SOLUTION

Data Leakage Protection
Purpose
On the premise of doing a good job in data classification and grading, identify and control the scope of sending and recipients of sensitive data, so that sensitive information can be traced, and the way of dissemination and storage can be controlled.
Introduction
Based on content identification technology, this solution provides security protection for financial statements, listed company financial reports, software and hardware development source codes, design drawings, contract texts, etc. that are defined as sensitive texts
Prevent data leakage through mobile storage copy, IM chat tool, email, cloud disk/network disk, printing, scanning and faxing
Measures of record, alarm and block are adopted for the behavior of user leakage, and the user behavior is audited
Effectively identify sensitive data, monitor the usage of sensitive data, and prevent leakage of sensitive data
Effectively cultivate and improve employees' awareness of confidentiality of sensitive documents
Value
Relying on the experience and advantages of its own information security consulting services, do a good job in the programmatic requirements of data classification and grading, and conduct senior management propaganda and implementation and employee data protection awareness training
Based on years of research on data leakage prevention products at home and abroad, according to the current solution of different customers, recommend suitable manufacturers to communicate with customers
Avoid the fatigue and workload caused by customers' direct contact with various types of manufacturers, and improve the efficiency of model selection
Glorytime has established a long-term cooperative relationship with mainstream data leakage prevention manufacturers at home and abroad, and helps customers save costs through channel prices
Glorytime can participate in the discussion and formulation of the plan as a consultant to reduce the workload of customers
Glorytime can be used as the supervision company for the implementation of the plan, and carry out project management and quality control
Data Protection Principles project-thumb
Identify sensitive information through the network (deploy network identification equipment) project-thumb

SOLUTION

Comprehensive document management
Purpose
Manage documents in a reasonable way, and effectively reduce the risk of leakage and cost of enterprise core data
Introduction
The traditional management method adopts local management, which is similar to the current popular enterprise NAS file management
Cloud management method, establish the enterprise's own private cloud, which can be accessed and managed internally and externally, and realize document management
The comprehensive management method, through the combination of traditional and cloud management methods, classifies enterprise documents and core data and manages them according to permissions to meet the different needs of access, modification, storage and dissemination.
Value
Relying on the experience and advantages of its own information security consulting services, do a good job in the system requirements for data access, and conduct senior management propaganda and implementation and employee information security awareness training
Based on years of research on document management products at home and abroad, select and provide suitable implementation methods for customers to meet management requirements
Glorytime has established a long-term cooperative relationship with mainstream data leakage prevention manufacturers at home and abroad, and helps customers save costs through channel prices
Glorytime can participate in the discussion and formulation of the plan as a consultant to reduce the workload of customers
Glorytime can be used as the supervision company for the implementation of the plan, and carry out project management and quality control.
Features
project-thumb
Full text search engine
Intelligent full-text search engine, allowing users to quickly and easily find the required documents
project-thumb
Directory multi-level classification
It truly supports infinite classification of catalogs, adapting to a variety of filing and classification requirements
project-thumb
Information Integration
Powerful integration capabilities, allowing knowledge documents to be automatically collected from various systems or matters
project-thumb
Multi-dimensional access control
Provide more than 20 permission controls such as sharing, downloading, printing, and copying
project-thumb
Information Security Control
128-bit encryption algorithm, custom encryption technology, multi-pronged approach to ensure traffic security
project-thumb
Directory decentralization management
Realize that the knowledge documents of the group headquarters and subordinate companies can be operated independently or shared with each other
project-thumb
Application Scenario Design
According to the needs of enterprise management and work, various knowledge application scenarios can be formulated to form a knowledge map
project-thumb
Multiple formats supported
Support online reading in various document formats such as PPT, Word, Excel, PDF, TXT, etc.

SOLUTION

Internet Behavior Management
Purpose
Effectively prevent employees from engaging in network behaviors that have nothing to do with work
Improve bandwidth resource utilization
Avoid leaks and regulatory risks, and ensure intranet data security (combined with data leakage prevention products)
Visual management and comprehensive control of wireless AP
Introduction
Online behavior management
Information Control
Wireless Network Management
Application Control
Illegal hotspot control
Flow Control
Behavior analysis
Value
Provide unified online behavior management solutions for Internet egress, 10G environment, and wired and wireless
Combined with the data leakage prevention management system, it comprehensively guarantees the hierarchical authorization and access records of data, and complies with industry audit and regulatory norms.

SOLUTION

Enterprise Management Cloud
Purpose
Effectively prevent the occurrence of leaks through the terminal
Significantly reduce desktop operation and maintenance costs
Introduction
The desktop cloud comprehensive solution is composed of thin clients, virtual desktop controllers, virtual machine management software, server storage devices, etc., to realize the unified deployment of corporate employees' office desktops on the server, and then through the network (local area network or wide area network). The system is quickly delivered to employees, and employees can access the office anytime and anywhere through various types of terminal devices such as thin clients, notebooks, mobile phones, and tablets, creating a new desktop office model.
Value
One of the landing plans after consultation is a thorough solution to the traditional desktop management system.