ื”ืขื“ื›ื•ืŸ ืฉืืชื ืœื ื™ื›ื•ืœื™ื ืœื”ืจืฉื•ืช ืœืขืฆืžื›ื ืœื“ืœื’ ืขืœื™ื•: ืกื•ืฃ ื”ืชืžื™ื›ื” ื‘-Office 2016 ื•-Office 2019

ืงืจื ืขื›ืฉื™ื•
ืื ื• ืžืฉืชืžืฉื™ื ื‘ื‘ื™ื ื” ืžืœืื›ื•ืชื™ืช ืœืชืจื’ื•ื ื”ืืชืจ, ื•ืขืœ ืืฃ ืฉืื ื• ืฉื•ืืคื™ื ืœื“ื™ื•ืง ืžืจื‘ื™, ื™ื™ืชื›ืŸ ืฉื”ืชืจื’ื•ืžื™ื ืื™ื ื ืžื“ื•ื™ืงื™ื ื‘ืžืืช ื”ืื—ื•ื–ื™ื. ืื ื• ืžื•ื“ื™ื ืœืš ืขืœ ื”ื”ื‘ื ื”.
ืฉื•ืชืคื™ื

ืกื™ื˜ืจื™ืงืก ADC + OPSWAT

ื”ืžืขื‘ืจ ืœื™ื™ืฉื•ืžื™ื ืžื‘ื•ืกืกื™ ืขื ืŸ ื•ื”ื™ื‘ืจื™ื“ื™ื™ื ืžืฆื™ืข ืœืขืกืงื™ื ื“ืจืš ืœื”ืชืจื—ื‘ ื‘ื™ืขื™ืœื•ืช ื›ื“ื™ ืœืขื ื•ืช ืขืœ ืฆืจื›ื™ ื”ืœืงื•ื—ื•ืช.

ืชื•ืš ื›ื“ื™ ืฉื”ื™ื ืžืฆื™ืขื” ื ื•ื—ื•ืช ื•ืคืจื•ื“ื•ืงื˜ื™ื‘ื™ื•ืช ื™ืขื™ืœื•ืช, ืจืžืช ืงื™ืฉื•ืจื™ื•ืช ื–ื• ื’ื ืžืจื—ื™ื‘ื” ืืช ื”ื™ืงืฃ ื”ืืจื’ื•ืŸ ืฉืœืš ืืœ ืžื—ื•ืฅ ืœื’ื‘ื•ืœื•ืช ื”ืžืกื•ืจืชื™ื™ื ื•ืคื•ืชื—ืช ืžืกืคืจ ื•ืงื˜ื•ืจื™ ืื™ื•ืžื™ื ื—ื“ืฉื™ื ื›ืืฉืจ ืชืขื‘ื•ืจืช ืงื‘ืฆื™ื ื ื›ื ืกืช ื•ื™ื•ืฆืืช ืžื”ืืจื’ื•ืŸ ืฉืœืš. ืื™ื•ืžื™ื ืืœื” ื™ื›ื•ืœื™ื ืœื”ืชืคืฉื˜ ื‘ืžื”ื™ืจื•ืช ื•ืœื—ืฉื•ืฃ ืžื™ื“ืข ืกื•ื“ื™ ืื• ืœืืคืฉืจ ืœืชื•ืงืคื™ื ืœื”ืจื—ื™ื‘ ืืช ื˜ื•ื•ื— ื”ื”ื’ืขื” ืฉืœื”ื ื‘ืชื•ืš ื”ืกื‘ื™ื‘ื” ืฉืœืš ื›ื“ื™ ืœื’ืฉืช ืœืžืฉืื‘ื™ื ืื—ืจื™ื.

MetaDefender Core ICAP Server + ืคืชืจื•ืŸ ืžืฉื•ืชืฃ ืฉืœ Citrix ADC

OPSWAT ื•-Citrix ADC ืžืฆื™ืขื™ื ืคืชืจื•ืŸ ืžืฉื•ืชืฃ ืžืงื™ืฃ ืœืืกืคืงืช ืืกืคืงืช ื™ื™ืฉื•ืžื™ื ืžืื•ื‘ื˜ื—ืช ื•ืกื‘ื™ื‘ื•ืช ืžืจื•ื‘ื•ืช ืขื ื ื™ื ื”ื™ื‘ืจื™ื“ื™ื•ืช ืœืžื ื™ืขืช ื”ืขืœืื•ืช ืงื‘ืฆื™ื ื–ื“ื•ื ื™ื•ืช ื•ืื‘ื˜ื—ืช ืชืขื‘ื•ืจืช ืื™ื ื˜ืจื ื˜ ืœืฉืžื™ืจื” ืขืœ ืื‘ื˜ื—ืช ื”ืจืฉืชื•ืช ืฉืœื›ื.

