Function Module
|
Description
|
Related Documents
|
Identity Management
|
The identity management module provides management
capabilities of your enterprise’s subsidiaries,
departments, members, and roles. It is a powerful
management tool that provides integration with different
platforms across the enterprise and supports the unified
management of identities and authentication processes.
It also provides fine-grained control over the full life
cycle management of identities within your enterprise
and automates authorization processes for all identity
and access requests, thus strengthening the security of
user accounts.
|
|
Application Management
|
The application management module supports integrating
third-party applications or custom applications into the
Admin Console. These applications can be easily accessed
by users though the single sign-on capability provided
by SealSuite. With this module, you can set up an
application gateway to proxy requests to layer 7,
allowing employees to remotely access internal
applications without the need to download SealSuite
clients or establish VPN connections.
|
|
Wi-Fi Management
|
The Wi-Fi management module provides you with the
ability to set up a secured and stable wireless network
or wired network within the enterprise. Building on the
identity management capability, SealSuite helps you
establish a Wi-Fi network that enables both employees
and visitors to have secure access to the corporate
network, and ensures one user can only connect to only
one account. You can configure multiple permission
groups for different network resources based on
users’departments, roles or device statuses, determining
the types of access that devices or users use to connect
to the corporate network. In addition, you can connect
dumb terminal devices to the corporate network via a
wired network, and centrally manage the connected dumb
devices in the Admin Console.
|
|
VPN Management
|
SealSuite’s virtual private network (VPN) adpots the
next generation network tunneling techniques and support
UDP and TCP protocols, and automatic selections of
nodes, ensuring user will have the optimal network
experience. Besides, SealSuite is developed with
multi-tier architecture, and can be used across multiple
data centers. This reduces the potential disaster
recovery risks a data center may face and ensures a
highly stable and highly available network.
In addition, you can centrally configure VPN nodes, and
grant permissions for users to access specific VPN nodes
or use specific network resources, ensuring a secure and
efficient working environment.
|
|
Device Assets
|
Device is an important tool that helps employees
communicate and collaborate. In a digital workplace, the
effective management of terminal devices, including
desktop PCs and mobile devices, becomes ever more
important in building a secure and efficient working
environment. After enterprise users log in to the
SealSuite client on their respective devices, SealSuite
automatically collects the hardware information and
software information from user devices. The collected
information will be passed to other functions to support
device-based operations, such as permission management,
software distribution, or device security checkup and
monitoring.
|
|
Device Control
|
The device control module provides detection and
monitoring capabilities of application-related risks,
process-related risks, and security baselines for PCs
and mobile phones that leveraging different operating
systems. This module also offers the ability to
configure detection rules and remediation plans, helping
you better handle the detected security threats
according to your security needs. Besides, with the help
of identity management capability, SealSuite can provide
configured remediation plans for users who own the
devices that trigger the detection rules and record
detected risk events in the Admin Console. This module
also provides a holistic view of the security statuses
of devices, helping you effectively locate at-risk
devices.
|
|
Anti-virus Control
|
SealSuite is integrated with various virus detection
software developed by leading companies and provides
device protection in risk scenarios where a potentially
malicious document is downloaded, or a potentially
malicious file is received via instant messaging
applications installed on the SealSuite client. Equipped
with well-practice virus detection software, SealSuite
provides multiple protection modes, such as the
scheduled monitoring mode, document scanning mode,
real-time protection mode, and much more, which help you
effectively detect and remediate security threats such
as viruses, trojan horses or malware.
|
|
Dynamic Control
|
The dynamic control module provides various built-in
security rule templates for you to establish a dynamic
control mechanism, greatly reducing the difficulty and
cost of implementing enterprise security measures. The
module is integrated with other functions, such as the
identity management, network management, and device
management capabilities. With this module, you can allow
SealSuite to dynamically evaluate the security statuses
of devices and respond to the specific security threats
as defined by the dynamic rules in real-time. When the
specified changes of device statuses or user actions
occur, the configured dynamic control rules will be
immediately triggered. To enable the dynamic
decision-making mechanism provided by SealSuite, you
only need to add parameter configurations and logical
expressions to dynamic control rules under this module.
|
|
General Settings
|
General settings integrate notifications, client
settings and allowlist settings modules.
-
Notifications: You can configure an enterprise
email gateway in the notification to unify the
content format of the email notification; you
can associate with a third-party IM robot to
push the SealSuite notification to the
third-party IM through the robot.
-
Client configuration: Combined with the
enterprise security requirements, the security
and startup mode of the SealSuite client can be
configured to ensure the stable use of the
SealSuite client by users.
-
Allowlist configuration: The allowlist is a
global allowlist within SealSuite. You can set
an allowlist for one or more functional modules.
Users or devices within the effective range of
the allowlist will not be affected by the rules
of the specific functional modules.
|
|
IT Application
|
The IT application function includes user feedback, help
center, quick tools and software library capabilities,
mainly to help enterprises improve the efficiency of
network and equipment failure repair.
-
When a problem occurs, users can perform network
diagnostics on the client, or seek answers to
common questions in the help center, and resolve
issues based on preset solutions or IT tools
(such as DNS reset). For complex problems, you
can use the client log provided by this module
to further troubleshoot the cause of the
problem.
-
The software library is used to enhance users'
office experience. To satisfy the software needs
of users who own devices with different
operating systems, you can operate and maintain
the software library in the Admin Console,
allowing users to download their desired Mac or
Windows software on the SealSuite clients.
|
|
Integration
|
With integration, you can manage SealSuite OpenAPI
AccessKey in a unified way, manage the operation of each
component (RADIUS, VPN, application gateway, and branch
site) and corresponding servers.
|
|
System Settings
|
The system settings integrate System Settings, Branding,
Audit Log and Admin Access Management modules.
-
System Settings: Manage basic enterprise
information, obtains client installation links,
and configures enterprise user agreements and
privacy policies.
-
Branding: With this function, you can customize
the client to align with your branding
requirements.
-
Audit Log: You can view or send out various log
data recorded by SealSuite, including user or
administrator operation log, VPN connection and
access log, Wi-Fi connection log and dumb
terminal network connection log.
-
Admin Access Management: Manage SealSuite's
administrators, scope of authority, and security
rules in a unified manner.
|
|
License
|
View the expiration date of SealSuite's services and
modules, along with the usage situation of each module.
|
|
Versions
|
This module is used to manage the versions of SealSuite
clients installed on various operating systems. After
you retrieve the latest version of the SealSuite
client's software package from the SealSuite technical
support team, you can add a new version using the
retrieved software package in this module and
synchronize this update to all SealSuite clients on user
devices.
|
|