News

Location:Home> News > Corporate news

Epidemic Besieged City-How does remote office balance between convenience and data security

"People in the city want to escape, and people outside the city want to rush in. It doesn't matter whether it's marriage or career. Most of the desires in life are like this." --Yang Jiang


At the beginning of Year of the Rat, a sudden outbreak of coronavirus pandemic pulls people’s heartstrings. In order to strengthen prevention and control of the Covid-19 and keep off the infection, all enterprises and institutions have embarked on business flexibly by doing work in remote office or mobile office after the Spring Festival. Putting employees’ health first is a guarantee for all walks of life.


1.jpg


In fact, after years of IT infrastructure construction, most enterprise employees can now do work in remote offices on the basis of network VPN products and solutions.


However, under the impact of such a large-scale pandemic, access systems constructed before confront an army of different types of terminal equipment, especially mobile terminal ones. A big corporate with a large number of employees how to effectively manage the data in access terminal equipment and ensure the company’s data security have become a test for all IT managers.


Shanghai Geewell Information System Co., Ltd., as an IT company, focuses on enterprise information system infrastructure. We have years of solution experience in Fortune 500 customers market. We offer end-to-end data management and entire chain of supervision for data, cloud and terminal to help enterprise users easily and safely achieve data management and protection during the remote office process.


01: Data protection

“Data protection not replying on backup is matched with a man behaves like a hooligan.” As an old saying goes, “two birds in the forest is not as good as one bird in the hand", at this sensitive moment, compiling regular and reasonable data protection strategies is undoubtedly the best way to protect business continuity. Geewell prompts cold backup and warm backup, stands at multiple operating system compatibility, and supports Windows, Linux, mobile phones, etc. Geewell will combine a method of source deduplication with dirty read recognition to protect enterprise data comprehensively.


02: Data visibility

We make all entering and leaving traffic of the corporate network boundary subdivided and controlled by a way that supports TCP/IP seven-layer application identification. We transform suspicious intrusion request into a human-readable regulatory picture in light of digital fingerprint matching technology, which minimizes the possibility of loss or theft in enterprise sensitive data.


03: Data fingerprints

Geewell lays a solid foundation on a faith— “to seize more details” —as we believe that the devil is in the details. Do not ignore any small parts and components until find primary errors. Geewell's data forensics solution, depending on storage nodes and distributed network probes, will pinpoint and discern the clues of deliberate interception and leakage. 


04: Collaborative office

We offer data flow from cloud to terminal to help enterprise build and deploy an easy-to-control file sharing platform according to their own strategies, meeting the sharing demand on internal and external file. We also provide enterprise-level cloud disk while we help search and analyze sharing contents and data within the exclusive organizations. That aims to fulfill data-sensitive industries legal regulations and audit requirements.


05: Self-service

We have WEB console that gives control flexibility to enterprise IT administrators and enables them the longitudinal management of the aforementioned various service components. WEB console has standard and user-defined interface function that can seamlessly interface with an enterprise's existing operation and maintenance system, greatly reducing the administrator's work load.


06: Flexible deployment

Modular architecture does not retard high deployment flexibility. After years of consistent case verification, we confirm that it can indeed meet different enterprise sizes.

It is not only suitable for data centers, but also covers multiple business scenarios such as public cloud and hybrid cloud.

The covid-19 brings challenges to our working mode. If we handle them properly, we believe it is an opportunity to promote a rational transformation of the internal IT structure for major enterprises and institutions. 


TOP