Welcome To b2b168.com, Join Free | Sign In
中文(简体) |
中文(繁體) |
Francés |Español |Deutsch |Pусский |
| No.9512727

- Product Categories
- Friendly Links
Information Name: | Supply Shenzhen Special Sheng Technology rose mk double backup software |
Published: | 2013-07-23 |
Validity: | 30 |
Specifications: | |
Quantity: | 9999999999.00 |
Price Description: | |
Detailed Product Description: | RoseMK Keywords: retrieve the stored archive RoseMK message capture to record all messages through the mail server data, the disclosure of confidential information by e-mail users when using the search function of the system quickly retrieve e-mail, to reproduce the original message. Through this system can effectively monitor breaches of confidentiality, played the role of crime suppression. RoseMK Features l High-speed, efficient, stable and accurate data capture e-mail system deployment using bypass TAP device, without affecting the original network topology while efficient access to e-mail data. In addition to receiving the message received sender, subject, text, e-mail attachments and other basic information, but also record access IP, MAC address and access time and other valuable information. l secure data storage mechanism for getting the message data using public key encryption private key to decrypt the way. If you save the mail data is stolen, no private key can not view the message content. The saved data is encrypted tamper treatment, to ensure data is secure. l efficient and flexible retrieval access to retrieve high-speed, flexible. In accordance with the conditions specified by the user (from, to, cc, subject, etc.) to retrieve the message data, and also provides multiple search conditions combined query (using and, or, or not logical conditions retrieval) details of the message, including the subject, body and attachments content. l set up a simple, flexible deployment, automated system to manage the system deployment will not change the existing network topology, without having to change the mail server settings. The core of the system not only into the way data acquisition mode allows an external intrusion RoseMK system can not ensure the security of the system data. With system fault detection and automatic recovery functions notification function. l parse multiple e-mail attachment file format to parse e-mail attachments in a variety of common file formats, such as multiple e-mail attachment encoding format, Office suite file format, compression, archive file formats, PDF files format and text file formats such as. RoseMK supported protocol types: l standard mail protocols SMTP, POP, IMAP, SMTPS, POPS, IMAPS l Webmail 163,126, Yeah.net, sina, QQmail, 21cn, yahoo, hotmail, sohu, tom, 139,189 l Exchange / Donino mail archiving Exchange 2003/2007, Domino 6.5/7.0/8.0 l SSL protocol type SSL3.0, TLS1.0 RoseMK retrieval supported attachment file formats: l multiple email attachment compression encoding format Base64/7bit/8bit/Quoted-printable l , the archive file format zip/rar/tar/tgz/tar.gz/tar.bz/bz2/gz l Office suite file formats MS Word 97/2000/XP/2003/2007/2010 MS Excel 97/2000/XP/2003 / 2007/2010 MS Power Point 97/2000/XP/2003/2007/2010 WPS Word 2005/2007/2009/2010 WPS Excel 2005/2007/2009/2010 WPS PPT 2005/2007/2009/2010 l PDF file format Adobe Reader 7.0/8.0/9.0 l text file format TXT / HTML / XML / EML secure data storage mechanism for real-time access to all mail-related data (including attachments), support for various types of mail servers intact data and compressed storage strategy, saving mail data storage space, the original data is encrypted and tamper treatment, to ensure the appropriate laws and regulations to adapt to the needs of IT infrastructure to adapt to the user's highly flexible storage mechanism. Unique permissions handling retriever / Settings / managers manage ideas of separation of powers: Retrieve permissions: searchers have only retrieve permissions can not be set up and manage. Set permissions: Set by the system basic configuration, you can add search users, by itself can not be retrieved. Administrator privileges: Administrator can retrieve the log monitoring searcher behavior. Separation of powers and management modes allow searchers to set, managers mutual supervision, carry out their duties, and enhance the security of the system. |
Admin>>>
You are the 19318 visitor
Copyright © GuangDong ICP No. 10089450, Keyuan Road, Nanshan District, Shenzhen Science and Technology Park, Keyuan West 24, East Block 603 All rights reserved.
Technical support: ShenZhen AllWays Technology Development Co., Ltd.
AllSources Network's Disclaimer: The legitimacy of the enterprise information does not undertake any guarantee responsibility
You are the 19318 visitor
Copyright © GuangDong ICP No. 10089450, Keyuan Road, Nanshan District, Shenzhen Science and Technology Park, Keyuan West 24, East Block 603 All rights reserved.
Technical support: ShenZhen AllWays Technology Development Co., Ltd.
AllSources Network's Disclaimer: The legitimacy of the enterprise information does not undertake any guarantee responsibility