Dongfangtong application security defense platform
The core technical concept of Dongfangtong Application Security Defense Platform TongASDP (hereinafter referred to as "TongASDP") is to detect and prevent computer attacks by using runtime detection technology to detect internal information of running software. Unlike other perimeter-based protection technologies, such as web application firewalls, which can only detect and block attacks by using network information, there is no context awareness. ASDP monitors its output
- Zero rule detection
Unlike other perimeter-based protection technologies, such as web application firewalls, which can only detect and block attacks by using network information, there is no context awareness. ASDP improves the security of software by monitoring its inputs and blocking techniques that could allow attacks, while protecting the runtime environment from unwanted changes and tampering. Therefore, a self-immune and adaptive system that allows Web applications to have security awareness and self-protection capabilities is needed to make up for the lack of border protection.
The technical concept of "self-immunity and self-adaptation" is to inject the protection program into the application like a vaccine, combine it with the running logic of the application, conduct security detection on user requests in the running state, and directly block malicious behaviors based on the model, in real time Describing the scene of the attack event, it can effectively defend against various application layer attacks (such as SQL injection, cross-site scripting (XSS), command injection, etc.); its unique real-time upgrade system can timely update the latest vulnerability defense measures into the application, helping Applications effectively protect against potential threats posed by zero-day vulnerabilities.
In an era where information is running wild, TongASDP is the last insurmountable barrier for application protection. It provides real-time self-defense and adaptive intelligent defense to promptly and effectively grasp security risks, realize event early warning, process processing, automation, intelligence, and clearly display Hacker attack path, trace the source, discover the real culprit, issue emergency response tasks to each attack target in a timely and accurate manner, with comprehensive coverage, automatic monitoring of information security risks, full data collection, and unified analysis to ensure that your company will not become the next security Victims made headlines.
All users
Product pricing
After-sales service time: 5X9 hours standard service time, that is, 9:00-18:00 Beijing time on working days, excluding Chinese public holidays. 7×24 hours standard service hours plus non-standard service hours; Non-standard service hours refer to 18:00 Beijing time on working days to 9:00 the next day; or 0:00-24:00 on legal holidays. Non-standard service hours are used to handle emergencies or to handle pre-planned service requests. In principle, non-emergency service requests must be booked in advance during standard service hours. After-sales service content: technical consultation/question answering, product installation services, performance tuning services, fault diagnosis and troubleshooting services, small version product upgrades and patch services Service hotline: 010-400-650-7088 Service email: support@tongtech.
By ordering this product you agree toGoods and Services Agreement》