Joke Collection Website - Public benefit messages - Fujian easy times information technology co., ltd.
Fujian easy times information technology co., ltd.
After more than seven years of development, the Iraqi era has made great progress in business performance and accumulated a solid foundation. Focusing on the high-tech core, the company is committed to the research and development of high-tech independent products, and has formed a core competitive advantage in information security technology.
In recent years, the company has promoted its work from the following aspects: taking data as the core, and carrying out security control and protection on data from the aspects of the security of centralized storage data, the security of transmission data, the security of terminal data and the security of the network where the data is located. , which realizes the safety management of data generation, circulation, use, archiving and destruction in the whole life cycle.
1) ETIM-NFCS: provides a secure centralized storage platform, provides file backup and centralized secure storage services for end users, and solves the problems of data loss and leakage caused by various reasons such as hardware damage and virus damage.
2) ETIM-DSMS: Based on the document itself, realize the encryption and authority control of the document, and ensure that the document can only be used by authorized people within the specified environment, time and authority range, so as to realize the security control of the document and prevent the leakage caused by electronic documents.
3) ETIM-UTM: This product integrates firewall, IDS, network antivirus, online behavior management and other functions. And form a standard unified management platform to solve the security problem of the network boundary where user data is located.
4) Iraq Times Intranet Integrated Security Management System (ETIM-INSS): It mainly solves the security and standardized management of enterprise intranet terminals, and plays a role in protecting the security of intranet terminals and preventing intranet data from being leaked intentionally or unintentionally. The management of external PC and mobile storage media accessing intranet, unified security check of terminal accessing intranet, terminal behavior management and audit are realized. From the perspective of ensuring the originality of system application data and the safety and credibility of recorded and stored information, the anti-repudiation technology adopts the self-developed "original data preservation technology", and combines information collection, behavior audit and encrypted storage with technologies such as timestamp, CA digital certificate and digital signature to provide users with an overall anti-repudiation solution for information security.
1) Iraq Times Information Security Transfer System: It is a kind of information and documents that can be digitally signed, time stamped and encrypted by proprietary software, and then safely transferred to all parties; You can automatically notify the short message parties through mobile phone short messages, and you can also automatically notify the recorded content parties through the phone; You can automatically send the file information to the party's mailbox by email. The information received and replied by all parties can be automatically fed back to the notifying party in time. At the same time, the system packages all the sent and received information to a trusted server through the original "original data preservation technology" combined with digital signature, timestamp, AES encryption and other technologies, forming authentic, reliable and tamper-proof original file data for information filing and query audit. Effectively solve disputes such as wrangling and denial in the process of information transmission at all levels.
2) The trusted system of electronic archives in Iraq era: By combining the existing document scanning system, the relevant attribute information such as digital fingerprints of electronic documents in the generation period is obtained, and the obtained information is encrypted and saved by using the "original data preservation technology" combined with digital signature, time stamp and other technologies to form a complete, reliable and tamper-proof evidence package. During the utilization period of electronic files, you can check the attributes and characteristics of the saved files at any time by checking methods, and form an inspection report to confirm that the retrieved files are consistent with the previously generated files.
3) Iraq OA Trusted System: By auditing the behavior records of office system operators such as OA and document transmission and monitoring the file flow, the recorded information is encrypted and stored by the "original data preservation technology" combined with digital signature, time stamp and other technologies to form complete, reliable and tamper-proof data. Achieve a safe and efficient workflow and a safe and controllable behavior process.
4) Black box system: it can audit and monitor the application and operation behavior of business systems (such as OA and business software). ), and preserve the original ecology of behavior audit records and monitoring information to form complete, reliable and tamper-proof data. Realize the timely discovery and tracing of illegal operation behavior in the process of workflow.
- Previous article:What is a cell phone zombie virus?
- Next article:What if there is no signal on the mobile phone?
- Related articles
- Sample template for reporting criticism
- What does it mean to catch fish from the lake?
- What should I do if my parents die?
- Pictures and greetings from Tanabata.
- How to block messages from strangers?
- How can Apple's mobile phone use WeChat to play the national assault charge?
- 1 65438+1 October 19 Mianyang added 9 asymptomatic cases, and confirmed cases1case (165438+1October 19 Mianyang added 9 asymptomatic cases.
- Happy birthday to my husband.
- Spam classification regulations publicity SMS template
- Samsung SMS center number