• [Yun Jian] Three elements of mobile phones for real -name authentication
    The real -name authentication of the three networks, entering the name, ID number, and mobile phone number to verify whether the three element information is consistent and return the verification results. Three major operators, authoritative verification. [Yun Jian] Introduction to the real -name authentication product of the third element of the mobile phone: [Yun Jian] The three -facing real -name authentication of the mobile phone, the real -name authentication of the three networks and one mobile phone number, enter the name, ID number, mobile phone number, and verify whether the three element information is consistent. result. Three major operators, authoritative verification. Product characteristics: 1
    Check now
  • Yun'an Baoyun Fortress Machine_Cyun Box Software License (Gao Caixin Version)
    Cloud boxes are cloudbound machines that support multi -terminal operation and maintenance of PC and mobile phones. The main functions include: cloud asset management, unified certification management of accounts, authority management, application management, operation and maintenance audit and other functions. Practice is opaque, difficult to control and control. License purchase process: 1. According to the situation of your unit, choose the appropriate maximum asset (ECS host) and maximum concurrent number (activity connection
    Check now
  • Business security public opinion monitoring
    Regularly inspect the contents of the website, and report on the leakage of various account passwords, database leaks, business system sensitive information leakage, gaming, pornography, malicious advertisements and other content, and make suggestions for rectification. Knowing that Chuangyu's business safety public opinion monitoring service provides customers with timely and effective loophole response reports, real -time monitoring and verification of security incidents related to customer network assets, security loopholes, timely report customers and provide corresponding processing and provide corresponding treatment
    Check now
  • Jida Zhengyuan Cloud Code Service Platform
    Provide a unified password service for the service system of Yunnen's business system through confidential reviews. Jizhengyuan Cloud Code Service Platform is based on commercial passwords and provides password security services for cloud business systems through a unified password service interface, including key management services and password calculations. Services, digital certificate services, identity authentication services, data signing services, etc. To solve the problem of compliance, correctness, and effectiveness of the use of commercial passwords on the cloud business system, successfully pass the secret
    Check now
  • IEGUARD web page tampering security service
    A real -time detection and recovery of static web pages and scripts can also protect the dynamic content in the database from attacking and tampering from web, completely solve the problem of web pages for anti -tampering, and monitor the status of the module and web server use. Realize the monitoring and protection of the IEGUARD webpage anti -improving security system adopt advanced web server core embedded technology to embed the tampering detection module and application protection module in
    Check now
  • Safety penetration test service
    Perform artificial safety penetration tests for websites, APPs, applets and other applications. Detect code vulnerabilities and business security vulnerabilities, and provide a repair plan to repair the enterprise. This is a safe penetration test service for companies such as websites, APPs, applets, etc. The entire service process is as follows: 1. Enterprises provide testing needs. 2. Collect materials: system account, test environment, business process. 3. First, analyze the system, design
    Check now
  • Waiting for the preparation
    In order to help enterprise users quickly meet the requirements of equal preparations, cooperate with local cooperation evaluation agencies, safety consulting and cooperation manufacturers with one -stop and other guarantee evaluations, and complete attack protection, data audit, encryption, security management, to help you quickly quickly Through equal preparations 1) Program consultation: Provide customers with product consulting services and selection recommendations. 2) System leveling: According to the importance of the customer's information system and suffer
    Check now
  • Geer Zero trust security certification statement
    This product integrates zero trust and SDP concept with the PKI password technology. Based on the traditional PKI strong certification, a combined multi -factor authentication mechanism is added. Combined with dynamic context environmental detection, it can provide users with consistency on different access channels. Dynamic fine -grained access to product highlight zero trust and SDP: centered on identity, support dynamic fine particle size access control and diversified access methods to enable application
    Check now
  • Safety equal guarantee 2.0 assist in evaluation services
    Dongga Technology strictly follows the requirements of equal protection 2.0 to provide customers with a preservation life cycle solution with the analysis of graded filing, equal guarantee, safety rectification implementation, assistance level evaluation, and safe operation and maintenance to ensure the successful completion of the project Construction and operation. According to the information system risk assessment situation and equivalent gap, combined with the actual needs and construction goals of the customer, based on the concept of "compliance protection, infinite value",
    Check now
  • Level Protection Evaluation
    As the first in Shandong Province, Xinchao Information is the first in the country's certification of the level protection evaluation agency. It will provide professional, independent, and objective hierarchical protection secondary and third -level evaluation for various types of organizations in various industries to provide the organization's informatization construction and digital transformation of digital transformation. Protection. Level protection is the requirements of national network security basic compliance, and the "Cyber ​​Security Law of the People's Republic of China" determines the legal status of hierarchical protection. Level protection evaluation is level
    Check now
Total number: 404