Overview
The core components of DACS consist of the client, the security brain, the DACS zero-trust control center, and the DACS zero-trust security gateway. The functions of each component are as follows:
-
Client: It is responsible for establishing a kernel-level security sandbox on the terminal, dividing the terminal from the kernel layer to the application layer into personal space and enterprise workspace. The software (applications) and data running in the secure workspace have data protection functions such as link encryption, disk encryption, data isolation, network isolation, clipboard isolation, application control, process control, peripheral control, and screen watermarking, ensuring that enterprise business resources and sensitive data are in a completely secure and controllable environment. At the same time, the client also executes terminal authentication, data collection, and resource access policies, and collects and transmits terminal data to the security brain for further auditing, analysis, and security warnings.
-
Security Brain: The security brain perceives various events on the platform through data tentacles spread throughout the system, from the terminal to the application and then to the network, and performs event correlation, comprehensive analysis, and decision-making, achieving three core capabilities: AI-driven continuous verification, adaptive security, and multi-dimensional comprehensive auditing and situational awareness.
-
Zero-Trust Security Center: The security center is the control room and dispatch center. The strategy formulation, strategy distribution, and strategy execution of each component are all uniformly commanded and scheduled by the security center. This includes identity and account management, authentication methods and login session management, unified management of static and dynamic permission policies, unified management of platform assets, and unified management of workflows and business processes. At the same time, the security center supports open API interfaces, and through personalized workflows and data flows, it can be integrated with the existing security architecture of enterprises to meet various flexible enterprise scenario requirements.
-
DACS Zero-Trust Gateway: It is mainly responsible for establishing and closing data encryption transmission channels, achieving secure data access and precise control for business. Based on the strategies and instructions from the security center, it provides secure connection capabilities and fine-grained access control capabilities. At the same time, the gateway can provide traffic analysis capabilities, including source IP, port, destination IP, port, protocol, and other information at layers 3 and 4, as well as URL path, HTTP headers, and other information at layer 7. It supports the connection of all traffic information from the security center platform to third-party analysis platforms through Syslog.
Highlights
- Leading innovative technologies - Kernel-level secure workspace, controlling a series of behaviors such as system screenshots, keyboard operations, and external device connections; - High-strength disk encryption technology, ensuring the security of data calculation and storage; - Bidirectional authentication of end-to-end data communication links, ensuring the security of data transmission.
- Ultra-excellent experience with easy maintenance - The software is fully compatible and can be migrated to different working scenarios with one click; - Personal and work spaces are isolated, ensuring security control while not affecting employees' personal privacy; - It supports mainstream PC operating systems such as Windows, Mac, and Linux, maintaining consistent operation habits;
- The solution is widely applicable. - Supports SaaS model, local installation of terminals, cloud remote control, and can be easily deployed within 1 hour; - Can be easily connected whether in data centers or relying on cloud service providers; - Supports various applications such as Office365 and GitHub;
Details
Unlock automation with AI agent solutions

Features and programs
Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/12 months |
---|---|---|
Full Suite Enterprise Plan | The DACS Zero-Trust Full-Function Security Suite (Complete Edition) integrates terminal security | $505.00 |
Vendor refund policy
no refunds
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Vendor resources
Support
Vendor support
Product purchase contact email: insales@secpeer.com Product after-sales support contact email: NOC@secpeer.com Product pre-sales and after-sales support contact number: 400 606 6581
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.