HOTLINE:

+86-18512167949

+86-18616886644

Disaster Recovery Protection Solution

HOME >> Disaster Recovery Protection Solution

Disaster Recovery Protection Solution

█ Problem requirements

The widespread use of electronic documents brings many security and management hidden dangers to enterprises, and also poses new challenges to the technical management of enterprises.

● Documents are scattered and difficult to manage

The electronic documents are stored in the terminal and are scattered and disorderly. There is a big hidden danger to the security of enterprise information assets. It is difficult to maintain the data, and the backup workload is large and the security is low.

● Slow document lookup and low efficiency

There are many files on the shared disk. Searching documents can only be searched through the Windows search function. The search takes a long time. If you forget the file name, then finding the file is like finding a needle in a haystack.

According to relevant investigations, each employee of the company wastes 30 minutes a day searching for, duplicating documents, and organizing data. Then, each person will waste 7920 minutes each year. Everyone is wasting so much. It can be imagined how many wasteful companies will be made up of tens or hundreds of people. What we waste is not just tens of hundreds of hours, but even tens of millions of dollars. Expenditure

Searching and browsing of important documents and standardized data is inconvenient. It takes time and labor to search through a large number of documents, and it is impossible to perform full-text search, thus losing the value of reusing documents.

● Document authority cannot be refined, security is insecure

Although the permissions of the shared disk pair can be controlled, it is impossible to perform fine-grained partitioning of the user rights. The modification, deletion, and download of the document cannot be controlled. If anyone maliciously modifies or deletes important documents, the document security is threatened.

The survey found that 78% of the information leaked came from within the company. After the employee leaves the company, the copy of the company's trade secret files is taken away and sold to competitors at a high price. In serious cases, the company may incur direct losses of as much as tens of millions of yuan. Indirect losses are even more unmeasurable.

Without good security mechanisms, it is impossible to protect corporate confidential data. After achieving internal LAN sharing, data security is particularly important. There is no perfect user management, rights management, to meet the dual requirements of various departments on data sharing and security

● Privatization of corporate data, low sharing

The degree of sharing of electronic documents is low, and there is no internal sharing and communication platform. Most electronic documents become employees' “private property” and lack of circulation of electronic documents within the enterprise; at the same time, lack of efficient document collaboration office results in ineffective employees. Share documents

● Document version update is difficult to manage, old versions cannot be traced

Because working documents are constantly being modified, and there are many versions of documents, it is difficult to integrate and manage the documents, and the new version is used to overwrite the old version. Once the old version needs to be restored again, it is difficult to retrieve it, causing loss of knowledge and loss. At the same time, it is very easy to cause multiple versions of the situation. The same document has been modified and uploaded by many people, and it is impossible to determine which is the final version. If the version of important documents is misused, it will bring incalculable losses. For example, when the contract was signed, the original contract that had been invalidated was misused; when the production was carried out, the original manuscript was used as the latest design manuscript. These situations often lead to a decline in corporate profits, which causes companies to suffer huge economic losses.

█ Solution

● Active backup of documents

Document backup management supports unified storage management of hundreds of typed documents. The system supports directory classification management of enterprise documents and sets access rights for different users. Also supports the storage of personal documents, users have permission to share documents. The DM system's centralized document management and classification can be achieved through Web pages and document library clients.

1. WEB end document library: The document management system provides the creation, preview, sharing, commenting, labeling, querying and other operations of documents through the Web. In addition, you can create, preview, delete, and share documents in the folder on the IE interface.

2. Client document library: Users can install DPG client, and open DIM to log in to the client interface of the classification file library. Users can upload and download folders through the client. At the same time, the client also provides functions such as folder uploading and downloading, and file breakpoints. The directory structure of the client's classification file library is consistent with that of the Web server, and the operation of the folder on the client is similar to the operation of the local folder. The client uses the same folder design style as the Windows Explorer and stores the document in a folder.

● Manual backup of documents

Users can create folders and upload documents online. The operation of folders is similar to windows explorer. The DM system supports batch uploading of files, and the user can select multiple local files for batch upload to the classification file library.

1. Batch upload of documents: The system supports batch upload of files. The size and number of uploaded files are not limited, which meets the needs of users' large file storage management. The document format supports all types of commonly used document types, such as office, PDF, cad, pictures, audio and video formats.

2, folder drag and drop upload: system supports drag and drop folder upload, users can drag and drop the local folder to the client's classification file library for folder upload operations. The client-side upload can solve the problem that the previous Web cannot upload folders. Users can perform file-related operations on the client as if they were on the local disk.

3, large file breakpoint continued transmission: the system in the Gigabit bandwidth file upload rate can reach 50M / s, to meet the upload speed requirements of large files. To prevent the network from being disconnected after uploading half of an oversized file in the event of a network outage such as a dropped network, the upload fails. The system provides a file breakpoint resume function to upload files that are automatically suspended after the network is disconnected. After the network resumes connection, it can continue to perform previously unfinished file upload operations without user re-uploading. This saves time. , Improve work efficiency and provide a good user experience.

4. File seconds: The system also supports second pass. Before each file is uploaded, the system will first check whether the file with the same content has been uploaded. When the file with the same content is found, the link will be directly linked to the file that has been put in the library and will no longer be entity. File upload saves storage space.

● Backup file type settings

Administrators can set the type of backup file in the policy

Supports but is not limited to user file data formats, including:

1. Office documents: Word, PPT, Excel, PDF, etc.

2, audio and video files: MP3, MP4, AVI, MOV, etc.

3, design drawings: Photoshop, AutoCAD, ProE, etc.

4, source code: C/C++, JAVA, C#, VB, etc.

5. Pictures: JPGE, PNG, GIF, etc.

6, Web documents: HTML, ASP, JSP, PHP, etc.

7, other formats of the document

● File backup frequency setting

You can set the backup interval of the file. During this period, if there are changes to the document in the controlled format, it will be backed up to the server.

█ Expected results

● Active backup

Start up and run, no need for manual intervention in the backup process of client document data

Client backup process is protected to prevent viruses or artificial termination without worrying about missing data backup

● Unified backup

Back up data to the server and establish data warehouse

Centralized management of data assets by companies to eliminate loss of corporate data assets

● Strategy backup

Support active backup of documents in various formats

Support the definition of different backup types for different departments, flexible strategies to meet the personalized backup needs of different organizations

Support unlimited document backup version management

Supports custom backup time and backup methods

● Easy backup

Using a new network involves more convenient system installation, deployment and maintenance

Personalized management interface, easy backup definition

Detailed record of backup operations, backup documents can be organized by backup status (time, type, department, etc.)

Supports quick query and positioning of backup data to ensure easy and convenient backup data recovery

HOME | NEWS | PRODUCTS | SOLUTION | CASES | SERVICE | DOWNLOAD | CONTACT | 中文版

Copyright(C)2018, Zero Information Technology (Shanghai) Co., Ltd. All Rights Reserved. Supported by Toocle Copyright Notice 备案字号:沪ICP备18008633号