Update:2008-8          Home
EZ-Lock DRM System
Cyber Data Recorder Client/Server
Network Monitor Gateway
Network Monitor Sniffer
Cyber Data Recorder Client
Online Software Buy now
OEM Project Cooperation
The Integrated Solutions of Monitor System!
DCI provides integrated
solutions to protect
company's vital data
and manage staff
behavior. We develop
various program to
meet various need,
like encryption tool,
network monitor etc.
EZ-Lock EZ-Lock DRM System
Version:EZ-Lock DRM System V2.1
Interface Language:English, Traditional Chinese, Simplified Chinese, Japanese
Required Environment:Windows 2000/2003/XP Professional
Launch Date:October, 2007
Industry Applied:enterprise and government agency who are engaged in designing, researching and developing
Single Performance:single Server can manage 1~2000 PCs
System Architecture:Client/Server
Installation location:protect various documents at local or remove PC
Main Features:1.User doesn't need to change any using habits because all operations are transparent to user. 2.Don't need define documents save path. 3.Use advanced AES Algorithm(256 bits). 4.Encrypted files can't be decrypted even the computer or hard disk is stolen. 5.All files produced by committed programs will be compulsively encrypted. 6.Client can set to block printing documents, clipping or intercepting desktop image.
Brief Introduction:The software can prevent confidential data from illegally moved or copied. For example:primary design blueprint, technical data, customers' data etc. All edited files in the computer will be religiously protected in encrypted environment. Customers can't even know the files have been encrypted. It prevents files from being stolen by hacker or some Trojan programs.
Detailed Introduction
Cyber Data Recorder Client/Server(CDR-Client/Server)
Version:Cyber Data Recorder Client/Server Cyber Data Recorder Client/Server V1.5
Required Environment:Windows 2000/2003/XP Professional
Interface Language:English, Traditional Chinese, Simplified Chinese
Launch Date:November, 2005
Industry Applied:large, medium, small enterprises and government agency
Single Performance:monitor 10~5000 PCs at the same time
System Architecture:transfer to Server for centralized management after Client analyze
Installation location:Server/Client
Main Features:1. can monitor on WAN(for example Taipei company monitors mainland company's PCs or portable computers) 2.software and hardeare management 3.database centralized management and record 4.side-record desktop image 5.monitor and record different data when different accounts are used in a computer 6.separately define different rules for using time
Brief Introduction:The system can monitor HTTP, record E-mail(SMTP、POP3、Webmail)'s content and attachments, files transferred by FTP, IM(MSN, Yahoo, ICQ, Skype)'s chatting contents. The system includes: running programs logs, software and hardware management, record remote desktopd's video in real-time, control remote desktop, view active desktop in 1-9 minutes, manage employee's Internet time, deny browsing website's black/white list, deny uploading/downloading files, deny transferring files by real-time communication tools, deny running committed program, deny using the USB or other record devices, modification and visiting records of file, program running records etc.
Detailed Introduction
Network Monitor Gateway(CDR-Gateway)
Version:Network Monitor Gateway Cyber Data Recorder Gateway V2.0
Required Environment:Windows 2000/2003 Server
Interface Language:English, Traditional Chinese, Simplified Chinese
Launch Date:March, 2004
Industry Applied:enterprise and government agency
Single Performance:monitor 15~400 PCs at the same time
System Architecture:gateway analysis package(two slices of network cards)
Installation location:network communication exit gateway port route
Main Features:1.can filter key words 2.extremely low rate of losing Loss 3.support proxy server environment
Brief Introduction:The system can monitor various protocol like HTTP, HTTPS, E-mail(SMTP, POP3), FTP, SSH, Telnet, IM(MSN, Yahoo, ICQ, AIM) etc. It can fully record sent files, browsed records, chatting contents and it can block "key words" not to let unallowed information be sent out!
Detailed Introduction
Network Monitor Sniffer(CDR-Sniffer)
Version:Network Monitor Sniffer V2.0
Required Environment:Windows 2000/XP Professional
Interface Language:English, Traditional Chinese, Simplified Chinese
Launch Date:August, 2005
Industry Applied:enterprise and government agency
Single Performance:monitor 15~400 PCs at the same time
System Architecture:sniff analysis package(one network card)
Installation location:the HUB broadcasting package point at network communication port
Main Features:1.easy installation 2.can't need to change original network structure
Brief Introduction:This system can monitor various protocol like HTTP, E-mail(SMTP, POP3), FTP, IM(MSN, Yahoo, ICQ, AIM) etc. It can fully record all the information such as sent files, browsed records, chat contents. It has other functions:restrict the using according to different groups, monitor netwrok flux ect.
Detailed Introduction
Cyber Data Recorder Client(CDR-Client)
Version:Cyber Data Recorder Client V1.0
Required Environment:Windows 2000/XP Professional
Interface Language:Traditional Chinese, Simplified Chinese
Launch Date:July, 2005
Industry Applied:families and individuals
System Architecture:local management
Installation location:PC local
Main Features:1.easy installation 2.run in hidden mode, uneasy to be found 3.separately monitor when a computer is used by different account 4. network time management
Brief Introduction:The system can be installed to moniter with background hidden, aim at monitoring protocols like HTTP, E-mail (SMTP, POP3), FTP, IM (MSN, Yahoo, ICQ) etc. and fully record sent files, browsed records, chatting contents. Otherwise it can time record desktop image, restrict to use mobile save devices and network time, set the website's black/white list prohibited from visiting and so on.
Detailed Introduction
Advertisement
Advertisement
上海卫星电视安装 卫星电视 上海卫星天线安装