DACS Pro upholds the core ideology of “structuring protection mechanisms to follow data flow,” so that wherever data flow, the security mechanisms follow, providing fine-grained and adaptable data protection for data businesses.
DACS Pro adopts new-generation security sandbox (micro-kernel, secure container, trusted computing), high-performance network tunnel, software-defined perimeter, AI security policy engine and other technologies to achieve precise access control and effective isolation of sensitive data, build an enterprise terminal data adaptive security control platform and solutions. Ensuring security as the premise, DACS Pro satisfies various other needs in the meantime, such as sufficient data flow, sharing and workspace mobility. It protects enterprise data to the greatest extent and empower the new business of enterprises in the era of digital transformation.
Running multiple independent secure workspaces on your device at the same time for accessing OA, internal document platform, SVN code server and other business applications with different security level requirements.
Encrypted data in secure workspaces cannot be leaked outside by any unauthorized ways.
Flexible screen data protection based on user identity.
Share files to others inside the secure workspace with one click to guarantee the flow of data in a secure environment. Files can only be sent outside of the secure workspace with approval.
Hide intranet business systems by default, allowing only trusted SPA-authorized users to access through encrypted tunnels.
Provide 3 to 7 layer network access capability, covering B/S and C/S architecture applications, realizing "zero transformation" full access to enterprise applications.
Reasonable authorization of network access in the secure workspace based on authentication, environment, behavior and other factors, always following the "minimum access" principle of zero trust.
Simply drag local files and application shortcuts inside the secure workspace and double-click to open, and keep user experience consistent with the operating system.
Kernel-level deep isolation protection
Keep the system’s native operation mode, with zero learning costs
Flexible security boundaries built according to business scenarios, free from traditional protection boundaries
Precise management to every employee, device, and application
Continuous monitoring of risks and dynamic adjustment of permissions
Intelligent analysis, aggregation, and recommendation of security protection policies, all for simple operation and maintenance
Kernel layer, link layer, and security gateway are sequentially authenticated to ensure security
High throughput, low latency and high performance to meet the ultra-large-scale device access scenario
Isolated personal and secure workspaces maintain security management while respecting user privacy
Suitable for all mainstream applications; moving workspaces in a one-click process
Consistent with original system operating habits, no need for extra learning
Kernel-level security sandbox combined with lightweight trusted computing to achieve the highest level of zero trust data security
Secure classification governance of data, establishing software-defined data flow boundaries
AI-driven adaptive security, intelligent identification of business scenarios and automated generation of fine-grained security policies
Deep integration with endpoint base-level technology for precise access control and effective isolation control of sensitive data
Secure end-to-end data communication based on mutual authentication, ensuring security in data transfer
Supports integration with existing enterprise applications in the form of SDK to meet diversified and personalized data security protection scenarios
Sufficient APIs to achieve seamless interconnection with existing enterprise security architecture, giving full scope its overall security value