EDSS software

  Audit report query and export in Excel format

  Different permission levels for different roles (administrator, auditor, and normal user)

  Support of Word, Excel, Power point, PDF file encryption

  By personal or group directory or file access permission

  directory permission management (upload, download overall control)

  Create / delete directory

  File search

  Active update of permission for each file (reading, modification, print, offline reading, copy, save-as, document expiration).

Compatible to any file format for sharing

  File upload / download / update / delete / recovery

  CRO (EDSS system administrator ) management operation:

  User operation:

The functions include: document policy establishment, document policy modification, document policy deletion, document access, modification, printing, offline reading, content copy, file-saving in different format, document expiration.

  Administrator record tracing and query.

 Off-line reading.

  The Client Agent software is required to enable the user directly control the document in the local environment.

  Effectively prevent picture capture and screen capture applications.

  Document acess permission (document policy) settings:

  Document authorization policy management and document encryption / decryption.

  Compatible to Office 2000/XP/2003, Acrobat 5.0 ~ 6.0, and Acrobat Reader 5.5 ~ 6.0

  Cetificate status maintenance ( regular update of certificate status from each CA )

  Compatible to multiple CA certificate types. ( Citizen digital certificate, MOEA certificate, and financial institution certificate)

ID Confirmation

  PKI log-on verification mechanism (A user can register multiple certificates and log on with any one of them.)

As information security events such as data exposure are increasing dramatically, the control over confidential documents has become one of main concerns among enterprises in Taiwan. The control mechanism of internal confidential documents can no longer be taken as a long-term goal for the vague future, while the damages caused by the exposure of the confidential information can no longer be estimated by financial figures. Hence, to implement the security control over confidential documents, EDSS Enterprise Document Security Control System enables the user to establish comprehensive and well-defined classification for data assets such as MS Office documents (Word, Excel, and Power Point), and PDF files and offer different protections for confidential level control. These top-notch functions can significantly limit the possibility of information exposure and protect the intellectual properties.

PKI log-on verification mechanism (A user can register multiple certificates and log on with any one of them.)

  • Type:System Utilities & Maintenance
  • Country:Taiwan
  • telephone:886-886-2-2222-8861
Type: System Utilities & Maintenance
*Your name:
*Your Email:
*To:Foongtone Technology
*Subject:
*Message:
Enter between 20 to 3,000 characters. English only.     Characters Remaining: 0 / 3000
*Enter the secure code shown below Mfrbee security Image      Reload Image

We do inquire for you , please wait ...

Optional Platform/Software for DS.X

Remote Command and O&M Platform is based on B/S structure and designed to manage DSII/DSIII Device and monitor the system health in real-time, with web-KVM and video wall management features for remote command and control. DS/X User Logs Software is another optional software ...

Come From Guangdong AVCiT Technology Holding Co., Ltd.

IT Shaala Java Fullstack | Python Fullstack | Software Testing | Placement | Data Science | MERN Stack | MEAN Stack

IT Shaala Java Fullstack | Python Fullstack | Software Testing | Placement | Data Science | MERN Stack | MEAN Stack IT Shaala is a leading educational institute in Pune, specializing in IT Language courses. With a focus on Java Fullstack, Python Fullstack, Software Testing, ...

Come From IT Shaala Pune

S2C Prototyping Software Prodigy Player Pro

Prodigy Player Pro Prodigy Player Pro is a rapid prototyping software that works with the FPGA-based prototyping platforms from S2C. Prodigy Player Pro plays three roles in speeding your development process - it configures the prototype, runs remote system management and ...

Come From S2C Limited