ืขืœ ื™ื“ื™ ื”ืฆืขืช ื’ื™ืฉืช ืžืจื•ื‘ืช ืขื ื ื™ื, Citrix ADC ืžืกื™ื™ืข ืœื—ื‘ืจ ืืช ื”ืฉื™ืจื•ืชื™ื ื”ืžืงื•ืžื™ื™ื, ื”ืขื ืŸ ื•ื”ื”ื™ื‘ืจื™ื“ื™ื™ื ื”ืฉื•ื ื™ื ืฉืœื›ื, ื›ืžื• ื’ื ื™ื™ืฉื•ืžื™ื ื•ื ืชื•ื ื™ื, ืœืžืžืฉืง ืžืฉืชืžืฉ ื™ื—ื™ื“ ื›ื“ื™ ืœืกืคืง ื ืจืื•ืช ื”ื•ืœื™ืกื˜ื™ืช ืฉืœ ื”ืจืฉืช ืฉืœื›ื.

ืกื™ื˜ืจื™ืงืก ADC

Citrix ADC ื”ื•ื ืคืชืจื•ืŸ ืžืงื™ืฃ ืœืืกืคืงืช ื™ื™ืฉื•ืžื™ื ื•ืื™ื–ื•ืŸ ืขื•ืžืกื™ื ืขื‘ื•ืจ ื™ื™ืฉื•ืžื™ื ืžื•ื ื•ืœื™ื˜ื™ื™ื ื•ืžื‘ื•ืกืกื™ ืžื™ืงืจื•-ืฉื™ืจื•ืชื™ื. ื‘ืกื™ืก ืงื•ื“ ื™ื—ื™ื“ ื‘ื›ืœ ืชื™ืง ื”-Citrix ADC ืžืขื ื™ืง ืœืš ื’ืžื™ืฉื•ืช ื•ืžื”ื™ืจื•ืช ื’ื‘ื•ื”ื•ืช ื™ื•ืชืจ ืขืœ ื™ื“ื™ ืžืชืŸ ืขืงื‘ื™ื•ืช ืชืคืขื•ืœื™ืช ื•ื ืจืื•ืช ื”ื•ืœื™ืกื˜ื™ืช ืขืœ ืคื ื™ ืขื ื ื™ื ืžืจื•ื‘ื™ื ืขื ื—ืœื•ืŸ ื–ื›ื•ื›ื™ืช ืื—ื“.

Citrix ื‘ื•ื ื” ื˜ื›ื ื•ืœื•ื’ื™ื™ืช ืกื‘ื™ื‘ืช ืขื‘ื•ื“ื” ื“ื™ื’ื™ื˜ืœื™ืช ืžืื•ื‘ื˜ื—ืช ื•ืžืื•ื—ื“ืช ื”ืžืกื™ื™ืขืช ืœืืจื’ื•ื ื™ื ืœืžืžืฉ ืืช ื”ืคื•ื˜ื ืฆื™ืืœ ื”ืื ื•ืฉื™ ื•ืœืกืคืง ื—ื•ื•ื™ื™ืช ืกื‘ื™ื‘ืช ืขื‘ื•ื“ื” ืขืงื‘ื™ืช ื‘ื›ืœ ืžืงื•ื ื‘ื• ื™ืฉ ืฆื•ืจืš ืœื‘ืฆืข ืขื‘ื•ื“ื”. ืขื Citrix, ืžืฉืชืžืฉื™ื ืžืงื‘ืœื™ื ื—ื•ื•ื™ื™ืช ืขื‘ื•ื“ื” ื—ืœืงื” ื•ืœ-IT ื™ืฉ ืคืœื˜ืคื•ืจืžื” ืžืื•ื—ื“ืช ืœืื‘ื˜ื—ื”, ื ื™ื”ื•ืœ ื•ืคื™ืงื•ื— ืขืœ ื˜ื›ื ื•ืœื•ื’ื™ื•ืช ืžื’ื•ื•ื ื•ืช ื‘ืกื‘ื™ื‘ื•ืช ืขื ืŸ ืžื•ืจื›ื‘ื•ืช.

