The content of this page has been automatically translated by AI. If you encounter any problems while reading, you can view the corresponding content in Chinese.
In today's digital age, data security has become one of the most concerned issues for enterprises and individuals. As a leading cloud computing service provider, Tencent Cloud offers a series of data security features to protect customer data from threats. This document will introduce the data security features provided by Tencent Cloud's WeData, offering a systematic data security system from asset inventory, risk assessment, and data protection to risk monitoring and operation, helping users understand and use these features to protect enterprise data.
Overall architecture
The overall architecture of WeData data security is as follows:
Note:
Dear customer, some features are not yet available. We greatly appreciate your attention and support to our product. Our team is working hard to ensure every detail is meticulously crafted and optimized. We will launch these features as soon as possible to bring a more comprehensive enhancement to your product experience. We look forward to witnessing the growth and progress of the product with you!
Feature Name
Feature Overview
Asset Inventory
WeData offers data asset security classification and grading features, including classification and grading configuration, classification and grading tasks, and sensitive data distribution features. With various built-in industry classification and grading templates, it ensures that enterprises can quickly identify and understand their data security status.
Risk Assessment
(Not yet available)
WeData provides data risk assessment features, identifying, analyzing, and evaluating potential risks in data assets. The aim is to understand data security risks in advance to intervene and reduce the adverse impact of data on the business.
Data Protection
WeData offers various data security protection features, including data access control, static/dynamic data masking features, ensuring the security control of data usage and access on the platform.
Risk Monitoring
(Not yet available)
WeData provides end-to-end risk monitoring, including platform operation log auditing, data access auditing, and user behavior analytics features. Through post-analysis and tracing, potential data security risks can be identified.
Continuous Operation
(Not yet available)
WeData provides risk handling and alarm mechanisms, including risk handling notifications, risk handling alarms, and risk handling reports. Through continuous monitoring and addressing of risk issues, we continuously improve enterprise data security issues.