DACS Product Overview

With the advent of the 5G and IoT era, data are playing an increasingly fundamental part in corporate operations and productions. Along with the increasing prevalence of BYOD and telecommuting, as well as the popularization of cloud storage and sharing for business platforms and its data, traditional data security solutions are being confronted with two problems.
-
First, the demands for business data transmission across the Internet are mounting, but traditional IT architectures are far from being able to meet the requirements for data protection throughout the entire life cycle covering data production, usage, and storage;
-
Enterprises adopting traditional data management methods find data control unattainable in spite of the temptation from profitable data, forcing employees to take the risks of disclosing data to any third party, in turn generating enormous losses.
Enterprises adopting traditional data management methods find data control unattainable in spite of the temptation from profitable data, forcing employees to take the risks of disclosing data to any third party, in turn generating enormous losses.
In other words, DACS is an enterprise endpoint data security product based on the new-generation sandboxes and Zero Trust architecture. We help enterprises implement accurate access control and effective isolation control of sensitive data as well as fully upgrade their IT architectures to the highest grade in Zero Trust architecture —— the Zero Trust Data Security Architecture.
Product Functions
Fine Grained Identity Authentication
Supports multiple authentication methods
Attribute-based access control (ABAC)
Device authentication system based on confidential computing
Next-generation Secure Sandboxes
Provides a secure environment for data in use security and tightens control to prevent disclosure
Storage encryption for data at rest security
App behavior control (startup/shutdown, IPC, network, file, etc.)
App behavior control (startup/shutdown, IPC, network, file, etc.)
Trusted tunneling for secure data transmission (data in motion)
Internet behavior management
Zero Trust Security Engine
Continuous validation, anomaly detection, and situational awareness
All-life-cycle data tracing and forensics
Adaptive security and policy management
Product Features
Security
- Isolation of endpoint data and apps by level and flow of corporate data under control
- Identity-based enterprise security perimeter securing intranet/extranet access
- High-intensity encryption and storage, continuous validation of data in use and trusted tunneling for data in motion
- Low-latency, high-throughput and high-performance enterprise trusted tunneling and access
Access Management
- Various APIs for seamless connection to enterprise security architecture
- Centralized policy control through security operation center
- Zero-trust security engine facilitates security management through continuous validation, risk detection, and adaptive active empowerment
- Simplifies operation and maintenance via high-availability and clustered deployment that is based on microservices and supports DevOps, as well as the use of stateless parallel capacity expansion
Experience
- Provides more natural and smoother user experience through deep integration with endpoint operating system
- Supports various peripheral devices
- Secures corporate data access, computing and storage based on local endpoint resources
- Accommodates a broader range of scenarios at lower cost
Customer Value
Leading Technical Architecture
We help enterprises attain the highest grade in the Zero Trust architecture standard based on microkernel+lightweight confidential computing technology
Facilitates Promotion via Smooth User Experience
Smooth operation and effective protection of user privacy through deep integration with the operating system, all of which facilitates promotion
User-friendly and Convenient for Operation and Maintenance
Seamless connection to the existing corporate security architecture; lower future maintenance cost based on Devops integration in response to the distributed architecture
Validated Reliable Solution
Validated in more than 60 companies that fall into a variety of industries, finance and hi-tech, to name a few, and maintained stable operation in many local centers for more than 1 year
High Cost Performance and Efficiency
Better budgeted outlay cost: at least 57% lower TCO cost than VDI Technical superiority
Technical Superiority
Secure New-generation Sandbox
- Deep integration with the operating system
- Security, efficiency and smooth experience
High-performance Tunneling
- Ultra-large-scale device network access
- Compatible for low latency and high throughput
SDP
- Active defense and dynamic access
- Smarter security management
AI Security and Policy Engine
- Flexible Zero Trust security network
- Fine-grained and highly precise