Product
    Data Loss Prevention

    ArmorX DLP Mail Audit System

    DLP Trade secrets and personal information

    Drip leakage prevention and data encryption protection

     

    Email remains a vital tool for communications

    between modern business transactions

    Based on corporate secrecy protection and compliance, such as national personal data protection laws (EU GDPR, ISO27001, BS10012, etc.), companies must fulfill and comply with their email filing and auditing Duties.

     

    Enterprise audits are divided into pre-audits and post-audits

    The main purpose of pre-audits is DLP data leakage prevention, which is divided into single excess and cumulative excess (meaning drip leakage prevention), that focuses on risk index and behavior analysis.

    The primary purpose of the post-audits are the normal post-management and case-review applications.

    BestFiler supports online release applications, online access applications, and various audit reports to implement paperless and strict audit management for enterprise efficiency.

     

    Pre-Audit

    excellent risk management tool

     

    • Legal compliance:pre-configure PII I standard and PII II behavior
    • Accurate:supports regular expression and program verification, custom exclusion
    • Completeness:32/64-bit applications, large and multi-blank attachments
    • Defensive power:supports single-capped over-range and interval cumulative excess (meaning drip leak prevention)
    • Data protection:supports email/attachment encryption, prohibit attachment encryption (avoid checks)
    • Customized mail:group-send but single-recipient display (better than BCC), subject/content replacement (time-saving individualization)
    • Flexible execution:online routine/individual whitelist, immediate supervisor notification and review release
    • Management Report:produce various statistical and analytical reports based on audit and management needs

     

    Post-Audit

    UBA Big Data Behavior Analysis

    • Normal post-audit management:set query conditions, query permissions, and valid period
    • Individual case access application:the reviewer applies to the auditor (can require multiple signatures)
    • Drip Report:when exceeds the upper limit, immediately report the maximum and total amount while display the details
    • Manage reports:schedule when to send a variety of user and group reports to supervisors and auditors
    • Mail log:display authentication account and source country code/city, supports forwarding and re-sends
    • System log:contains core log, authentication log, antivirus log, load log
    • Security log:record administrator actions, including searches, forwards, and setting changes, etc.
    • Queue management:configure queue re-transmission and delay, queue notification, periodic queue reports

     

    ELM Lightweight storage of massive data with efficient full-text search

    OEA Organizational cloud archiving and quick historic mail query

     

    ELM Massive Data Management

    Supports local and network cluster management.

    Supports Journal SMTP/POP de-duplication archives.

    Supports .eml format (encrypted) storage and multiple restoration methods.

    Supports a wide range of archiving mechanisms, including local, web, CD, and tape.

    More than 50 attachment formats and 10 million emails searched in 5 seconds.

    Supports non-repudiation, efficient full-text search, Simplified and Traditional Chinese translation, and advanced search.

    OEA supports hierarchical organization development, mail preview, and attachment text quick search.

    OEA replaces mail storage, which helps to remove management receipts and improve work efficiency.

     

    VigiCrypt Email Encryption Protection

    The strongest email encryption gateway ever.

    DLP protection and social fraud prevention are the best tools for eliminating fraud.

    PDF/ZIP/HTTPS mail and attachment conditional gateway encryption.

    Flexible subject marking, compatible with existing systems, attain internal and external control.

    Custom and random passwords, password database, extensive editing, personal settings.