DataCloak Zero Trust Endpoint Secure Workspace (DACS)

Upgrade to Zero Trust Data Security Architecture in One Step

Apply and get all the perks NOW!

DACS Product Overview

DACS Product Overview

With the advent of the 5G and IoT era, data are playing an increasingly fundamental part in corporate operations and productions. Along with the increasing prevalence of BYOD and telecommuting, as well as the popularization of cloud storage and sharing for business platforms and its data, traditional data security solutions are being confronted with two problems.

  • First, the demands for business data transmission across the Internet are mounting, but traditional IT architectures are far from being able to meet the requirements for data protection throughout the entire life cycle covering data production, usage, and storage;

  • Enterprises adopting traditional data management methods find data control unattainable in spite of the temptation from profitable data, forcing employees to take the risks of disclosing data to any third party, in turn generating enormous losses.

Enterprises adopting traditional data management methods find data control unattainable in spite of the temptation from profitable data, forcing employees to take the risks of disclosing data to any third party, in turn generating enormous losses.

In other words, DACS is an enterprise endpoint data security product based on the new-generation sandboxes and Zero Trust architecture. We help enterprises implement accurate access control and effective isolation control of sensitive data as well as fully upgrade their IT architectures to the highest grade in Zero Trust architecture —— the Zero Trust Data Security Architecture.

Product Functions

  • Fine Grained Identity Authentication图标

    Fine Grained Identity Authentication

    Supports multiple authentication methods

    Attribute-based access control (ABAC)

    Device authentication system based on confidential computing

  • Next-generation Secure Sandboxes图标

    Next-generation Secure Sandboxes

    Provides a secure environment for data in use security and tightens control to prevent disclosure

    Storage encryption for data at rest security

    App behavior control (startup/shutdown, IPC, network, file, etc.)

  • App behavior control (startup/shutdown, IPC, network, file, etc.)图标

    App behavior control (startup/shutdown, IPC, network, file, etc.)

    Trusted tunneling for secure data transmission (data in motion)

    Internet behavior management

  • Zero Trust Security Engine图标

    Zero Trust Security Engine

    Continuous validation, anomaly detection, and situational awareness

    All-life-cycle data tracing and forensics

    Adaptive security and policy management

Product Features

  • Security图标

    Security

    • Isolation of endpoint data and apps by level and flow of corporate data under control
    • Identity-based enterprise security perimeter securing intranet/extranet access
    • High-intensity encryption and storage, continuous validation of data in use and trusted tunneling for data in motion
    • Low-latency, high-throughput and high-performance enterprise trusted tunneling and access
  • Access Management图标

    Access Management

    • Various APIs for seamless connection to enterprise security architecture
    • Centralized policy control through security operation center
    • Zero-trust security engine facilitates security management through continuous validation, risk detection, and adaptive active empowerment
    • Simplifies operation and maintenance via high-availability and clustered deployment that is based on microservices and supports DevOps, as well as the use of stateless parallel capacity expansion
  • Experience图标

    Experience

    • Provides more natural and smoother user experience through deep integration with endpoint operating system
    • Supports various peripheral devices
    • Secures corporate data access, computing and storage based on local endpoint resources
    • Accommodates a broader range of scenarios at lower cost

Customer Value

  • Leading Technical Architecture

    Leading Technical Architecture

    We help enterprises attain the highest grade in the Zero Trust architecture standard based on microkernel+lightweight confidential computing technology

  • Facilitates Promotion via Smooth User Experience

    Facilitates Promotion via Smooth User Experience

    Smooth operation and effective protection of user privacy through deep integration with the operating system, all of which facilitates promotion

  • User-friendly and Convenient for Operation and Maintenance

    User-friendly and Convenient for Operation and Maintenance

    Seamless connection to the existing corporate security architecture; lower future maintenance cost based on Devops integration in response to the distributed architecture

  • Validated Reliable Solution

    Validated Reliable Solution

    Validated in more than 60 companies that fall into a variety of industries, finance and hi-tech, to name a few, and maintained stable operation in many local centers for more than 1 year

  • High Cost Performance and Efficiency

    High Cost Performance and Efficiency

    Better budgeted outlay cost: at least 57% lower TCO cost than VDI Technical superiority

Technical Superiority

  • Secure New-generation Sandbox图标

    Secure New-generation Sandbox

    • Deep integration with the operating system
    • Security, efficiency and smooth experience
  • High-performance Tunneling图标

    High-performance Tunneling

    • Ultra-large-scale device network access
    • Compatible for low latency and high throughput
  • SDP图标

    SDP

    • Active defense and dynamic access
    • Smarter security management
  • AI Security and Policy Engine图标

    AI Security and Policy Engine

    • Flexible Zero Trust security network
    • Fine-grained and highly precise

Product Architecture

Find out WHICH solution fits your enterprise

Contact Us
Contact Icon
Contact Us
Contact Us 0755-21616605 contact@datacloak.com.cn Free Trade Center of ShenZhen