Intelligent data security gateway

Intelligent data security gateway is a security product launched under the data security scenario of enterprise internal application systems. It links people, data and risks in enterprise business application systems. It can comprehensively sort out API assets and classify and grade sensitive data. It can monitor sensitive data access behavior in real time while converging access control, and support desensitization through sensitive data, web The ability to watermark files and images, and prohibit the bulk download of data, prevent the leakage of sensitive data, and ensure the security of application side data.

 Preferential activities Preferential activities One month free trial is supported, click to experience immediately

  • Product value
  • Product Functions
  • Product advantages
  • Application scenarios
  • Customer Stories
  • Related products
  • contact us

Product value

Help enterprises meet data security compliance requirements

Through the ability to identify and sort out sensitive data, desensitize, watermark, access control, user abnormal behavior monitoring and other capabilities, help enterprises cope with the relevant provisions of the Data Security Law and the Personal Information Protection Law.

Help enterprises find out "insiders" and prevent data leakage in batches

Data leakage events occur frequently, mostly related to internal risks. The product can help enterprises accurately locate the source of leakage through abnormal behavior monitoring and interception, watermark traceability, log audit and other ways.

Business transformation free can ensure application data security

The reverse proxy is used to protect the data security of the intranet business system. Without any transformation of the business, the data security of key businesses can be guaranteed through desensitization, watermarking, access control and other capabilities.

Product Functions

  • Classification and grading of sensitive data

    Intelligent identification technology and active scanning are used to effectively detect and locate the risk of sensitive data leakage. Support user-defined and built-in rules, realize accurate identification of sensitive information, and continuously monitor sensitive content in the API through periodic tasks. Combine NLP and OCR technology to improve detection accuracy. Synchronize with the classification and grading standards of the ICT Institute, sort and classify data assets, and turn them from "one pot of porridge" to "one account".

  • Business users and authority sorting

    Three user identification methods, namely Http standard authentication, request phase acquisition and response phase acquisition, are adopted to realize automatic and accurate identification of business users. Users can be added manually one by one or imported in batches, and users can be grouped and managed in batches. The product can be seamlessly connected with existing user permission systems (such as IAM or WeChat).

  • Abnormal user monitoring and access control

    It supports multi-dimensional black and white list configuration, including user, address, user address combination and field level control, as well as fine-grained permission control on high-frequency access, download behavior and irregular time access of sensitive data.

  • Real time desensitization of sensitive data

    Provide a comprehensive data desensitization solution, including real-time desensitization, reversible desensitization and picture desensitization. Users can adopt default desensitization template or user-defined template to meet different desensitization requirements. Desensitization strategies include field desensitization, global and intelligent desensitization, etc., to ensure the flexibility and delicacy of data protection.

  • Watermark and Watermark Traceability

    It supports Web, file shading and image shading watermarking capabilities, covers a variety of common formats, and supports custom configuration of watermark content and style to meet different protection requirements. The identity of the leaker can be tracked through big data analysis by combining identity identification watermark code and behavior audit.

  • Fully record sensitive behavior logs

    Provide powerful and diversified logging functions, covering multiple types of sensitive data access, desensitization recovery, access control and access behavior, and record the details of data interaction in detail, including time, IP address, user name, URL, rule type, alarm and other information, to ensure that a complete evidence chain is formed.

Product advantages

Linkage ICT Institute

It is linked with the classification and grading products of the ICT Institute to improve the compliance of sensitive data identification and provide customers with security protection that meets the high standards of the industry.

zero one

Data reversible desensitization

It supports reversible desensitization of data, allows data to be restored to the original state, and can make full use of data resources without sacrificing security.

zero two
 Product advantages

Support picture desensitization

Swin Transformer deep learning model is adopted to realize efficient desensitization of sensitive elements in image data, such as face and license plate number.

zero three

Rich watermark capability

It supports web watermark, document and picture light and dark watermark, improves employees' safety red line awareness, and can trace and lock the leaker through the watermark code.

zero four

Application scenarios

Identification and sorting of sensitive data on the application side
Application side sensitive data desensitization and access control
Watermark and Watermark Traceability
Real time monitoring audit of sensitive data access

Customer pain points

Unclear distribution of sensitive data in business system

Solution

  • Assist enterprises to accurately and quickly identify sensitive data and leakage risk points in business systems through active detection and intelligent identification;
  • Classify, grade and label sensitive data.
 Identification and sorting of sensitive data on the application side

Customer Stories

  • Financial industry case

    Faced with the complex challenges of financial institutions' data security, we protected their web services (OA/ERP) through desensitization and sensitive behavior control, and used the financial industry classification and grading template to sort and label their sensitive data, which not only ensured data security without business transformation, but also improved the efficiency of customer data asset management, Support financial customers in strict compliance while ensuring stable and continuous business operation.

  • Medical institution cases

    In order to solve the pain points of medical institutions such as unclear definition of sensitive data and chaotic management of privileged accounts, this product provides the ability to sort out sensitive assets, classify and classify data and control permissions, and configures watermarks in its CRM system, marketing system, big data resource management and operation platform and other internal systems to achieve intelligent and standardized user data security management, Help customers balance business development and security.

Related products

Contact your consultant now

Free consultation with exclusive consultants of Baidu Smart Cloud to customize product recommendation scheme for you

Apply for probation