CYBERSEC 2022 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree
Enterprise audits are divided into pre-audits and post-audits
The main purpose of pre-audits is DLP data leakage prevention, which is divided into single excess and cumulative excess (meaning drip leakage prevention), that focuses on risk index and behavior analysis.
The primary purpose of the post-audits are the normal post-management and case-review applications.
BestFiler supports online release applications, online access applications, and various audit reports to implement paperless and strict audit management for enterprise efficiency.
Pre-Audit
excellent risk management tool
Legal compliance:pre-configure PII I standard and PII II behavior
Accurate:supports regular expression and program verification, custom exclusion
Completeness:32/64-bit applications, large and multi-blank attachments
Defensive power:supports single-capped over-range and interval cumulative excess (meaning drip leak prevention)
Data protection:supports email/attachment encryption, prohibit attachment encryption (avoid checks)
Customized mail:group-send but single-recipient display (better than BCC), subject/content replacement (time-saving individualization)
Flexible execution:online routine/individual whitelist, immediate supervisor notification and review release
Management Report:produce various statistical and analytical reports based on audit and management needs
Post-Audit
UBA Big Data Behavior Analysis
Normal post-audit management:set query conditions, query permissions, and valid period
Individual case access application:the reviewer applies to the auditor (can require multiple signatures)
Drip Report:when exceeds the upper limit, immediately report the maximum and total amount while display the details
Manage reports:schedule when to send a variety of user and group reports to supervisors and auditors
Mail log:display authentication account and source country code/city, supports forwarding and re-sends
System log:contains core log, authentication log, antivirus log, load log
Security log:record administrator actions, including searches, forwards, and setting changes, etc.
Queue management:configure queue re-transmission and delay, queue notification, periodic queue reports
ELM Lightweight storage of massive data with efficient full-text search
OEA Organizational cloud archiving and quick historic mail query
ELM Massive Data Management
Supports local and network cluster management.
Supports Journal SMTP/POP de-duplication archives.
Supports .eml format (encrypted) storage and multiple restoration methods.
Supports a wide range of archiving mechanisms, including local, web, CD, and tape.
More than 50 attachment formats and 10 million emails searched in 5 seconds.
Supports non-repudiation, efficient full-text search, Simplified and Traditional Chinese translation, and advanced search.
OEA supports hierarchical organization development, mail preview, and attachment text quick search.
OEA replaces mail storage, which helps to remove management receipts and improve work efficiency.
VigiCrypt Email Encryption Protection
The strongest email encryption gateway ever.
DLP protection and social fraud prevention are the best tools for eliminating fraud.
PDF/ZIP/HTTPS mail and attachment conditional gateway encryption.
Flexible subject marking, compatible with existing systems, attain internal and external control.
Custom and random passwords, password database, extensive editing, personal settings.