
User Identity ManagementBuilt-in Authentication Enginesntegrated Authentication Types1+1 Two-factor Authentication; Customized Roles Batch Management of Users
Asset ManagementView Management on Linux/Unix and Windows Assets such as network devices, databases, and Web systems Batch Management of Assets
Permission Controls ABAC Dynamic Authorization; Authority Change OrdersElectronic Worksheet; Four-eyes PrincipleHigh-risk Command Policies; File Transfer Control
Flexible O&M H5 O&M; Cloud Storage Service Transmission; Tool O&MO&M for Application Publishing; Shared-sessionSingle Sign-on; Batch Startup
Precise Operational Audit Command Logging; Text Recognition; SQL ParsingVideo Auditing; 64x Speed PlaybackQuick Search; Report Statistics
Automated O&M Auto Sync Cloud Assets Auto Sync Users; Auto Password Change Automated Script Execution; Automated Management of Network Devices
Security Management System Automatic Blocks for Abnormal LoginsLogin Source Restriction; Web Service Protection TLS Encrypted O&M; Auto Data Sync