OPSWAT MetaDefender ICAP Server

Server MetaDefender ICAP ืžืฉืชืฃ ืคืขื•ืœื” ืขื Citrix ADC ื›ื“ื™ ืœืกื™ื™ืข ื‘ืื‘ื˜ื—ืช ืชื”ืœื™ื›ื™ ืืกืคืงืช ื™ื™ืฉื•ืžื™ื ืžืจื•ื‘ื™ ืขื ื ื™ื ืชื•ืš ื”ื’ื ื” ืขืœ ืชืขื‘ื•ืจืช ื”ืจืฉืช ืฉืœืš ื•ืžื ื™ืขืช ื”ืชืคืฉื˜ื•ืช ืื™ื•ืžื™ื: ืชื•ื›ื ื•ืช ื–ื“ื•ื ื™ื•ืช ื™ื“ื•ืขื•ืช, ืชื•ื›ื ื•ืช ื–ื“ื•ื ื™ื•ืช ืฉืœ ื™ื•ื ืืคืก ื”ืžื•ืกืชืจื•ืช ื‘ืžื˜ื-ื“ืื˜ื” ืฉืœ โ€‹โ€‹ืงื‘ืฆื™ื, ืื™ื•ืžื™ื ืžืชืคืชื—ื™ื ื”ืงื‘ื•ืจื™ื ื‘ืงื‘ืฆื™ื ื“ื—ื•ืกื™ื, ืื• ื”ืกื™ื›ื•ืŸ ืœื—ืฉื™ืคื” ื‘ื˜ืขื•ืช ืฉืœ ืžื™ื“ืข ืจื’ื™ืฉ.

MetaDefender ICAP Server ืžืฉืžืฉ ืœืฆื“ MetaDefender Core ืœืกืจื™ืงืช ืงื‘ืฆื™ื ืœืื™ืชื•ืจ ืชื•ื›ื ื•ืช ื–ื“ื•ื ื™ื•ืช ื‘ืขื–ืจืช ืœืžืขืœื” ืž-30 ืžื ื•ืขื™ ืื ื˜ื™-ืชื•ื›ื ื•ืช ื–ื“ื•ื ื™ื•ืช ืžื•ื‘ื™ืœื™ื, ืœื˜ื™ื”ื•ืจ ืชื•ื›ืŸ ืคืขื™ืœ ื‘ืขื–ืจืช ื”ืชื•ื›ื ื” ื”ืžื•ื‘ื™ืœื” ื‘ืชืขืฉื™ื™ื” ืฉืœื ื•. Deep CDR ื˜ื›ื ื•ืœื•ื’ื™ื™ืช ื—ื™ื˜ื•ื™ (ื ื˜ืจื•ืœ ื•ืฉื—ื–ื•ืจ ืชื•ื›ืŸ), ื•ืœืฉืžื•ืจ ืขืœ ืชืื™ืžื•ืช ืœืชืงื ื•ืช Proactive DLP (ืžื ื™ืขืช ืื•ื‘ื“ืŸ ื ืชื•ื ื™ื).

ืชึทืจืฉืึดื™ื metadefender ืคืชืจื•ืŸ ืžืฉื•ืชืฃ ืฉืœ ืฉืจืช icap ืœื™ื‘ื” ื•- citrix adc

