Function Introduction

antivirus

Through the comprehensive identification of various malicious threats using public cloud killing engines and private cloud killing engines, combined with the Kunpeng engine based on big data technology, QEX script killing engine, and the use of 360's self-developed machine learning engine QVM, multiple algorithm models are built in and trained on massive samples to achieve automatic evolution, achieving precise killing of various Trojan viruses and new threats.

Provide proactive defense capabilities, including system protection, browser protection, portal protection, and internet protection, to achieve active defense interception in scenarios such as file access, process creation, registry read/write, and device loading.


Vulnerability and Patch Management

Detect and fix vulnerabilities in operating systems, Office, and specific third-party software.


Terminal control

Desktop reinforcement: By controlling the password strength, screensaver, and desktop wallpaper policies of the terminal, unified management of the user's desktop is achieved.

Violation of External Connection Control: Detect whether internal terminals are illegally connecting to the external network or designated networks, and can execute network disconnection measures for violating terminals.

Network control: Control the terminal network from dimensions such as IP, domain name, and port to prevent access attacks. Administrators can also configure the DNS address of the terminal uniformly to prevent attacks through specified DNS.

Remote control: Operations personnel can obtain operational permissions for remote terminals through remote connection, improving the efficiency of terminal fault handling.


Asset Management

Statistics of terminal software and hardware assets, timely identification of terminal asset risks


Technical advantages

Comprehensive and precise protection capability

The protection rules are extracted from 1.5 million information security incidents submitted by over 30000 white hat individuals nationwide, all of which have been manually verified. The protection rules are comprehensive and accurate. Multiple protection rules, complementary cross validation, improve accuracy, equipped with 360 self-developed rules+AI machine learning+active defense+security expert operation.

Advantages of 360 Big Data Intelligence

Utilize 360's massive big data, threat intelligence, and vulnerability knowledge base to conduct collaborative analysis with the company's security brain and vulnerability cloud. And the vulnerability protection rules extracted by tens of thousands of white hat armies provide real-time attack protection. At the same time, if the Panyun system discovers that multiple websites are attacked by the same IP, it will trigger a collaborative linkage mechanism to analyze and intercept malicious IPs across the entire network based on the big data intelligent analysis system.

Being the first to support national encryption SSL certificates

Advance support for national security certificates, WoTong certificate issuing agencies support the issuance of national security certificates, and the web field has achieved a closed loop of national security.

Integrated security protection platform

Integrating DDoS, CC protection, and web protection to enhance a secure and efficient unified management web protection platform. Complete website access in minutes, with zero deployment and maintenance, no need for manual upgrades, and immediately have a web integrated protection solution.

Integrating source station availability monitoring

Complete the integration of Yuntan availability monitoring, empower Panyun with Yuntan's availability monitoring capabilities, conduct comprehensive source site availability monitoring, real-time understand business operation status, and efficiently ensure smooth business operation.


Product Features

An integrated security protection platform that is safe, efficient, and intelligent


Deployment plan

We need to add website information to the website cloud protection system and modify the DNS resolution of the domain name before we can redirect website traffic. After filtering attack requests, the website cloud protection system forwards normal business requests to the source site to achieve web protection.


Shenzhen Baifujia Software Co., Ltd
1407 Baoshan Times Building, Longhua Avenue, Longhua District, Shenzhen
400-777-9560

WeChat official account

WeChat Consultation

版权所有   © 2025   深圳市百富嘉软件有限公司   粤ICP备09206173号   技术支持:人网网络