Identity Authentication 2016-12-28 06:12:23
Through the establishment of Certification Authority (CA), we can strengthen the secure level for the E-Applications of enterprises or organizations such as E-Sign, E ...
Enterprise Data Protection 2016-12-28 06:12:40
The enterprises' confidential documents might be leakage due to different ways such as hackers or stolen by employees. For protecting the confidential documents, ente ...
Behavior Management 2016-12-28 06:12:55
Behavior Management & Control Employees' unintentional negligence or malicious stealing might makes the confidential data loss or leakage. How to efficiently m ...
Asset Management Control 2016-12-28 06:12:08
Asset Management & Control In the age of informatization, IT asset (ex. system database and files, etc) and entity asset (ex. computers and communication equip ...