The company has passed ISO9001 and CMMI3 certification, its products have obtained multiple patents, enjoy independent property rights, and have passed certifications from the Ministry of Public Security, the National Security Bureau and other security departments. Among them, projects such as "Network File Vault", "Network Network Security Management System", "Electronic Form Management System", and "Electronic Evidence Generation System" have also received support from government departments at all levels to varying degrees.
After more than 7 years of development, Yishi Times has made great progress in business performance and accumulated a solid foundation. The company closely focuses on the core of high-tech, is committed to the research and development of high-tech independent products, and has formed a core competitive advantage in information security technology.
In recent years, the company has promoted work from the following aspects: With data as the core, from the security of centralized storage data, the security of transmitted data, the security of terminal data, the security of terminals carrying data, the network where the data is located In terms of security and other aspects, we conduct security control and protection of data, and realize the security management of the entire life cycle of data generation, transfer, use, archiving, and destruction.
1) ETIM-NFCS: Provides a secure centralized storage platform, provides end users with file backup and centralized secure storage services, and solves user problems due to hardware damage, virus damage, etc. Data loss and leakage problems caused by various reasons.
2) ETIM Document Security Management System (ETIM-DSMS): Starting from the document itself, it implements document encryption and permission control to ensure that the document can only be accessed by authorized people in the designated environment, time and Use within the scope of authority to achieve security control of documents and prevent leaks caused by electronic documents.
3) ETIM-UTM: The product integrates firewall, IDS, network anti-virus, Internet behavior management and other functions into one, forming a standard unified management platform to solve the problem of user data location. Network perimeter security.
4) ETIM-INSS: It mainly solves the security and standardized management of enterprise internal network terminals to protect the security of intranet terminals and prevent intranet data from being intentionally or Unintentional leakage. It realizes functions such as management of external PCs and mobile storage media accessing the intranet, unified security inspection of terminals accessing the intranet, terminal behavior management and auditing. Anti-repudiation technology starts from the perspective of ensuring the originality of system application data and the security and trustworthiness of recorded and stored information. It adopts the independently developed "original data preservation technology" and combines it with timestamps, CA digital certificates, digital signatures and other technologies to store information. The three aspects of collection, behavior auditing, and encrypted storage are organically combined to provide users with an overall information security anti-repudiation solution.
1) Yishi Information Security Delivery System: It is a system that can use proprietary software to digitally sign, timestamp and encrypt the information and documents to be delivered and then safely deliver them to the parties; it can automatically Notify the parties of a brief text message via mobile phone text message, automatically notify the parties of the voice recording content through a phone call, and automatically send file information to the parties' mailboxes via email. The information received and responded to by the parties can be automatically fed back to the notifying party in a timely manner. At the same time, the system packages all the information sent and received through the original "data original ecological preservation technology" combined with digital signatures, timestamps, AES encryption and other technologies until it can be The trust server forms authentic, reliable and non-tamperable original archive data for information filing and query auditing. Effectively resolve disputes such as wrangling and denial among departments at all levels during the information transmission process.
2) Yishi Electronic Archives Trusted System: By combining the existing document scanning system, the digital fingerprint and other related attribute information of the electronic document in the generation period can be obtained, and the obtained information can be obtained. Utilize "original data preservation technology" combined with digital signatures, timestamps and other technologies for encryption and preservation to form a complete, reliable, and non-tamperable evidence package. During the utilization period of the electronic document, the attribute characteristics of the preserved document can be verified through verification at any time, and a verification report can be generated to confirm that the retrieved document is consistent with the previously generated document.
3) Yishi OA Trusted System: By conducting behavioral record audits and file flow monitoring on operators of various office systems such as OA and official document transmission, the recorded information will be passed through "data original ecological preservation" "Technology" combines digital signatures, timestamps and other technologies for encryption, preservation and storage to form a complete, reliable and non-tamperable data. Achieve safe and efficient work flow and safe and controllable behavioral processes.
4) Black box system: It can audit and monitor the application operation behavior of business systems (such as OA, business software, etc.), and preserve the original ecology of behavioral audit records and monitoring information to form a complete and reliable system. , data that cannot be tampered with. Achieve timely discovery and tracing of illegal operations during the work flow process.