Audit report query and export in Excel format
Different permission levels for different roles (administrator, auditor, and normal user)
Support of Word, Excel, Power point, PDF file encryption
By personal or group directory or file access permission
directory permission management (upload, download overall control)
Create / delete directory
File search
Active update of permission for each file (reading, modification, print, offline reading, copy, save-as, document expiration).
Compatible to any file format for sharing
File upload / download / update / delete / recovery
CRO (EDSS system administrator ) management operation:
User operation:
The functions include: document policy establishment, document policy modification, document policy deletion, document access, modification, printing, offline reading, content copy, file-saving in different format, document expiration.
Administrator record tracing and query.
Off-line reading.
The Client Agent software is required to enable the user directly control the document in the local environment.
Effectively prevent picture capture and screen capture applications.
Document acess permission (document policy) settings:
Document authorization policy management and document encryption / decryption.
Compatible to Office 2000/XP/2003, Acrobat 5.0 ~ 6.0, and Acrobat Reader 5.5 ~ 6.0
Cetificate status maintenance ( regular update of certificate status from each CA )
Compatible to multiple CA certificate types. ( Citizen digital certificate, MOEA certificate, and financial institution certificate)
PKI log-on verification mechanism (A user can register multiple certificates and log on with any one of them.)
As information security events such as data exposure are increasing dramatically, the control over confidential documents has become one of main concerns among enterprises in Taiwan. The control mechanism of internal confidential documents can no longer be taken as a long-term goal for the vague future, while the damages caused by the exposure of the confidential information can no longer be estimated by financial figures. Hence, to implement the security control over confidential documents, EDSS Enterprise Document Security Control System enables the user to establish comprehensive and well-defined classification for data assets such as MS Office documents (Word, Excel, and Power Point), and PDF files and offer different protections for confidential level control. These top-notch functions can significantly limit the possibility of information exposure and protect the intellectual properties.
PKI log-on verification mechanism (A user can register multiple certificates and log on with any one of them.)
Type: | System Utilities & Maintenance |
Remote Command and O&M Platform is based on B/S structure and designed to manage DSII/DSIII Device and monitor the system health in real-time, with web-KVM and video wall management features for remote command and control. DS/X User Logs Software is another optional software ...
IT Shaala Java Fullstack | Python Fullstack | Software Testing | Placement | Data Science | MERN Stack | MEAN Stack IT Shaala is a leading educational institute in Pune, specializing in IT Language courses. With a focus on Java Fullstack, Python Fullstack, Software Testing, ...
Come From IT Shaala Pune
Prodigy Player Pro Prodigy Player Pro is a rapid prototyping software that works with the FPGA-based prototyping platforms from S2C. Prodigy Player Pro plays three roles in speeding your development process - it configures the prototype, runs remote system management and ...
Come From S2C Limited