https://store-images.s-microsoft.com/image/apps.17284.f7687c51-1a78-4c8f-b150-7b835d5a0f2c.b03b804c-6d2f-419c-af59-668c215ed532.218a4254-93dd-4b69-abc7-3bf64bc9dedc
AnYong Database Encryption System
合肥安永信息科技有限公司
AnYong Database Encryption System
合肥安永信息科技有限公司
AnYong Database Encryption System
合肥安永信息科技有限公司
AnYoung Database Encryption System is a database leakage prevention
Product Advantages
-
Based on TEE technology
Key management and usage are restricted to within the TEE, and keys are not explicitly stored in memory to ensure key security. -
Chip-level key security
Based on chip-level key protection technology to ensure key security. -
Efficient encrypted index
Unique and engineering-proven searchable encryption technology ensures efficient indexing after encryption and solves industry pain points. -
Independent key management
Support software, cryptograph, encryption card and other key generation methods, encryption key independent generation, independent management.
Functional Features
-
Dynamic encryption and decryption
Encryption and decryption to intelligent data stored in the database for automatic real-time flexible dynamic encryption and decryption, without human intervention, to fully realize the safe storage and safe use of data, to prevent the information involved in the confidentiality. -
High Disaster Tolerance
Supports dual-computer deployment of encryption system with master-slave mutual backup to prevent business loss caused by host failure, network failure and program failure. A series of reliability protection technologies, such as batch encryption and decryption, data verification protection, database operation status monitoring, pre-encryption verification, backup recovery, etc., ensure the security, reliability and recoverability of data encryption and decryption process. -
Fully transparent access
After encryption, it maintains full transparency to the outside world and supports operations such as query, insertion, update and deletion, and the application system does not need to be modified. No modification of client statement operation and application program is required; it is fully transparent to the application development interface; common third-party management tools can be used normally; and it is transparent to stored procedures and functions. -
Independent Authority and Control
Provide privilege control for encrypted data, restricting the addition, deletion, modification and checking operations of some users from the client's program, IP, time and day of the week in multiple dimensions to prevent the leakage of sensitive data. Provide automatic encryption/decryption and transparent access to authorized users without any perception, and provide third-party independent access control to unauthorized users independently of the database authority system. -
Support for multiple data types and platforms
It can support various database types such as Oracle, MySQL, PostgrelSQL, etc. and Linux operating system.
Applied value
-
Hacker-proof database dragging
Through the database transparent encryption products to encrypt sensitive data storage, to ensure that others even if they get the data files, but also can not access sensitive information. It can effectively prevent hackers from utilizing database loopholes to attack and invade the database, and ultimately drag the database against the data in the database. -
Prevention of unauthorized access
Database maintenance personnel, who generally have DBA privileges, have access to all sensitive information in the database, which poses the risk of insider leakage and does not comply with security norms. Through independent and enhanced privilege control and separation of powers mechanism, it ensures that no user can access sensitive information in the database without obtaining ciphertext privileges.
Weitere Informationen
安永信息https://store-images.s-microsoft.com/image/apps.44452.f7687c51-1a78-4c8f-b150-7b835d5a0f2c.b03b804c-6d2f-419c-af59-668c215ed532.7863a9df-1f98-48bb-8382-515817a0a7ba
https://store-images.s-microsoft.com/image/apps.44452.f7687c51-1a78-4c8f-b150-7b835d5a0f2c.b03b804c-6d2f-419c-af59-668c215ed532.7863a9df-1f98-48bb-8382-515817a0a7ba
https://store-images.s-microsoft.com/image/apps.8223.f7687c51-1a78-4c8f-b150-7b835d5a0f2c.b03b804c-6d2f-419c-af59-668c215ed532.71bf93ab-6c3a-46df-a710-cef8452b96df
https://store-images.s-microsoft.com/image/apps.144.f7687c51-1a78-4c8f-b150-7b835d5a0f2c.b03b804c-6d2f-419c-af59-668c215ed532.9f55c23d-5236-4395-822c-42a93f2bc290
https://store-images.s-microsoft.com/image/apps.33758.f7687c51-1a78-4c8f-b150-7b835d5a0f2c.b03b804c-6d2f-419c-af59-668c215ed532.991a22de-9929-48d1-825a-a8b692d1d876
https://store-images.s-microsoft.com/image/apps.44.f7687c51-1a78-4c8f-b150-7b835d5a0f2c.b03b804c-6d2f-419c-af59-668c215ed532.afdd4520-4cb5-4188-b2a4-0359aaabb7dd