X-FORT ¬O§¹¾ãªº¸ê®Æ¦w¥þ¨¾Å@¸Ñ¨M¤è®×¡A¥]§tData Leak Prevention¡BData Protection ©M IT Asset Management¡C ¨¾¤î¸ê°T¬ªº|¿ò¥¢¡A¨Ã´£¨ÑÀ³¥Îµ{¦¡ºÞ²z¡B¹q¸£¸ê²£½LÂI¤Î»·ºÝ»»±±ªººÞ²z¨t²Î¡C
¥þ¤è¦ì¨¾Å@
X-FORT¦]À³²{¥N§Ö³tÅܤƪº½ÆÂøÀô¹Ò¡A¾ã¦X¤F¦UºØ«OÅ@§Þ³N¡A´£¨Ñ¥þ¤è¦ìªº¨¾Å@¡G
- Data Leak Prevention¡G¥»¾÷¥~±µ¸Ë¸m¤Îºô¸ô¦æ¬°¥~¬ª¨¾Å@
- IT Asset Management¡G¸ê°T¸ê²£ºÞ²z¡A¥]§t³n/µwÅé¸ê²£ºÞ²z¡B³nÅé±ÂÅvºÞ²z¡B³nÅé±±ºÞ
- Data Protection¡G¤å¥ó¨Ï¥ÎÅvºÞ²z¤Î¥[±K«OÅ@
- User Activity Monitoring¡G¨Ï¥ÎªÌ¦æ¬°ºÊµø»P½]®Ö¡A¥]§tÀÉ®×¾Þ§@¡Bºô¸ô¦æ¬°¾Þ§@µ¥
- ¦øªA¾¹¦w¥þ³q¹D¡Gºô¸ô¦s¨ú±±¨î¡A¥u¤¹³\«H¥ô¥Î¤áºÝ¦s¨ú¦øªA¾¹¡A¨Ã¨¾¤î¥¼±ÂÅv¸Ë¸m¦s¨ú
²£«~®Ä¯q
- ¦w¥þÀH¡u¾÷¡v±aµÛ¨«¡G»·ºÝ³s½u¡B¸ó¼t°Ï¡B¤£ºÞ¨³B¦ó¤è¤u§@¡A¥þ¦Û°Ê¤Á´«¸ê¦w¬Fµ¦
- ¥þ½L´x´¤©PÃä¸Ë¸m¡G©PÃä¸Ë¸m¹s«H¥ô¡A¦³®Ä±±ºÞ¹q¸£©PÃä¸Ë¸m¡AÁקK¸ê®Æ¥~¬y
- ¦³®Äªý¾×´c·Nµ{¦¡¡GÀ³¥Îµ{¦¡¹s«H¥ô¡A¤£Åý¥¼ª¾À³¥Îµ{¦¡(¦p¡G´c·Nµ{¦¡)°õ¦æ
- ¥þ±ÁYºô¸ô¦æ¬°¡GIM¡Bµø°T³nÅé¡AÀɮפW¶Ç¥þª¾¹D
- ¸ê®Æ¥[±K±a¤£¨«¡GºÞ±±¥[±KÀɮסA¨ã¦³Åv¤~¥i¶}±Ò½s¿è
- y¸ñ°O¿ý¦³¸ñ¥i´`¡G½]®Öû¤u¦U¦¡¾Þ§@¦æ¬°¡A«OÅ@¥ø·~¤]«OÅ@û¤u
- °ÊºA°»´ú¡A¦³®Ä¤ÏÀ³ªýµ´¡G¨Ì¨Ï¥ÎªÌ¾Þ§@¦æ¬°¡A°ÊºA±j¤Æ±±ºÞ¬Fµ¦