Listing Thumbnail

    Datacloak DACS

     Info
    The goal of the Zero Trust Secure Workspace (DACS) is to provide precise and personalized protection measures for data operations. By adopting next-generation security sandbox technology, high-performance network tunnels, software-defined boundaries, and AI security policy engines, it achieves precise access control and effective isolation management of sensitive data, building an adaptive security management platform and solution for enterprise terminal data. Under the premise of ensuring security, it meets diverse demands such as full data flow, full data sharing, and mobile office scenarios, maximizing the protection of enterprise data and empowering the digital transformation of enterprises.

    Overview

    The core components of DACS consist of the client, the security brain, the DACS zero-trust control center, and the DACS zero-trust security gateway. The functions of each component are as follows:

    1. Client: It is responsible for establishing a kernel-level security sandbox on the terminal, dividing the terminal from the kernel layer to the application layer into personal space and enterprise workspace. The software (applications) and data running in the secure workspace have data protection functions such as link encryption, disk encryption, data isolation, network isolation, clipboard isolation, application control, process control, peripheral control, and screen watermarking, ensuring that enterprise business resources and sensitive data are in a completely secure and controllable environment. At the same time, the client also executes terminal authentication, data collection, and resource access policies, and collects and transmits terminal data to the security brain for further auditing, analysis, and security warnings.

    2. Security Brain: The security brain perceives various events on the platform through data tentacles spread throughout the system, from the terminal to the application and then to the network, and performs event correlation, comprehensive analysis, and decision-making, achieving three core capabilities: AI-driven continuous verification, adaptive security, and multi-dimensional comprehensive auditing and situational awareness.

    3. Zero-Trust Security Center: The security center is the control room and dispatch center. The strategy formulation, strategy distribution, and strategy execution of each component are all uniformly commanded and scheduled by the security center. This includes identity and account management, authentication methods and login session management, unified management of static and dynamic permission policies, unified management of platform assets, and unified management of workflows and business processes. At the same time, the security center supports open API interfaces, and through personalized workflows and data flows, it can be integrated with the existing security architecture of enterprises to meet various flexible enterprise scenario requirements.

    4. DACS Zero-Trust Gateway: It is mainly responsible for establishing and closing data encryption transmission channels, achieving secure data access and precise control for business. Based on the strategies and instructions from the security center, it provides secure connection capabilities and fine-grained access control capabilities. At the same time, the gateway can provide traffic analysis capabilities, including source IP, port, destination IP, port, protocol, and other information at layers 3 and 4, as well as URL path, HTTP headers, and other information at layer 7. It supports the connection of all traffic information from the security center platform to third-party analysis platforms through Syslog.

    Highlights

    • Leading innovative technologies - Kernel-level secure workspace, controlling a series of behaviors such as system screenshots, keyboard operations, and external device connections; - High-strength disk encryption technology, ensuring the security of data calculation and storage; - Bidirectional authentication of end-to-end data communication links, ensuring the security of data transmission.
    • Ultra-excellent experience with easy maintenance - The software is fully compatible and can be migrated to different working scenarios with one click; - Personal and work spaces are isolated, ensuring security control while not affecting employees' personal privacy; - It supports mainstream PC operating systems such as Windows, Mac, and Linux, maintaining consistent operation habits;
    • The solution is widely applicable. - Supports SaaS model, local installation of terminals, cloud remote control, and can be easily deployed within 1 hour; - Can be easily connected whether in data centers or relying on cloud service providers; - Supports various applications such as Office365 and GitHub;

    Details

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Datacloak DACS

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (1)

     Info
    Dimension
    Description
    Cost/12 months
    Full Suite Enterprise Plan
    The DACS Zero-Trust Full-Function Security Suite (Complete Edition) integrates terminal security
    $505.00

    Vendor refund policy

    no refunds

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    Product purchase contact email: insales@secpeer.com  Product after-sales support contact email: NOC@secpeer.com  Product pre-sales and after-sales support contact number: 400 606 6581

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    No customer reviews yet
    Be the first to review this product . We've partnered with PeerSpot to gather customer feedback. You can share your experience by writing or recording a review, or scheduling a call with a PeerSpot analyst.