¿Aún no es miembro de TradeKey.com? Regístrese para conectarse con 9 millones de importadores y exportadores a nivel mundial.
registro |
BOOK A CALL
Book Call On Your Favorite Time

By Signing Up. I agree to TradeKey.com Terms of Use, Privacy Policy, IPR and receive emails related to our services

Contact Us
product
Prev
Secufiles Secufiles
Next

Secufiles

|

10 Box Minimum Order

País:

China

N º de Modelo:

-

Precio FOB:

Lugar de origen:

-

Precio de pedido mínimo:

-

Cantidad de pedido mínimo:

10 Box

Detalle de embalaje:

-

El tiempo de entrega:

-

Capacidad de suministro:

-

Tipo de pago:

PayPal

Grupo de productos :

-

Contactar ahora
Miembro Básico

Persona de contacto Mr. Wen

408, 45th Building, WangHai Road, Sotfware Parkâ…¡, Xiamen, Xiamen, Fujian

Contactar ahora

Descripción del producto

Secufiles is a product which a software embedded in USB key . my company owns its IP. It could be used as both protecting files and USB key storage. My company based on several years analysis of a lot of protocols and data, to develop the network theft capture system and file protection system. It could quickly and efficiently identify steal behaviors for files, stop stealing, prompt stealers target files and stealers addresses, and automatically encrypted targeted files. Since Snowden event, it is well-known that computers files will be easilly stolen on the internet and wireless. This is the first product to stop stealing and protect files in the world.
 
Its functions are as follow:
1. Unique: The USB key has its own corresponding registration code, which can only use when insert this USB key.
2. Real time: When network theft occurred, the pop-up window prompts the steal behavior, informs the stolen documents, target addresses and automatically encrypted target files at the same time.
3. High efficiency: This system will not obstruct networks normal data stream, and will not affect users normal use of network.
4. Self-protection: Security products are easy to be attacked, so the system repairs itself each time when you start it to avoid being attacked.
5. Record: Besides warning the theft, the system will record all theft behavior in accordance with the occurrence time to allow easier post processing, and automatically decrypted when USB works.
6. Block: For theft found, the blocking tool of the product seals off the IP in time, and temporarily blocking contact with the computer.
7. Encryption: The product applies with international standard algorithm, the local files and folders could also be manually or automatically encrypted and decrypted. Stealers could not break.
 
Advantages: The product is an international initiative, and there are not competing products currently. Moreover, my company owns full intellectual property rights. And the structure of it is simple, compact and flexible, easy to install, can play when insert. Using easy manner, just apply with a key.
 

País: China
N º de Modelo: -
Precio FOB: Obtener el precio más reciente
Lugar de origen: -
Precio de pedido mínimo: -
Cantidad de pedido mínimo: 10 Box
Detalle de embalaje: -
El tiempo de entrega: -
Capacidad de suministro: -
Tipo de pago: PayPal
Grupo de productos : -

Productos relacionados Xiamen Secure Hardware

Send a direct inquiry to this supplier

A:

Mr. Wen < Xiamen Secure Hardware >

quiero saber: