We have expertise in both network based and stand alone data protect, control and management system or tool in the areas of secure content sharing and distribution that also include desktop management and data filtering solutions.
Protecting data can be in several forms namely during the transfer, when it was received and when it has been opened by the recipient. The first form is usually taken place in a network cable line either via a dedicated or public line. The most popular method used to protect the data is using VPN technologies either using application layer SSL protocol or network layer IPSec approach. Most VPN based systems are hardware based but software based SSL VPN is getting its edges in the field. The second form is focus on converting the data into a different form/format so that only the intended user will be able to un-cover the data. We call such transfer as “scrambling” the data from plaintext into a converted form called cipher text. Usually a password is required to un-lock the data at the other side of the transfer. Cryptographic based mathematical algorithms such as AES, RSA are used in making such data transfer. Products in this form are mostly stand alone such as Data Loss Protection DLP product series. Protection in this form focuses mainly on the locking/unlocking of the data and not on the data itself, and that is why the third form is emerged as an enhanced way to address the security issues faced by the second form. The third form is also called a persistent protection to data. The entire protection is on data itself. In other word, it means when data has been actually opened or used by users. What happens when data in the state of a document or file has been viewed/opened: read, print, copy, edit, time etc. This last form is the ultimate protection to data and is still not used by most enterprises as the standard way of data communication. The market over such protection is therefore tremendous in future.
The third form described in the Data Protect section belongs to the Data Control. Data control decides who, when, where and how the data is accessed. It is the control over the access behaviour of the data by individuals who are using the “Company Confidential CC’ collectively refers to Intellectual Property IP or IP assets. IP in his sense may also refer to normal company documents or files that may seem ordinary to employees but will cause un-wanted or unexpected negative effect once it was obtained by outside parties.
Once data is protected and under control, then how it can be shred with less risk by users becomes an important question. The sharing can be divided into two ways namely local and remote sharing. Local sharing allows data to be distributed over the network (mainly Intranet) and a software agent is usually required for such sharing. Remote sharing take the form of centralize access meaning the data being protected and controlled is stored at a centralized location called a file server. All access to this data storage is fully controlled. A web browser is used for accessing the remote data and conducting the remote sharing. No client installation is required in this sharing approach.
No all data are valid and useful to the enterprise. In order to more effectively select data to be used/accessed by employees, companies use data filtering techniques to isolate the valid or useful data from invalid one. One example is the use of mail filter to separate the junk mails from the valid one. Data filter can be applied to more large scale or higher level to help in intrusion detection and prevention at system level by participating in log analysis and network monitoring. Thus, Data Filter is a broad topic and covers a large range of products in the field.
Desktop is the environment where users carry on their daily works. Such works include creating/updating important files, performing some simple system maintenance tasks, or making changes to some system resources such as uninstall/re-install programs etc. Properly control how users manage his desktop becomes one of the important tasks of Companies to ensure security, efficiency and control over the use of IT resources of the enterprise.
We can localize your product so that it can better fit into the marketing condition and culture in the Greater China Regions GCR including HK, China and Taiwan. We can convert the marketing material such as catalogue, bourses, sales guide, and white papers from English to either simplify or traditional Chinese. We can update your marketing write up so that it is relevant to the situation here in the regions. We can also translate the help menu, web site, and any technical write up or diagrams into the local format and language to make sure that it meets the local taste and requirements. Besides, we can also help in applying sales certificate and related documents in China to fulfill the jurisdiction for selling in the country. We can also translate the sales contract, purchase agreements into the required language in the GCR regions.
We have expertise in consultation over software system enhancement, customisation and update to better meet user requirements locally. We are able to take user requests and put it into a detail systematic proposal so that your programmer can easily make the changes without much complication and can provide more accurate advice over the feasibility of such enhancement or customization from the system development point of view. We strongly believe that clearly communicate complicate ideas or meaning from end user to vendor in writing over such process is very important in securing a potential sales deal.
We have over ten years of sales and marking experience in routing hi-tech products via channel networks in the GCR regions. We have well developed channels in China South, East, North, Taiwan and Hong Kong. Such established pipeline ensures initial market awareness of a new product and make sure that a large scale of future product deployment is possible in the GCR regions. We also have a cluster of dedicated long term customers who are most blue chip stock listed in HK or China and to whom we can directly sell the product to them without much complication or delays.