Main station|Member Center|Save the desktop|Mobile browsing
Ordinary Member

Xiamen Mian Information Technology Co

Engaged in the research and development of computer security chips, network e...

sell
  • There is no classification
contact
  • Contact:洪女士
  • Phone:0592-5904046
search
 
link
  • There is no link yet
home > sell > Catching Internet Thieves|U Disk Pen|Mian Anwen
Catching Internet Thieves|U Disk Pen|Mian Anwen
products: Views:9Catching Internet Thieves|U Disk Pen|Mian Anwen 
brand: 密安
安文USB1.01: 1G
安文USB1.02: 4G
price: 220.00元/个
MOQ: 1 个
Total supply:
Delivery date: Shipped within 3 days from the date of payment by the buyer
Valid until: Long-term validity
Last updated: 2015-07-23 10:35
 
Details
Product Name: Anwen Network Theft Real-time Capture and File Protection. This product is a network theft real-time capture system and file protection system developed by Mi'an Company based on years of analysis of massive protocols and data packets. It quickly and effectively identifies attempts to steal local files, blocks theft, prompts the thief of the target file and the thief's address, and automatically encrypts the target file attempted to steal. Since the Snowden incident, it has been recognized that computer files can be stolen online. This is the world's first anti-theft and file protection product.
It has the following functionality:
. Uniqueness: A corresponding registration code is issued for a unique B device, which can only be used when the B device is inserted.
.Real-time: When the network theft occurs, a pop-up window will prompt the occurrence of the theft
, inform the stolen file and destination, and automatically encrypt the file.
. Efficiency: This system will not block the normal data flow of the network and does not affect the user's normal network use
.
.Self-protection: Security products themselves are vulnerable to attacks, and the system uses
to self-heal itself every time it is started without being hijacked.
.Recording function: In addition to stealing synchronization reminders, the system will save all captured theft
logs according to the time of occurrence to facilitate post-processing, and automatically decrypt when there is a B.
.Blocking function: In response to the discovered theft, the blocking tool on this product promptly blocks the connection with this computer.
.Encryption function: Adopts the current international standard encryption standards
Encryption algorithm, local files and folders can also be manually encrypted and decrypted. Unable to be hacked by thieves.
. What can Mi'an do for you>
Product advantages: The product is the first in the world and there is currently no similar competitive product. With complete intellectual property rights,
it is simple to deploy, compact and flexible, easy to install, plug and play. Use it in a fool-proof way with one click.
Request for quotation
A total of0articles  Related Comments: