Cloud Security: Xincang Cloud Host Security [DeepSecurity]
AsiaInfo Security Cabin is a one-stop cloud host security protection solution designed specifically for users' virtual and cloud environments. Xincang is designed based on the CWPP model, which meets the security needs of users for cloud host security protection, such as virus protection, access control, intrusion detection, intrusion prevention, virtual patching, etc. At the same time, it also meets the needs of users for cloud host operation and maintenance, such as integrity monitoring, log auditing, asset management, vulnerability risk management, detection and response, baseline inspection, host resource monitoring, etc. Xincang has achieved comprehensive protection for virtual hosts and virtual systems, helping users check the audit requirements for compliance of information systems, and building multi-level protection for the infrastructure of virtualization platforms.
Terminal Security: TrustOne's Next Generation Terminal Security
TrustOne's new generation of terminal security, based on 30 years of experience in terminal security, builds an "extreme, simple, and new form" terminal defense system for customers to cope with the "bloated, complex, and ineffective" management of massive terminal security.
Network and Communication Security: Information Security Network Threat Intrusion Prevention System [AISTPS]
In recent years, with the concept of "Internet plus" and "Industry 2.0" being put forward, the emergence and development of new technologies, new businesses and new models such as cloud computing, big data and the Internet of Things, especially the unique virtualization technology of cloud computing, the on-demand security, policy following and other characteristics of cloud services, new requirements have been put forward for intrusion prevention systems. Traditional IPS mainly identifies applications based on ports and protocols, and detects and protects against attacks based on the characteristics of the transport layer. The constantly changing business and the development of threats are driving new demands for intrusion defense systems.
The Network Threat Intrusion Prevention System (AISTPS) is used to protect against intrusions from internal or external networks into internal servers and clients. It is a security defense technology that can detect and defend against application layer attacks. By analyzing network traffic, detecting intrusions (including buffer overflow attacks, trojans, worms, etc.), and using certain response methods to suspend intrusion behavior in real time, enterprise information systems and network architecture are protected from infringement.
Identity Security: Xinban Fortress Machine [AISIFORT]
AsiaInfo Security Fortress is an operation and maintenance security audit product that adopts a 4A management model, providing account management, identity authentication, access control, and behavior audit functions. Realize automated operation and maintenance, fine-grained access control, and diversified operation and maintenance methods to solve problems such as account management confusion, identity account sharing, unclear authorization control, non-standard operation behavior, and inability to locate event responsibilities in operation and maintenance management, meeting the compliance requirements of level protection and other laws and regulations. The system is equipped with three layers of security protection policies to ensure its own security and further protect the security of core data assets.
Identity Security: Xinpan Zero Trust Access Control System [AISDP]
With the digital transformation of enterprises, the security system based on traditional network boundaries has been greatly impacted, introducing more uncontrollable security risks. At the same time, VPNs frequently expose major vulnerabilities, becoming important entry points for hacker attacks. Therefore, a method is needed that can both address the security vulnerabilities introduced by VPN and redefine the security boundaries in different network business scenarios. Based on SDP protection architecture, network elements in cyberspace are authenticated, and access boundaries are defined through identity to isolate business and services from insecure networks.
AsiaInfo Security Zero Trust Access Control System provides customers with fast and secure network access capabilities based on the zero trust concept, ensuring that users can safely access internal business resources from any location. The system adopts the principles of minimizing network exposure (network stealth) and checking every packet for network requests (SPA single packet authorization), supporting multiple network protocol carriers and bidirectional encryption mechanisms for national encryption algorithm traffic. Through terminal access baseline, MFA multi factor authentication, resource access authorization, continuous trust assessment, and threat traffic linkage disposal, we aim to create a clean and trustworthy network space for our customers, with trusted terminals, environments, identities, behaviors, and traffic.
Data Security: Information Data Desensitization System [AISDM]
With the increasing level of digitalization in social development, data security is facing greater challenges. Frequent incidents of data tampering and leakage pose significant security threats and economic losses to governments and enterprises. Therefore, it further prompts regulatory agencies to increase their supervision efforts and formulate increasingly comprehensive laws, regulations, and policies. Ensuring the security of sensitive data for organizations and individuals, in compliance with policy and regulatory requirements, has become an urgent issue that governments and businesses need to address. The AsiaInfo Security Data Desensing System can effectively help government enterprises to securely and reliably safeguard sensitive privacy data of organizations and individuals in both production and non production environments, and enhance the security of data usage.
The AISDM data anonymization system consists of three main subsystems: sensitive data discovery, static anonymization, and backend operation and maintenance dynamic anonymization. Based on multiple detection rules, it accurately discovers sensitive data and uses anonymization rules to protect the data security of the government and enterprises from the source. By using desensitization rules to transform sensitive information, reliable protection of sensitive privacy data is achieved, ensuring that users can safely use desensitized real datasets in development, testing, and other non production and outsourced development environments.
Situational Awareness: Information Navigation Security Management and Analysis Platform 【 MAXS 】
With the development of information technology, network security incidents in various industries such as government, finance, enterprises, healthcare, education, and operators are constantly emerging. Traditional security detection methods are only based on built-in static policy libraries for matching, lacking correlation analysis of multidimensional data and unable to control the global information security situation. The response and disposal of security alerts rely on manual labor. Therefore, it is necessary to establish a unified security management platform to achieve data correlation analysis, comprehensive situation presentation, and equipment linkage response.
The AsiaInfo Security Management and Analysis Platform adopts an advanced big data architecture in the industry. By collecting all IT infrastructure data within the enterprise, based on the built-in technology engine, it uses methods such as rule modeling, statistical analysis, correlation analysis, and threat intelligence collision to perform correlation analysis on all security data within the enterprise. Realize the discovery and alerting of network attack behaviors, security anomalies, and unknown threats. On this basis, establish monitoring centers, analysis centers, response centers, asset centers, intelligence centers, and other capability centers to achieve comprehensive analysis and security situational awareness.
Industrial Safety: Xinyuan Industrial Operation and Maintenance Safety Management and Audit System 【 ICOPS 】
With the development of information technology, network security incidents in various industries such as government, finance, enterprises, healthcare, education, and operators are constantly emerging. Traditional security detection methods are only based on built-in static policy libraries for matching, lacking correlation analysis of multidimensional data and unable to control the global information security situation. The response and disposal of security alerts rely on manual labor. Therefore, it is necessary to establish a unified security management platform to achieve data correlation analysis, comprehensive situation presentation, and equipment linkage response.
The AsiaInfo Security Management and Analysis Platform adopts an advanced big data architecture in the industry. By collecting all IT infrastructure data within the enterprise, based on the built-in technology engine, it uses methods such as rule modeling, statistical analysis, correlation analysis, and threat intelligence collision to perform correlation analysis on all security data within the enterprise. Realize the discovery and alerting of network attack behaviors, security anomalies, and unknown threats. On this basis, establish monitoring centers, analysis centers, response centers, asset centers, intelligence centers, and other capability centers to achieve comprehensive analysis and security situational awareness.