DATACLOAK LOGO
  • Requirement Challenges
  • Solutions
  • Value of Solutions

The Unsatisfactory Choice of Most Enterprises

For any enterprise, the importance of code data is self-evident. To ensure security, enterprises are forced to use physical isolation or VDI (Virtual Desktop Infrastructure) solutions at the expense of cost and efficiency. It is difficult to balance efficiency and security, which is really an unsatisfactory choice.

  • High infrastructure cost

    Companies need to invest heavily in hardware and acquire large clusters of high-performance servers. Employees also need to purchase additional VPN hardware equipment for remote office.

  • Low efficiency, poor experience

    Blocked from the Internet, employees cannot make full use of external information and resources, reducing R&D efficiency. Strong reliance on bandwidth, when network traffic and server performance problems occur, it will lead to poor R&D experience.

  • Heavy load on IT department

    In the physical isolation architecture, it is often necessary to add a large number of network access control lists (ACL) to give access permissions to a new user, and the subsequent maintenance costs will continue to rise, resulting in a complicated and inefficient operation and maintenance process, and even cause security risks.

DACS Solution by DataCloak

DACS is a software product provided by DataCloak. With leading technology and innovation, DACS maintains a balance between security and efficiency. Compared with other solutions, DACS has the advantages of low cost and easy management. Enterprises only need to prepare virtual machines to complete the deployment of DACS back-end services, and then install the DACS client on the employee terminals to start secure work.

  • Software-defined perimeter, more flexible
    • Fine-grained isolation control

      Without the need for expensive hardware equipment, DACS can achieve the division and isolation of OA, DEV and OP work environment through SDP technology, even by project, personnel and equipment, ensuring that code data is used and stored in a controlled and independent environment.

    • Natural support for flexible multi-location office

      Employees install the DACS client on their computers and automatically generate a virtual secure workspace on the terminal after logging in, which is directly connected to the company's internal development environment and no longer relies on VPN.

  • Endpoint trusted computing environment, more secure
    • One-way data flow

      Support for employees to access both Internet and intranet resources. In user terminals, enterprise data can only follow the principle of one-way flow from low security level space to high, and vice versa is prohibited. The security level of the secure workspace can be flexibly set by the administrator.

    • More scientific data leakage prevention

      Each secure workspace has a strict access control policy, nobody can access data beyond their authority or forward data without authorization through the network or other means.

  • Adaptive security policy, more efficient
    • Easy permission control

      DACS eliminates complex permission policies through scientific and rational data protection mechanisms. Combined with the unique AI engine, DACS dynamically evaluates the enterprise security policies and automatically optimizes the policy model.

    • Less burden on IT department and easier to use for employees

      DACS is a pure software solution, which not only significantly reduces operation and maintenance costs, but also avoids duplication of investment. Employees can install and login quickly to get started for an easier approach to remote work.

  • Software-defined perimeter, more flexible

    • Fine-grained isolation control

      Without the need for expensive hardware equipment, DACS can achieve the division and isolation of OA, DEV and OP work environment through SDP technology, even by project, personnel and equipment, ensuring that code data is used and stored in a controlled and independent environment.

    • Natural support for flexible multi-location office

      Employees install the DACS client on their computers and automatically generate a virtual secure workspace on the terminal after logging in, which is directly connected to the company's internal development environment and no longer relies on VPN.

  • Endpoint trusted computing environment, more secure

    • One-way data flow

      Support for employees to access both Internet and intranet resources. In user terminals, enterprise data can only follow the principle of one-way flow from low security level space to high, and vice versa is prohibited. The security level of the secure workspace can be flexibly set by the administrator.

    • More scientific data leakage prevention

      Each secure workspace has a strict access control policy, nobody can access data beyond their authority or forward data without authorization through the network or other means.

  • Adaptive security policy, more efficient

    • Easy permission control

      DACS eliminates complex permission policies through scientific and rational data protection mechanisms. Combined with the unique AI engine, DACS dynamically evaluates the enterprise security policies and automatically optimizes the policy model.

    • Less burden on IT department and easier to use for employees

      DACS is a pure software solution, which not only significantly reduces operation and maintenance costs, but also avoids duplication of investment. Employees can install and login quickly to get started for an easier approach to remote work.

Value to Enterprises

  • From the security perspective
    • Clear isolation boundary to effectively prevent data leakage and no longer limited by geographical location

    • Dual authentication of identity and device, end-to-end transmission encryption to prevent illegal monitoring and man-in-the-middle attacks

  • From the management perspective
    • Natural support for data classification management to achieve fine management of entire data life cycle

    • Secure and unified access across enterprise computing, cloud computing and edge computing scenarios

  • From the user's perspective
    • Employees can freely access the Internet from their personal desktops while being completely isolated from the enterprise’s secure workspace without interfering with each other

    • Easier to use, write code locally and support secure sharing for a better office experience

Contact Us