US3
|
|
||||||||||||||||||
Product
|
|
|
|
||||||||||||||||
Hardened SecurityData encrypted before upload to US3 cloud, with user controlling the encryption key, reassures users about their data security on cloud. |
|
User-FriendlySimple to use, easy to deploy and manage, with secure data uploads and downloads directly from the terminal. |
Multi-PurposeChoose between unified or individual key application deployment to suit diverse needs; like data isolation for individual archiving and multi-user document sharing. |
Efficient & ScalableNo need to configure own servers and hardware by just using the US3 Object Storage Client. Affordable and secure, and can flexibly expand according to needs. |
|||||||||||||||
|
|||||||||||||||||||
Key-Shield Client v1.03 |
|
Direct access to US3 object storage, client software binds the device and cannot be encrypted or decrypted away from the machine. | |||||||||||||||||
Key-Shield Client for US3 V1.03 is a security software specially designed for US3 object storage, which provides secure encryption controlled and managed by users themselves, to realize the safe use of US3 object storage service. It uses a combination of data leakage prevention (DLP) and PKI security technology. Key-Shield Client can be easily deployed on enterprise or user desktops, laptops and intranet servers, and applied to realize secure data access to cloud object storage from devices. |
Encrypted upload: Users can encrypt local data files and upload them to US3 for storage. | ||||||||||||||||||
Download Decryption: Users can download and decrypt the data files on the US3. | |||||||||||||||||||
Data processing: Standard AES-256 algorithm engine is used to support fast encryption and decryption processing of large files. | |||||||||||||||||||
Multi-user management: Different access authorizations can be assigned to members within an organization or team, supporting multiple users to access the same Bucket or multiple Buckets. | |||||||||||||||||||
Key management: Specialized management terminals are used to realize key generation and storage, multi-level key management, supporting different users to assign different keys, or multiple users to adopt the same set of keys. | |||||||||||||||||||
The key is controlled by the customer’s supervisor: the master key is generated and managed by the customer himself, and is kept and controlled by the customer.
|
|||||||||||||||||||
USE CASES harden data security in cloud storage and file sharing |
|||||||||||||||||||
|
|||||||||||||||||||
|
|||||||||||||||||||
Business Data Protection | Personal Info Security | Email Encryption | IP Protection | ||||||||||||||||
Meet Compliances | Secure File Transfer | Device Protection | Cloud Storage Encryption | ||||||||||||||||