Login/Sign Up Sign Out
{{ messageCategory.totalUnreadNum }}
{{item.sku_info.spec_desc}}
{{item.count}}x
Combination {{combo.product.name}}
{{combo.sku_info.spec_desc}}
x1
Total Price:
View Cart
No APPS available
{{carts.count}}件
Cart
Home Overview Tianrui Green Shield Enterprise Information Security Management System Solution
Tianrui Green Shield Enterprise Information Security Management System Solution
-2% OFF!
Download
Tianrui Green Shield Enterprise Information Security Management System Solution
Tianrui Green Shield Information Security Management Software, also known as Tianrui Green Shield Encryption Software, is a software product that can forcibly, automatically, and transparently encrypt drawings, documents, and other information on computers to prevent leakage. Tianrui Green Shield Encryption Software adopts a driver layer based (IFS) encryption method, a domestic encryption software brand, and fully independent and controllable computer encryption technology to protect enterprise information security.
{{item.name}}:
{{option.name}}
* Purchase this specification to receive the following gifts : ( Buy 1 or more items and the offer is valid until stock lasts )
x {{item.count}}
{{info.promotion.title}}
Note: In seckill, once sold out, the original price will be restored!
Currently available last {{sku.promotion_count}} items
{{info.advancePromotion.title}}
Preview of seckill, event price: {{info.advancePromotion.skus_infos[sku.sku].promotion_price}} CNY
The inventory available for seckill is {{info.advancePromotion.skus_infos[sku.sku].promotion_count}} items

Retail Price
Retail Price
Specifications
Not Selected
Add to cart Launch
Group Buying price:
Buy Now Buy Now
E - Offers
Group Buying
There is currently no Group Buying available, please open a group
{{item.spec_desc}}
{{item.user.nickname}} In {{item.created_at}} Start Still need {{item.left_count}}x Pending Group Buying, some users have not paid
Join

Activity Rules

1、Activity time:{{info.groupon.start_at}} ~ {{info.groupon.end_at}}。

2、Validity period of the Group Buying:{{info.groupon.expire_days * 24}} hours。

3、Number of Group Buying:{{info.groupon.need_count}}x。

Please Pay Attention

1、Teamwork process: Join/initiate a Group Buying and make a successful payment - Within the validity period, the number of team members meets the activity requirements - Group Buying succeeded!

2、If the number of participants cannot be met within the valid period, the group will fail, and the paid amount will be refunded in the original way.

3、The number of people required and the time of the event may vary among different products. Please pay attention to the rules of the event.

Package

{{info.name}}

{{info.rate}}
{{sku.spec_desc}}
{{info.sku.spec_desc}}

{{item.name}}

{{item.rate}}
{{sku.spec_desc}}
{{item.sku.spec_desc}}
Main
+
{{selectedCombos.count}} items
-
Save
=
Total
Selected  {{selectedCombos.count}}  items,Add to cart
{{item}}

Tianrui Green Shield Information Security Management Software is a software system that integrates automatic file encryption, real-time network monitoring, network behavior management, and internal network security. It provides integrated information security solutions for enterprises and institutions, ensuring the security of data storage and use from the source, standardizing computer operation behavior, preventing data leakage, and ensuring information security.


Introduction to functional modules:


  • Drawing file encryption module (main module)

The drawing file encryption module is a kernel driver layer encryption system developed to prevent electronic drawings from being leaked by internal employees of the unit. On the premise of not affecting any normal operation of the computer by employees, drawing files are automatically encrypted by the system when copying, creating, or modifying. Encrypted drawing files can only be used normally on the internal computer of the unit. Once they are disconnected from the internal network environment of the unit and used on external computers, they may become garbled or unable to be opened. The drawing file can only be used normally after being decrypted by the administrator and taken out of the unit.


  • File outsourcing control module

If you need to outsource drawing files, you only need to apply for outsourcing and have them reviewed and confirmed by the unit's senior management. At the same time, you can set the number of times to open, the validity period, and whether to open them on a designated computer to effectively prevent the secondary spread of outsourced documents.


  • Print content monitoring module

Monitor printing behavior, fully and truthfully record printing information, and provide rich logs and reports to enable managers to effectively observe and control printing resources, and prevent printing leaks from occurring!


  • Internal network behavior security module

Effective desktop and behavior management of computers within the internal LAN of the unit, including setting up black and white lists for software, remote assistance, screen recording, computer asset management, ARP firewall, window monitoring, chat tool control, etc.


  • External network security control module

Comprehensive control of unit wide area network traffic provides network managers with network usage analysis and prediction. By setting traffic grouping, optimizing unit bandwidth allocation, and setting website blacklist and blacklist, work efficiency is effectively improved.


  • USB authentication management module

The mobile USB authentication management system is a system that registers and authenticates USB drives, and manages the USB drives of access units. Only certified USB drives can be used within the organization.


  • File management control module

Manage and control electronic documents of the unit, grant different operation permissions to different folders on the document server according to different users, including whether a folder can be seen, whether local files can be uploaded to the server's folder, whether files in the folder on the server can be deleted, and other settings. At the same time, there is a level of confidentiality in internal file control, and only authorized personnel can view the file content.

Any question

Submit
Ask a question
{{item.label}}
Q {{item.content}}
A {{item.answer.content.replace(/<[^>]+>/g, "")}}
{{qaInfo.content}}
No answer yet