⎝⎛韦德足球⎞⎠

Tianjin Optoelectronics Group (State-owned 754 Factory)
Tianjin Optoelectronics Anchen Information Technology Co., Ltd.

Focus on information security for 70 years
Stock code: 871339

Service Hotline: 4009999754

Security print monitoring and auditing system-stand-alone version / network version

Security printing-stand-alone version / online monitoring and audit system


Product Description

Printer has become an essential tool for modern office ...

Printers have become a must-have tool for modern offices. While greatly improving people's work efficiency, due to the lack of effective management and monitoring of printers, printing leaks occur from time to time in various fields, which has brought great harm to companies and units Damage or even property damage.
The “High Security Printing Monitoring and Auditing System” developed by our company has realized the monitoring and management of the entire process of document printing (submission, approval, output, and recycling), and generates a detailed query log for easy statistics and traceability. . The printing system utilizes technical means to comprehensively guarantee the security of printed documents and prevent the possibility of leakage of printed output.

Core strengths

Unified management and control: the printing equipment is uniformly controlled by the card verification terminal ...

  • Unified management and control: The printing equipment is uniformly controlled and controlled by the swipe authentication terminal. Users do not have the right to print directly. They can only submit print jobs through a dedicated print driver.
  • Real-time monitoring: Real-time monitoring of the user's printing behavior, preventing illegal printing and promptly alerting the system administrator; the detailed information such as the printing time, printer name, number of pages, and number of copies serve as the main evidence for traceability of print jobs. The monitoring system records the user name, document name, workstation IP, workstation name,
  • Multi-level approval: Support custom approval process and up to 4 levels of approval system. The approver directly reviews the print content, and keeps the approval record in detail while ensuring that the user's print permissions are not exceeded.
  • Traceability of printing behavior: The system administrator can use the detailed log and content of the encrypted print job to trace the entire print job of the user. The printing system helps system administrators quickly lock down leakers after an information breach.
  • Roaming card printing: Users are not restricted by specific printer models, and can perform card swiping operations on any card swiping authentication terminal to output print jobs on their corresponding printers. Supports various contact and contactless ID / IC cards, CPU cards, such as employee cards, dining cards, access cards, etc.
  • Security audit function: The security auditor can query, print and export the management records of the system administrator by logging in to the WEB management application server.
  • Scanning and recycling: The administrator logs in to the WEB management application server and recycles the printed document by scanning the QR code printed on the document page, which is convenient, accurate and fast.

...

Product parameter Spec

Product parameters ...

Operating platform Windows 2000, Windows XP, Windows Server 2003, Windows 7
Concurrent number 100 user system capacity 1000 user password algorithm AES, RSA, optional SM1, SM2, SM3

Honor Rertificate

Award certificate...

...

...

真人游戏平台注册 七乐彩 欢乐拼三张 欢乐拼三张