Intranet security management system
The intranet security management system takes terminal management as the core and forms a management system that integrates terminal security behaviors such as host monitoring and auditing, patch management, desktop application management, information security management, and terminal behavior control to create a safe, reliable, and stable environment for users. office network. Beixinyuan intranet security management system takes terminal management as the core and forms a set of host monitoring and auditing, patch management, desktop application management, information security management, terminal
- 1. Create a secure intranet environment to ensure the safe and stable operation of the host. 2. Combine host monitoring and data leakage to protect core data security.
Beixinyuan intranet security management system takes terminal management as the core and forms a management system that integrates terminal security behaviors such as host monitoring and auditing, patch management, desktop application management, information security management, terminal behavior control, etc., providing terminals for enterprise managers A multi-in-one, unified management solution creates a safe, reliable and stable office network for users.
1. Functional features
·asset Management
Manage the entire network's hardware assets and software assets, as well as software and hardware equipment change information.
·Security access control
Through the construction and implementation of terminal security access control management, the identity authentication and authorization management of end users will be completed, and the security access control and management of terminal computers will be realized, that is, only in compliance with established security requirements or security policies. Able to enter the internal network to prevent illegal users or unauthorized users from entering the internal network without authorization.
·Illegal outreach management
Monitor, audit and block illegal connection methods such as dual network cards, WIFI, 3G, Bluetooth, infrared, etc., and can set applicable scenarios for auditing and control strategies to ensure flexible working on the basis of security. It can monitor the illegal external connections of internal terminals and offline terminals to the Internet or other networks, and promptly warn, block, automatically shut down, and obtain behavioral evidence.
·Patch distribution and file distribution management
It can manage the patch distribution of the operating system, IE browser and OFFICE; supports automatic distribution and manual distribution, and supports file push and file installation functions in any format. When delivering patches or files, LAN search is preferred to reduce bandwidth usage and ensure the smoothness of the business network.
·Desktop security management
Through the security management and protection of desktop terminals, we can ultimately realize the security control and compliance management of desktop terminals, realize the manageability and controllability of desktop terminals, prevent unsafe terminal computers from running in the network, and prevent various Security risks caused by insecure factors operating in the network.
·Terminal security hardening
Carry out security management and control of terminal computer hardware peripherals, manage and control terminal computers' weak passwords, system screensavers, etc.; be able to manage, control and audit changes in user permissions of terminal computers; be able to operate terminal CPU, memory, hard disk, traffic and other resources Conduct audit management according to the situation; prevent terminals from connecting to illegal networks.
·Behavior safety control
Through the construction of terminal behavior management, we can ultimately achieve unified control and statistical analysis of end users’ online behavior, confidential information transmission, network application behavior, and various operational behaviors, and reduce the security risks of end user behavior access.
·Mobile storage and secure U disk management
Through mobile storage and secure U disk management, it meets the requirements for interactive work on production networks, office networks, and the Internet. It can disable external U disks and internal U disk encrypted storage, strengthen U disk usage authentication and operation auditing, and provide different services for different users. Customize a dedicated secure U disk for application scenarios.
·Port and peripheral hardware control
The system can set the controlled host to allow or prohibit the use of USB devices, serial ports, parallel ports, floppy drives, optical drives, infrared devices, Bluetooth devices, network devices (wireless network cards, network cards, PCMCIA), 1394 interfaces, and printing devices. The system uses hardware device driver-level disabling methods to disable the above devices.
·Terminal data management
Through terminal data security construction, unified management and control of important internal electronic documents and removable media carriers can be achieved, complete elimination of confidential information on important removable media or disks, and prevention of outbound control and leakage risks of sensitive information.
·Print and disc burning management
Monitor and audit host printing and disc burning behaviors based on policies to prevent printing and burning output results from being viewed and obtained without authorization.
·Safety audit management
Through the management and comprehensive audit of terminal behavior, centralized recording and auditing of terminal operation behavior and remote access behavior are finally realized, which facilitates statistical analysis of various event information and subsequent tracking and tracing.
·Remote operation and maintenance management
The administrator calls the desktop of the remote client to help client users solve corresponding problems and perform software installation, software debugging, system maintenance, printer installation, etc. Supports file sending, desktop sharing, screenshots, screen recording and playback, and supports text communication or audio conversations between remote desktop users and between remote desktop users and administrators.
2. Functions and services of each product
1. Management Control Center - Standard Single Server Edition:
Management Control Center - The standard single server version is the server program for Beixinyuan intranet security management and patch distribution access control system products. This program adopts a microservice architecture, supports the management of multiple product modules, and can flexibly configure the management scope. It comes with related program dependent components, comes with its own operation and maintenance management system, and supports Xinchuang operating system and components.
Supported functions are as follows:Terminal asset management, equipment security management, system security management, application security management, data security management, behavioral security management, network domain security management, auxiliary operation and maintenance strategy
The corresponding terminal points for the relevant configuration are:CPU 8 cores/memory 16-32G/hard disk capacity 1-2T can support 1-1000 points; CPU 8-16 cores/memory 64-128G/hard disk capacity 1-2T can support 1-5000 points.
The supporting systems are as follows:centos, Red Hat, Galaxy Kirin, and UOS.
Supported databases are as follows:Comes with mysql and supports Dameng, Shentong, and Jincang.
Supported middleware is as follows:With Tomcat, support Dongfangtong, Kingdee.
2.Intranet security enhanced version:
The intranet security enhanced version module is the intranet security management system EDPV8.1_The functional module of the client supports new functions such as screen recording screenshots, port inspection, green energy saving, and violation boundary inspection in addition to basic security management and patch management.
3. Security baseline:
The security baseline module is the functional module of the intranet security management system EDPV8.1_client. This module provides group policy, audit, advanced audit, system access, services, registry, browser, permission allocation, and object access permissions for Windows terminals. , extended baseline, baseline audit and repair of components; provides audit and repair templates with three security levels: light, medium, and severe; supports custom baseline templates; supports silent and manual repair methods.
All users
Product pricing
Product price = ordering interval quantity 1 * interval specification unit price 1 + ordering interval quantity 2 * interval specification unit price 2.
For example: the call rate is 0.3 yuan/minute for the part that does not exceed 3 minutes, and 0.2 yuan/minute for the part that exceeds 3 minutes; if the user calls for 8 minutes, the fee charged is 3*0.3+5*0.2=1.9 yuan.
Product price = order quantity * unit price of the range to which the quantity belongs.
For example: the call rate is 0.3 yuan/minute for no more than 3 minutes, and 0.2 yuan/minute if it exceeds 3 minutes; if the user calls for 2 minutes, the fee charged is 2*0.3=0.6 yuan; if the user calls for 8 minutes, the fee charged The cost is 8*0.2=1.6 yuan.
Product price = order quantity * unit price.
The product price is the price displayed on the page.
The technical service hotline opened by Beixinyuan responds to user emergencies 5*8 hours during working days; Track after-sales Beixinyuan products, telephone, E-MAIL technical support, telephone support for difficult problems; regular upgrades. If new situations arise, we will provide users with early warnings and solutions in a timely manner; National unified service hotline: 400-8188-110 Beijing: 010-62140485, 86, 87, ext. 7000; Beixinyuan Company provides users with email technical support services, EMAIL: support@vrv.com.cn;
By ordering this product you agree toGoods and Services Agreement》