Private product capabilities

  • Flexible deployment
  • High Security
Data Security

1. End-to-end data encryption;

2. Encryption of data when landing on both endpoint and server

3. SSL can be applied to all endpoints;

4. Enhance the security of clients;

5. Third-party encryption is supported.

Controllable management

1. Set structure visibility;

2. Mobile endpoint security controls over operations such as forward, copy and share.

3. Improved management ability such as block, unblock or deleting device

4. Custom terminal devices for police and military are supported;

Security Compliance
Refer to relevant national laws, regulations, and regulatory documents to assist in establishing an internal security compliance system

1. Certified by National Information Security Classified Protection (Level 3)

2. Certification to ISO/IEC 27001 Information Security Management;

3. Certification to ISO/IEC 27018 Code of Practice for Protecting Personal Data in the Cloud

4. SM2/3/4 algorithms are supported;

5. Compatible to China-made operating systems and chips.

In WeChat, search for "WeCom"Official Account