-
IDPS
-
Product features
-
Product Advantages
-
Application scenarios
-
-
Customer cases
IDPS
IDPS encloses the control of the use of data in a media or isolated environment, and ensures that the data is used according to the established policies through a relatively closed environment. It ensures that the terms and conditions of data use can be calculated, executed and evaluated, and ultimately achieves the purpose of protecting the data by the data provider and using the data as agreed by the data user.
Product features
-
Online data business development
Canvas-based task orchestration, multi-task combination and online code editing tools enable data users to quickly develop applications online. The 1:1 test environment and sample data make it possible to debug tasks without the data being visible.
-
Data security protection
Based on the closed operation of all data in the operating environment, the commissioning environment implements an isolation mechanism for application development, so that the original data is never exposed to the outside world. For end-to-end data encryption, the key can be saved by the user, and even the system itself cannot decrypt the data in the operating environment.
-
Abundant data processing capabilities
It has built-in abundant sensitive data discovery rules and data masking schemes. And it can be combined with data sampling and other functions to automatically generate sample data sets. It supports data operations such as filtering, replacing, extracting, and splitting data, as well as data union and filtering operations with SQL semantics.
Product Advantages
-
Easy to use
Online IDE development capabilities, canvas-based task orchestration, and rich task status monitoring enable users to quickly get started.
-
Abundant functions
It supports the docking of multiple data sources, has abundant sensitive data processing capabilities, and has a variety of built-in machine learning and development frameworks to support rapid application development.
-
Secure and controllable
Trusted and isolated operating environment, all-round process monitoring, complete evidence preservation and audit functions, and whole-process data encryption to ensure data security.
Application scenarios
-
Medical data security, cooperation and sharing
-
Value circulation of government data
-
The contradiction between the privacy protection and utilization of medical data is prominent. On the premise of ensuring that data is not leaked, IDPS follows the principle of data availability and invisibility, empowers hospitals and third parties to mine medical data, and realizes the safe sharing of health care big data.
-
The circulation of government data refers to the effective transmission, sharing, and use of data across institutions and social entities. IDPS supports trusted computing and circulation, ensuring openness, sharing, and security. It achieves compliance management throughout the data lifecycle.
Customer cases
Improve service levels and lead economic development with cloud computing technology,
-
Data sharing and openness of government information resources
Before the government affairs center of a provincial capital opens government affairs data to financial enterprises, first desensitize through IDPS to develop an enterprise credit scoring system.
Develop models such as credit reporting and financial quick loans to ensure data security control, meet the needs of financial customers, and promote secure data sharing.
-
Enterprise information exploration application
For a bank customizing credit products, it is necessary to grasp the credit model of the municipal enterprises. Multi-department data is used to analyze the total number and distribution of enterprises. Through the debugging of IDPS, financial enterprises can test the data dimension, optimize the algorithm, and form an exploration report.
If you have any questions about Inspur Cloud, please contact us
Are you interested in our solutions?
Please do not hesitate to contact us! We're here to help.