DATACLOAK LOGO
  • DACS Advantages
  • Technology Comparison

Reasons Why Enterprises Choose DACS Instead of Physical Isolation

  • Innovative data classification isolation technology
    • With innovative kernel-level security sandbox technology, multiple workspaces of different security levels can be virtualized at the same time in a terminal device, and they are isolated from each other. Each independent secure workspace is equivalent to an isolated physical terminal, for data of different security levels can realize isolation control policies of different strengths to achieve fine-grained classification management

  • Significantly improve work efficiency
    • Rather than needing two endpoint devices, DACS allows users to access the enterprise network and the Internet at the same time on the same terminal device, with the internal and external networks are isolated from each other

    • DACS provides secure, convenient and efficient data sharing and outgoing approval capabilities, breaking the original physical isolation of data barriers, allowing data to fully flow under the premise of security, achieving data value and enhancing efficiency

    • Secure workspace can be opened anytime, anywhere without the restriction of office place, moving the secure and isolated office environment to anywhere worldwide

  • Significantly reduce input costs
    • Directly use employees' BYOD devices, no need to purchase a large number of terminal devices, reducing hardware investment costs

    • Unified management personnel, devices, applications and networks, unified configuration, issuance and recovery of access permissions and security policies, eliminating complex network isolation rules, significantly reducing management and operation and maintenance costs

The Difference Between DACS and Physical Isolation

Comparison of Key Factors
DACS
Physical Isolation
Implementation Method
Install the DACS client in the terminal device to achieve data, network and application isolation and protection
Prepare independent place, independent terminal devices, and isolated network interfaces
Security
Kernel-level security sandbox technology, data in the secure workspace can not be leaked by any means
Adopt cabinet lock, external device interface seal, network isolation and other means to protect the data can not be copied from the dedicated devices
Data Flowability
Data can be securely shared among trusted personnel without breaking the boundary of the secure workspace, based on the principle of "one-way flow" which only allows data transfer from low-level to high-level secure workspaces
In general, the data is blocked in the special device and prohibited from being taken out, and in special cases, the data is copied by encrypted USB disk, which makes data flow difficult
Accessibility
One machine for two uses, open secure workspaces to access enterprise data anytime, anywhere
Use fixed devices in a fixed place and at a fixed time
Network Access Control
Supports enterprises to customize and configure flexible network access policies, and conduct fine-grained 7-layer network access control
Access permissions control based on IP and network segment level
Operation and Maintenance Cost
Perfect O&M system and automated O&M process, combined with adaptive security mechanisms to automatically and dynamically adjust the security policy, greatly reducing the cost of O&M
Large server clusters, high O&M costs; static network policy of physical isolation is extremely difficult to operate and maintain
  • DACS
  • Physical Isolation

点击切换项目

  • Implementation Method

    Install the DACS client in the terminal device to achieve data, network and application isolation and protection

  • Security

    Kernel-level security sandbox technology, data in the secure workspace can not be leaked by any means

  • Data Flowability

    Data can be securely shared among trusted personnel without breaking the boundary of the secure workspace, based on the principle of "one-way flow" which only allows data transfer from low-level to high-level secure workspaces

  • Accessibility

    One machine for two uses, open secure workspaces to access enterprise data anytime, anywhere

  • Network Access Control

    Supports enterprises to customize and configure flexible network access policies, and conduct fine-grained 7-layer network access control

  • Operation and Maintenance Cost

    Perfect O&M system and automated O&M process, combined with adaptive security mechanisms to automatically and dynamically adjust the security policy, greatly reducing the cost of O&M

Contact Us