DATACLOAK LOGO

Craftsmanship Spirit, Continual Innovation

  • Leading Technology

    • Kernel-level secure workspace to control a series of system screenshots, keyboard operations, external devices and other behaviors
    • High-strength disk encryption technology, strict key management system to ensure the security of data calculation and storage
    • Mutual authentication and end-to-end Data Communication channel to ensure the security of data transmission
    • Secure classification management of data, establishment of software-defined data flow perimeters
    • AI-driven adaptive security, intelligent identification of business scenarios, automated generation of fine-grained network, application, identity security policies
  • Ultimate Experience

    • All apps are available by dragging them into the secure workspace with one click
    • Personal space and workspace are isolated, which meets the security control without affecting the personal privacy of employees
    • Support Windows, macOS, Linux, Android, iOS, and keep consistent with the operating habits of the native system, no extra learning for employees
    • After one-click installation on endpoint, the administrator can visually manage the enterprise employees through friendly graphical interface of the administrative console
  • Fast Delivery

    • Whether the office environment is in a local data center or relies on cloud providers such as Ali Cloud, Tencent Cloud, AWS, etc., it can be easily accessed
    • Support SaaS services, local terminal installation, remote control in the cloud, easy to complete the deployment within only 1 hour
  • Industry Best Practices

    • Successfully implemented by over 100+ large enterprise customers
    • Widely used in many scenarios, including BI, R&D management, outsourcing services, cross organizational cooperation and WFH etc.
    • Flexible access for all kinds of enterprises, no matter it's a large enterprise customer or a small company

Craftsmanship Spirit, Continual Innovation

Industry Best Practices

  • Successfully implemented by over 100+ large enterprise customers
  • Widely used in many scenarios, including BI, R&D management, outsourcing services, cross organizational cooperation and WFH etc.
  • Flexible access for all kinds of enterprises, no matter it's a large enterprise customer or a small company

Leading Technology

  • Kernel-level secure workspace to control a series of system screenshots, keyboard operations, external devices and other behaviors
  • High-strength disk encryption technology, strict key management system to ensure the security of data calculation and storage
  • Mutual authentication and end-to-end Data Communication channel to ensure the security of data transmission
  • Secure classification management of data, establishment of software-defined data flow perimeters
  • AI-driven adaptive security, intelligent identification of business scenarios, automated generation of fine-grained network, application, identity security policies

Ultimate Experience

  • All apps are available by dragging them into the secure workspace with one click
  • Personal space and workspace are isolated, which meets the security control without affecting the personal privacy of employees
  • Support Windows, macOS, Linux, Android, iOS, and keep consistent with the operating habits of the native system, no extra learning for employees
  • After one-click installation on endpoint, the administrator can visually manage the enterprise employees through friendly graphical interface of the administrative console

Fast Delivery

  • Whether the office environment is in a local data center or relies on cloud providers such as Ali Cloud, Tencent Cloud, AWS, etc., it can be easily accessed
  • Support SaaS services, local terminal installation, remote control in the cloud, easy to complete the deployment within only 1 hour

Industry Best Practices

  • Successfully implemented by over 100+ large enterprise customers
  • Widely used in many scenarios, including BI, R&D management, outsourcing services, cross organizational cooperation and WFH etc.
  • Flexible access for all kinds of enterprises, no matter it's a large enterprise customer or a small company

Leading Technology

  • Kernel-level secure workspace to control a series of system screenshots, keyboard operations, external devices and other behaviors
  • High-strength disk encryption technology, strict key management system to ensure the security of data calculation and storage
  • Mutual authentication and end-to-end Data Communication channel to ensure the security of data transmission
  • Secure classification management of data, establishment of software-defined data flow perimeters
  • AI-driven adaptive security, intelligent identification of business scenarios, automated generation of fine-grained network, application, identity security policies

Authoritative Recognition, Market Trust

Authoritative Recognition, Market Trust

We provide you with secure, stable and easy-to-use products

  • DACS Pro
    Zero Trust Secure Workspace

    Provides a virtualized secure workspace on employee office PCs, enables fine access control and effective isolation of enterprise sensitive data, and builds close protection to follow the flow of data.

    • Protect enterprise sensitive data
    • Reasonably grant employees access permissions
    • Enable secure and smooth flow of data
    • Keep consistent with the native operating system
  • DACS Lite
    Zero Trust Network Access Control

    Based on identity, eliminate excessive implicit trust and build dynamic access boundaries to meet complex security needs in remote office scenarios.

    • Strict user authentication
    • Multi-dimensional device access checking
    • High-strength data transmission encryption
    • Fine-grained access permission control

We provide you with secure, stable and easy-to-use products

  • DACS Pro
    Zero Trust Secure Workspace

    Provides a virtualized secure workspace on employee office PCs, enables fine access control and effective isolation of enterprise sensitive data, and builds close protection to follow the flow of data.

    • Protect enterprise sensitive data
    • Reasonably grant employees access permissions
    • Enable secure and smooth flow of data
    • Keep consistent with the native operating system
  • DACS Lite
    Zero Trust Network Access Control

    Based on identity, eliminate excessive implicit trust and build dynamic access boundaries to meet complex security needs in remote office scenarios.

    • Strict user authentication
    • Multi-dimensional device access checking
    • High-strength data transmission encryption
    • Fine-grained access permission control

Typical Application Scenarios of DACS

Learn more

We Trusted by Industry Customers

Covering 8 major industries, including securities, insurance, banking, e-commerce, high-end manufacturing, games, Internet, professional services, etc., and continuously protecting enterprise data in 1000000+ terminals.

  • DACS mainly solves the problem of information security protection, and is currently deployed within the development environment to solve the problem of source code leakage, hoping that it can be applied to more scenarios in the future to achieve the effective management of all valuable data.

    ——— China Securities Co., Ltd
  • Our network environment is very complex, and different parts have different security control requirements; and with multiple branches and a large number of outsourced services, we need to be able to dynamically adjust our control policies in time, and DataCloak has helped us solve these problems well.

    ——— YOOZOO GAMES

We Trusted by Industry Customers

Covering 8 major industries, including securities, insurance, banking, e-commerce, high-end manufacturing, games, Internet, professional services, etc., and continuously protecting enterprise data in 1000000+ terminals.

  • DACS mainly solves the problem of information security protection, and is currently deployed within the development environment to solve the problem of source code leakage, hoping that it can be applied to more scenarios in the future to achieve the effective management of all valuable data.

    ———China Securities Co., Ltd
  • Our network environment is very complex, and different parts have different security control requirements; and with multiple branches and a large number of outsourced services, we need to be able to dynamically adjust our control policies in time, and DataCloak has helped us solve these problems well.

    ———YOOZOO GAMES

We Are Recognized by Top Domestic Investors

We Are Recognized by Top Domestic Investors

Contact Us