Home > Enterprise >  Nine terminal secure cloud what product suite is the product function
Nine terminal secure cloud what product suite is the product function

Time:09-16

Terminal security management functions:
Lock the user
Realize the user and the binding equipment assets, in order to establish the basic conditions, security policy issued after binding equipment are in need of inspection status to log in the computer, or it will cut off all of the data transmission link,
Position lock
Cooperate with mobile phone terminal operations, and login code terminal at GPS location information, by reporting information, control can be used for terminal position, is not in the specified location scope to use the terminal, if you want to use needs to apply to the administrator,
Routine lock
Can manage terminal use authorization period, not to use the time limits prescribed terminal, if you want to use needs to apply to the administrator,
Screen lock
To realize the management of the terminal screen, monitor and assist,
Network lock
Through the network access methods about the network management of foreign terminal access, black and white list for internal terminal access to the Internet via IP control, improve enterprise network use safety,
U disk lock
To strengthen the control of the storage device, white list of customizable storage devices, realize the flexible control of the storage device,
The software lock
To comprehensive control of software, software installation information collection, software distribution, patch installation, software access control, etc., the terminal software version uniform standard, to enforce management software installation mess,
File lock
Using transparent encryption technology to protect data, but for file encryption, decryption, outbound operations, such as installing terminal and verify the identity of the users can preview, edit the encrypted file, encrypted file disclosure cannot access to the external,
Hard disk lock
To physical hard disk encryption, based on the high loss characteristics of portable mobile terminal equipment, even if lost will also ensure data security,
Equipment tag
Automatically generate qr code label equipment, support equipment inventory, query management operations, such as
  • Related