Anheng Core Products

Cloud security, big data security, Internet of Things security, smart city security, industrial control system security and industrial Internet security


Cloud Web Application Firewall WAF (Xuanwu Shield Cloud Protection)

The cloud web application firewall accurately covers various types of web application attacks, identifies malicious requests for customers, defends against unknown threats, and achieves minute level access to prevent intrusion, scanning, attack, data leakage, CC and other attack protections, which are essential for protection


Anhengyun Xuanwu Shield Cloud Protection Service adopts a zero deployment cloud protection solution, and users do not need to deploy any security devices. They only need to map DNS to Anhengyun Web Application Firewall (Xuanwu Shield) CNAME alias address or resolve website NS to Anhengyun Web Application Firewall (Xuanwu Shield) DNS server to enable protection. It has DDoS cleaning and cloud WAF functions, which can clean up SYN flood, UDP flood, TCP flood, CC and other types of DDoS attack clouds initiated by hackers, and prevent security risks such as SQL injection, XSS, Webshell upload, and web component vulnerabilities; After the event, big data analysis is used to form visual reports and statistical analysis reports, and data analysis, viewing and configuration functions are provided through mobile APP cloud management services and WeChat official account.


PRODUCT FUNCTION

Industrial Internet security situational awareness platform

Accurate monitoring, intelligent operation, multi-dimensional visual data analysis, and overall control of industrial Internet security situation


Product advantages

Based on the continuous accumulation of Anheng Information's ability to analyze industrial network environment security, the industrial security analysis process has been modeled and equipped with AI industrial behavior analysis profiling capabilities. It can identify various network attack behaviors and industrial business abnormal situations, and provide visualized security event analysis based on attack chains.

1. Rule model

Based on the application scenarios of security analysis, filter out security events from log data, trigger alarms, or conduct subsequent advanced security analysis;

2. Statistical Model

By identifying important statistical features from security incidents and filtering through thresholds to identify abnormal indicators, malicious behaviors such as frequent brute force cracking attempts can be detected;

3. AI model

Based on historical data, the AI engine continuously builds and updates baseline information, adaptively detects anomalies and deviations, and discovers attack sources and methods that you have never imagined before;

4. Association model

Cross multiple device sources and data types, detect behavior patterns from multiple security events, discover hidden advanced threats and security risks, and trigger serious security alerts;

5. Intelligence Model

Utilize threat intelligence to enhance network security threat detection and emergency response capabilities, support filtering security logs through known clues, and conduct threat analysis such as identifying malicious IP addresses, domains, and files.


IoT Security Perception and Management Platform

New generation IoT security protection system

The IoT security perception and management platform is based on technologies such as big data analysis, machine learning, and threat modeling. It perceives the security status of the IoT from multiple dimensions including endpoint security, boundary security, communication security, and platform security, including IoT asset status, vulnerability status, attack threats, and illegal access


Product Features


One stop security compliance solution

This solution is mainly aimed at the pain points and difficulties faced by small and medium-sized customers in the construction of equal protection. Through the Anheng Cloud Tianchi equal protection all-in-one machine, more than ten security capabilities are provided to users in one stop, and combined with the characteristic equal protection self-assessment function, it helps users quickly complete the equal protection 2.0 security construction.


scheme design

One center: Through the unified security management platform built into security all-in-one machines such as Anheng Cloud Tianchi, users are provided with management functions such as unified activation, management, monitoring, and operation of security products. At the same time, the built-in self evaluation function for cybersecurity can help users discover the gap between their current network and cybersecurity compliance, providing reasonable reference suggestions for security reinforcement construction.

Triple protection: At the same time, Anheng Cloud Tianchi and other security all-in-one machines use virtualization technology to aggregate security product capabilities into a flexible security resource pool within a hardware device. The security protection capabilities within the security resource pool consist of a business security monitoring system, a business security defense system, and a business audit system, covering the entire lifecycle of security capabilities and working together to form a complete security event response loop.

Agile deployment: Compared to traditional hardware stacking solutions, all-in-one machines can achieve agile delivery and rapid deployment, simplifying later operation and maintenance management work.


Mingyu ® Operation and Maintenance Audit and Risk Control System (Fortress Machine)

A leading fortress machine brand manufacturer in both the Asia Pacific and China regions (including Hong Kong, Macau, and Taiwan), with powerful security measures in place to intercept illegal access and malicious attacks for users


Operation and Maintenance Audit and Risk Control System

Mingyu Operation and Maintenance Audit and Risk Control System (referred to as Fortress or Springboard) is a unified security management solution provided by Anheng Information, based on years of operation and maintenance security management theory and practical operation and maintenance experience, combined with various laws and regulations (such as level protection, graded protection, banking regulatory, securities regulatory, PCI, enterprise internal control management, SOX Symbian, ISO27001, etc.) to meet the requirements of operation and maintenance management, and providing 4A (authentication, account, authorization, audit).


Advantages of the plan


MSS Security Managed Operations Service

Provide systematic and normalized security hosting services, assist in building a 7 * 24-hour, all-round security operation system,

Realize a closed loop of security risks from discovery to response and disposal, and continuously improve the level of network security


Mingyu ® Firewall (Next Generation Firewall)

Intelligent security gateway products, integrated intelligent security protection, help users prepare for security precautions in advance, and quickly detect and respond to attacks.


Advantages of the plan

Integrated security protection: integrating traditional firewalls, antivirus, intrusion prevention, content filtering, URL filtering, file filtering, web protection, SSL decryption, weak password protection, single packet protection, and other integrated security protection systems.

Asset discovery: supports scanning, identification, and sorting of internal network assets, vulnerabilities, and weak passwords, actively identifies asset information, real-time understanding of changes in software and hardware assets in the network, and precise grasp of all asset information and vulnerabilities.

Asset management: User based permission control, asset based network deep analysis, with a powerful asset fingerprint library, to quickly and deeply analyze user asset information.

Intrusion prevention: With a rich IPS feature rule library, it can detect and defend against attacks on various protocols and applications, effectively defending against worms, backdoors, Trojans, spyware, web attacks, denial of service attacks, and other attacks.

Virus Protection: With a massive database of virus features and advanced antivirus engines, it can accurately identify and remove popular Trojans and stubborn viruses.

Strategy analysis: Supports one click analysis of current security policy configuration, enabling sustainability assessment and corresponding defense when business and network environments change.


Shenzhen Baifujia Software Co., Ltd
1407 Baoshan Times Building, Longhua Avenue, Longhua District, Shenzhen
400-777-9560

WeChat official account

WeChat Consultation

版权所有   © 2025   深圳市百富嘉软件有限公司   粤ICP备09206173号   技术支持:人网网络