⎝⎛韦德足球⎞⎠

Tianjin Optoelectronics Group (State-owned 754 Factory)
Tianjin Optoelectronics Anchen Information Technology Co., Ltd.

Focus on information security for 70 years
Stock code: 871339

Service Hotline: 4009999754

Internet security management subsystem

Internet security management subsystem

Product Description

Tianjin Optoelectronics Anchen Information Technology Co., Ltd ....

The online security management subsystem of Tianjin Optoelectronics Anchen Information Technology Co., Ltd. takes host assets as the management object, and based on the basic idea of "pre-event prevention, control during the event, and audit after the event", it implements distributed deployment and unification through strategy formulation and distribution. Safety management. Through the four major processes of control, monitoring, auditing and management, complete the security control, behavior monitoring, event auditing and security repair of the host computer, record the illegal behavior in detail, complete the tracking, review and evidence collection, so as to achieve the comprehensive protection of the online computer's confidentiality.

The main function

Adopting double real name system to solve network access personnel and equipment ...

1. Adopt dual real-name system to solve the legality problem of network access personnel and equipment. The network access management system provides diversified identity authentication to ensure the legitimacy of network access personnel, and simultaneously supports real-name authentication of equipment to ensure access to the network. The legitimacy of the terminal equipment enhances the controllability of the internal network and facilitates the unified management of the network by the administrator.
2. Diversified identity authentication methods to solve the problem of real-name authentication of personnel. Network access management system not only provides its own user name and password identity authentication, but also supports third-party identity authentication systems such as AD domain, LDAP, USB-KEY, mobile phone text message, and email. Linkages are implemented to ensure the diversity of identity authentication functions.
3. Comprehensive network access control, inspection engine and standardized execution audit. The network access specification management system is based on network access mandatory technology. First, set up sentries at the network boundary to control the previously disorderly network access behavior; combined with an optimized and efficient inspection engine- -"Configurable engine based on security policy" (National Ministry of Science and Technology Innovation Fund No.-09C26223301274), and the engine and specification library can support continuous online upgrades; and monitor the legal implementation of legitimate terminals in the network.
4. "Human-computer correspondence" is responsible for the network access specification management system. It can implement very flexible equipment grouping, hierarchical and sub-domain management, and establish a corresponding management responsibility relationship for all devices for all devices. In this way, the corresponding relationship between IP devices and user IDs is established. Routine management, clear responsibilities in the matter, and audit of standardized behavior after the event are very useful. And according to different types of assets, different security inspection specifications can be adopted.
5. "One-click" intelligent security repair technology The network access specification management system provides intelligent and fast "one-click" repair functions for access devices with hidden security risks, avoiding the complexity and professionalism of repairing hidden security risks, so that Faced with loopholes, end users cannot start, which results in failure to access the network for business operations in a timely manner, and also greatly reduces the workload of administrators.

Product advantage

Distributed centralized protection management, control, monitoring and audit ...

Distributed centralized protection management, control, monitoring and auditing in one. Scientific internal security strategy modular design, convenient upgrade, flexible deployment, convenient installation, powerful host resource monitoring capability, robust and complete system, own security protection system, high performance and high reliability High compatibility

Product parameter Spec

Product parameters ...

Honor Rertificate

Award certificate...

    ...

    ...

    真人游戏平台注册 七乐彩 欢乐拼三张 欢乐拼三张