ื™ืชืจื•ื ื•ืช ืขื™ืงืจื™ื™ื

  • ื ืชื— ืืช ื›ืœ ืชืขื‘ื•ืจืช ื”ืขืœืืช ื”ืงื‘ืฆื™ื ืฉืขื•ื‘ืจืช ื“ืจืš ืžืื–ืŸ ื”ืขื•ืžืกื™ื ืื• ื‘ืงืจ ืืกืคืงืช ื”ื™ื™ืฉื•ืžื™ื ืฉืœืš
  • ื ื™ืงื•ื™ ืงื‘ืฆื™ื ื•ืืจื›ื™ื•ื ื™ื ื—ืฉื•ื“ื™ื ื‘ืืžืฆืขื•ืช Deep CDR ื›ื“ื™ ืœื”ืกื™ืจ ื›ืœ ืื•ื‘ื™ื™ืงื˜ ืฉืขืœื•ืœ ืœื”ื™ื•ืช ื–ื“ื•ื ื™, ืžื‘ืœื™ ืœืคื’ื•ืข ื‘ืฉืœืžื•ืช ื”ืงื•ื‘ืฅ ืื• ื‘ืคื•ื ืงืฆื™ื•ื ืœื™ื•ืช ืฉืœื•.
  • ื”ืฉื’ืช ืฉื™ืขื•ืจ ื’ื™ืœื•ื™ ืื™ื•ืžื™ื ืงืจื•ื‘ ืœ-100% ื‘ืืžืฆืขื•ืช Multiscanning (ืชื•ืš ืฉื™ืžื•ืฉ ื‘ื”ื™ื•ืจื™ืกื˜ื™ืงื”, ื‘ื™ื ื” ืžืœืื›ื•ืชื™ืช/ืœืžื™ื“ื” ืืœืงื˜ืจื•ื ื™ืช, ื—ืชื™ืžื•ืช ื•ื›ื•') ื›ื“ื™ ืœืžื ื•ืข ืื™ื•ืžื™ื ื™ื“ื•ืขื™ื, ืœื ื™ื“ื•ืขื™ื ื•ืžืžื•ืงื“ื™ื.
  • ื”ืกืจืช ื ืชื•ื ื™ื ืจื’ื™ืฉื™ื ื•ืžื˜ื-ื“ืื˜ื” ืฉืœ โ€‹โ€‹ืงื‘ืฆื™ื ื”ื ืขื™ื ื‘ืจืฉืช ืฉืœืš ื‘ืืžืฆืขื•ืช Proactive DLP ื›ื“ื™ ืœืžื ื•ืข ื“ืœื™ืคื” ืฉืœ ืžื™ื“ืข ืื™ืฉื™ ืžื–ื”ื” ื•ืžื™ื“ืข ืจื’ื™ืฉ ืื—ืจ
  • ื—ื™ืœื•ืฅ ืืจื›ื™ื•ืŸ ืจื‘-ืžืคืœืกื™ ืœืฉื™ืขื•ืจื™ ื–ื™ื”ื•ื™ ื˜ื•ื‘ื™ื ื™ื•ืชืจ ืฉืœ ืชื•ื›ื ื•ืช ื–ื“ื•ื ื™ื•ืช ื•ื”ื’ื ื” ืžืคื ื™ ืคืฆืฆื•ืช ืืจื›ื™ื•ืŸโ€ฏ
  • File-Based Vulnerability Assessment ืœื’ื™ืœื•ื™ ืคื’ื™ืขื•ื™ื•ืช ื‘ื™ื™ืฉื•ืžื™ื, ืจื›ื™ื‘ื™ ืชื•ื›ื ื”, ืžืชืงื™ื ื™ ืžื•ืฆืจื™ื, ื—ื‘ื™ืœื•ืช ืงื•ืฉื—ื” ื•ืงื‘ืฆื™ื ื‘ื™ื ืืจื™ื™ื ืœืคื ื™ ื”ืชืงื ืชื.
  • ืื™ืžื•ืช ืกื•ื’ ืงื•ื‘ืฅ ืœื”ื’ื ื” ืขืœ ื”ืืจื’ื•ืŸ ืฉืœืš ืžืคื ื™ ื”ืชืงืคื•ืช ื–ื™ื•ืฃ

ืžืฉืื‘ื™ื ืžื•ืžืœืฆื™ื

ืฆื•ืจ ืงืฉืจ

OPSWAT ืžืฉืชืคืช ืคืขื•ืœื” ืขื ื—ื‘ืจื•ืช ื˜ื›ื ื•ืœื•ื’ื™ื” ืžื•ื‘ื™ืœื•ืช ื‘ืขื•ืœื ื›ื“ื™ ืœืื‘ื˜ื— ื–ืจื™ืžื•ืช ืขื‘ื•ื“ื” ืฉืœ ื ืชื•ื ื™ื ืฉืœืžื•ืช ื•ืœืกืคืง ืคืจื™ืกื•ืช ืžื”ื™ืจื•ืช ื•ืืžื™ื ื•ืช ื™ื•ืชืจ. ืœืงื•ื—ื•ืช ืžืฉื•ืชืคื™ื ื ื”ื ื™ื ืžืื™ื ื˜ื’ืจืฆื™ื” ืžื•ืกืžื›ืช ื”ืžื‘ื˜ื™ื—ื” ื™ื›ื•ืœืช ืคืขื•ืœื” ื”ื“ื“ื™ืช ืžืœืื” ืขื‘ื•ืจ ื—ื‘ื™ืœื•ืช ืžื•ืฆืจื™ื ืฉืœืžื•ืช.