but also adds desktop watermarks in the new version 6.0.

桌面浮水印.png
桌面浮水印
DVC alarm system

Details, nothing to hide. Give more power to management

The client has reached various thresholds, and this function cannot be used any more today

mass delete

mass copy

Bulk Copy USB

mass printing

Lots of decryption...

15.png
DVC告警系統
DVC USB client

Encrypted external communication, more convenient, smarter and faster communication

​If the external file needs to be edited by the manufacturer in an encrypted state, it is necessary to install the client, DVC’s USB client, so that the client that the manufacturer must install should be changed to a plug-in type, so as to ensure that the manufacturer will not resist and troublesome operation, and ensure that The research and development map has never been decrypted, and it can achieve the characteristics of joint editing.

USB.png
DVC USB用戶端
DVC Supplier Platform

Uploading is simple and the file is stable

供應商1.png
DVC供應商平台
bottom of page