top of page
iStock-1081880684_1-03.png

Data Platform
the Guardian 

Ultimate data security solution

01

Key Feature

Identity and Access Management (IAM)

Authentification

iStock-1324560072_1-01.png
  • The user enters the username and password.

  • Additional security requirement, a verification code is sent to the user’s mobile device.

  • The user enters their verification code to log into the application.

Access Management

iStock-1324560072_1-02.png
  • Fine-grained access control

  • Temporary access permission

  • Social media sign-in integration, such as Google and Facebook

Advanced Management

iStock-1316316616_1-03.png
  • Email/SMS notification when logging in unrecognized locations or devices.

  • Multi-Factor Authentication (MFA)

  • Automatically suspend account when risk is high.

  • IP always-allowed/blocked list

02

Key Feature

Authorization Design and System Log

Authorization Design

iStock-1304950378_1-04.png
  • Give different groups of people different access to read/write/execute valuable resources. 

System Log

iStock-1324560080_1-01.png
  • Log what system users use to log in, how long, and when.

  • Log how users are verified and their current status.

Monitor

iStock-1324560072_1-03.png
  • Monitor your system and receive notification via Slack, Line, or Telegram when the system status or configuration changes to ensure prompt damage control and quick response. 

Connecting Dots_edited_dark.jpg

Are You Ready to Accelerate Your Business?

Talk to us about your requirements and needs. 

bottom of page