1. Mainstream hardware servers and platforms are supported;
2. It can be deployed independently without other cloud infrastructure and third party product.
3. Ability to deploy quickly and scale vertically and horizontally
4. Single- or multi-cluster deployment is supported; It can also be deployed across multiple data centers.
5. Automatic operation and maintenance, monitoring, alarm and fault self-recovery abilities. You can also do the upgrades at your discretion.
1. It can be deployed in internal network, and available in VPN networks;
2. It can be deployed across multiple secure domain network to be connected and used in different domain networks.
3. It supports multiple network security devices such as GAP and FGAP as well as network security tunnels;
4. It supports multi-network penetration and deployment, and meets the standards of data communication security;
5. Safe access to internal apps via mobile device.
1. You can connect the existing account system with multiple methods such as AD, HTTP and third-party apps;
2. Can connect existing SMS and mail gateway.
3. Connect HR system to sync on/off boarding information
4. Connect to mailbox for real-time notifications.
1. End-to-end data encryption;
2. Encryption of data when landing on both endpoint and server
3. SSL can be applied to all endpoints;
4. Enhance the security of clients;
5. Third-party encryption is supported.
1. Set structure visibility;
2. Mobile endpoint security controls over operations such as forward, copy and share.
3. Improved management ability such as block, unblock or deleting device
4. Custom terminal devices for police and military are supported;
1. Certified by National Information Security Classified Protection (Level 3)
2. Certification to ISO/IEC 27001 Information Security Management;
3. Certification to ISO/IEC 27018 Code of Practice for Protecting Personal Data in the Cloud
4. SM2/3/4 algorithms are supported;
5. Compatible to China-made operating systems and chips.