/ SPC


How does SPC work?
SPC plays the role of a "Gatekeeper" in the TOS system. It sets up a barrier to verify user authorization for all executable programs that need to access TNAS network resources or storage space. Only after obtaining user authorization, can the program gain access permissions.Whitelist Security Mechanism
SPC will record the hash values of all default executable programs in the TOS system, and use digital signatures to distinguish these programs from other external programs. When SPC is enabled, these default executable programs will be automatically added to the white list and their hash values will be verified before running to prevent tampering.

Protection of Sensitive Resources
SPC provides comprehensive protection for sensitive resources. It not only adds all default executable programs to the whitelist, but also prompts the user whether to allow the application to access sensitive resources such as the system's network resources and storage space. This means that only programs authorized by the user can access these sensitive resources, ensuring data security and privacy.Strict Identity Authentication
SPC protects itself by setting up strict user authentication processes. Whether it is modifying the whitelist or adding an application, SPC has corresponding verification steps to ensure its own security.

Protect Against Ransomware
Through its unique protection mechanism, SPC can detect and prevent various potential security threats, significantly reducing the risk of hackers implanting malicious code into TOS systems and applications, greatly improving system security and data security levels.Application Scenarios
For users who need remote access or set up services to support their business, connecting TNAS devices to the Internet may pose security risks. SPC can effectively reduce security threats from the external network, so it is very suitable for users who are sensitive to data security but have to access the external network or remote access.