⎝⎛韦德足球⎞⎠

Tianjin Optoelectronics Group (State-owned 754 Factory)
Tianjin Optoelectronics Anchen Information Technology Co., Ltd.

Focus on information security for 70 years
Stock code: 871339

Service Hotline: 4009999754

Intranet Integrated Management and Admission Control Solution

2018-12-06

Introduction
With the in-depth development of network information construction, important institutions have deployed internal LANs (referred to as internal networks for short) to achieve resource sharing and further improve work efficiency. The intranet has become the main channel for internal work communication and information transmission of the unit, and has become an integral part of the work environment. Therefore, keeping the intranet operating in a safe and reliable environment, assisting the institutions to standardize the management of various businesses, and improving the protection of important information from the internal source has become a focal issue in intranet security management.
The intranet integrated management and admission control solution is a security management solution for integrated security protection of intranets and computer terminals. It consists of a network access authorization management system solution and a terminal information security integrated management system solution.
The network access authorization management system is a set of hardware network access control systems based on advanced third-generation access control technology, which solves the network compliance requirements for you and achieves the management of “do not enter the network if you violate the rules, and you must comply with the rules when you enter the network” specification. The terminal information security management system uses low-level drivers, Hooks and other technologies and distributed deployment methods. Through perfect control, monitoring and auditing strategies, it provides necessary security protection for various operations of terminal equipment and operation management of USB mobile media, and provides Detailed audit logs provide a tightly controllable security protection system throughout the network.
Risk Analysis
  • Real-name system for accessing users and devices
  • Man-machine correspondence management
  • Quickly discover hidden dangers and intelligent repair
  • Complex network structure and equipment compatibility issues
  • Intranet role security domain control issues
  • Security log audit issues
  • Terminal Security Management Issues
  • Terminal text audit and alarm processing
Product design goals
Intranet integrated management system achieves goals
  • Network-wide risk management and control
  • Real-name access control
  • Multi-mode security monitoring
  • Intelligent patch repair
  • audit
Product function module composition
Intranet Integrated Management System Technology Architecture
Intranet integrated management system terminal network access process
Features and Advantages of Intranet Integrated Management System
  • Adopt double real name system to solve the legality problem of network access personnel and equipment
  • Diversified identity authentication methods to solve the problem of real-name authentication of personnel
  • Comprehensive network access control, inspection engine and standard execution audit, effectively solve the problem of network security standard
  • Provide user and terminal “Human-machine correspondence” responsibility management
  • Develop a unique library of security inspection specifications, in line with industry characteristics
  • "One-click" intelligent security repair technology, greatly reducing workload
  • Maintain a regularly updated security engine rule base to provide continuous services
  • Integrate multiple network access management technologies with good compatibility
  • Role-based dynamic rights management to solve intranet deployment and access control issues
  • Flexible special rules processing to ensure the rapid advancement of intranet construction
  • Guest and guest management to protect corporate intranet resources
  • Combination of single point and centralized network management to solve the disadvantages of decentralized management
  • Real-name log audit report, which can implement intranet monitoring
  • Real-time alarm response to keep abreast of security trends at the network boundary
真人游戏平台注册 七乐彩 欢乐拼三张 欢乐拼三张