Deeply convinced of the product
Deep Trust's two major products: Smart Security and Trustworthy Cloud
Intelligent security: network security, endpoint security, detection response and situational awareness, zero trust security, cloud security, data security, application and development security.
Trustworthy Cloud: Cloud Infrastructure, Cloud Services, Desktop Cloud, Software Defined Storage
Deeply convinced of the next-generation firewall AF
Deeply convinced that the next-generation firewall AF focuses on network boundary security effects, by applying rich security innovation defense technologies and simple and easy-to-use product design concepts, it not only enhances the security detection and prevention capabilities of network boundaries, but also realizes the visualization display and rapid disposal of network security risks, making organizational network boundary security construction more effective and simpler.
Comprehensive intrusion prevention
Integrating three intelligent security detection engines, IPS generalization detection engine, SAVE security intelligence engine, and WISE semantic analysis engine, to ensure security effectiveness. In 2021, the security effectiveness achieved the highest score of 99.7% in the CyberRatings AAA enterprise firewall evaluation, with a vulnerability attack interception rate of 99.7%; The interception rate of escape attacks is 100%.
Rich and convenient response methods
Rich response methods, including one click virus scanning, file isolation, terminal isolation, real-time synchronized interception of malicious IP/domain/file MD5 devices across the entire network, etc.
Deep linkage and fast response
Linking XDR and SIP platforms, the entire chain of attack propagation is visible, and the detection granularity and traceability are fine down to the process level;
Link with EDR for one click scanning and killing, one click terminal isolation, and other quick disposal methods;
Leading domestic linkage with ZTA zero trust platform, dynamic business intelligent access control;
Linking SASE platform, dynamically expanding data leakage prevention, remote office security access and other scenarios, precise response, and fully closed-loop threat event process.
Innovative proactive defense
Innovative cloud honeypot active defense technology combines local honeypots with cloud honeypot virtual environments to capture and simulate business scenarios with more realistic and complete interactions, effectively reducing the probability of detecting disguised services. Cloud honeypots avoid the risk of local business explosion, quickly trace and collect evidence, and accurately outline the attacker's profile.
Accurately identify compromised hosts
The local rule base of the botnet exceeds 1.6 million, and various methods such as rule engines, behavior analysis engines, cloud big data analysis engines, and cloud active detection engines are used to detect and protect against botnets, mining Trojans, ransomware, etc. in a timely, comprehensive, and effective manner.
Enrich enterprise level threat intelligence
More than 400000 security devices are produced and shared online in real-time worldwide.
Deeply convinced of the behavior management AC across the entire network
Network integration and control, visible and controllable across the entire network. More diverse certifications and more precise control. More comprehensive traceability.
Adapt to multi scenario identity real name access, standardize employee office behavior to reduce security risks, meet log retention compliance and provide evidence for violations tracing
Hyper converged infrastructure HCI
Hyper converged software is based on software capabilities such as distributed storage, computing virtualization, network virtualization, and secure virtualization. By deploying general-purpose servers and layer 2/3 switches, cloud infrastructure can be built through software defined methods
The hyper converged software consists of computation virtualization (aSV), storage virtualization (aSAN), network virtualization (aNET), and security virtualization (aSEC). It is built on the hyper converged platform as a cloud management platform to support the management and operation of multiple HCI clusters, providing advanced operation and maintenance functions such as reliable center, security center, monitoring center, and third-party resource management. It has the characteristics of stability, reliability, excellent performance, security, effectiveness, and intelligent convenience. At the same time, the X86 and ARM underlying architectures that are native to hyper converged software further provide the ability to continuously evolve towards independent innovation, and can provide advanced, software defined infrastructure solutions for various systems, platforms, and data center construction in digital transformation.
Core advantages
Stable and reliable: The Shenxin hyper converged platform has high stability, leading in hot upgrade and hot migration capabilities domestically. Currently, it has ensured stable operation of early customers' business for over 40000 hours. At the same time, we firmly believe that hyper converged software can help customers shield a large number of hardware failure risks through software defined reliability, and ensure business continuity through a comprehensive disaster recovery plan.
Excellent performance: The domestic hyper fusion field has excellent performance. The hyper fusion software not only provides a storage capacity of 3 nodes with 100W IOPS through its self-developed storage engine, but also matches high-end storage performance in database hosting scenarios, exceeding competitors by more than 30%. Moreover, under the Xinchuang architecture, Shenxin still maintains a leading performance.
Safe and effective: The industry's first cloud based security center enables hyper converged software to have built-in security capabilities including host security protection and network security protection. Users do not need to manually deploy security components, and can provide real-time protection for all virtual machines on the cloud anytime and anywhere. At the same time, it can be linked with hyper converged capabilities to achieve data fallback protection, truly achieving online security.
Intelligent and convenient: The hyper converged software provides intelligent and convenient capabilities throughout the entire lifecycle, not only from business migration to hyper converged, business deployment configuration, monitoring, troubleshooting, etc., but also exclusively launched the cloud intelligent brain, which can accurately predict potential risks, provide intelligent operation and maintenance suggestions, and can link online and offline closed-loop risks, thereby reducing customer operation and maintenance burden and improving management efficiency.
Desktop virtualization VDI
The Deep Trust Desktop Virtualization Solution uses virtualization technology to migrate all desktops, applications, and data that were originally stored locally on traditional PCs to a data center for unified hosting and management. Desktop cloud all-in-one machines are deployed in the data center, and the CPU, internal storage, and storage resources of the server are virtualized into desktop virtual machines according to different user needs using hyper fusion technology. The operating system interface is transmitted to the user's access device in the form of images through a desktop delivery protocol, providing users with the same desktop environment as PC usage.
Due to the unified storage of virtual desktop data on backend servers, the following effects can be achieved: 1. Zero data storage on the terminal, providing a higher level of data security. 2. The desktop runs uniformly on the backend and can be maintained through a unified interface, further improving management and maintenance efficiency. 3. As long as the network is accessible, users can log in to the cloud desktop anytime and anywhere using various terminal devices for office work.
Core advantages
High cost-effectiveness: providing integrated solutions (thin terminal, user authorization, desktop cloud all-in-one) to reduce purchasing costs; Based on the hybrid disk combination of SSD and mechanical hard drive, high IO performance can be achieved at a lower price.
Good usability: Pre installed with various desktop cloud software such as VMS, VS, VDC, etc., ready to use upon startup; Guided deployment, complete VDI environment setup (including cluster, storage configuration, etc.) in 30 minutes.
Good scalability: Horizontal stacking scalability, simply purchase a new all-in-one machine and join the cluster to achieve scalability; Cluster hosts automatically load balance to achieve linear performance scaling.
High stability: Based on cluster architecture, after server failure, normal hosts will be automatically selected to restart virtual machines, and business can continue; Virtual storage adopts a 2-copy mechanism, which ensures uninterrupted business in the event of a disk or host failure.
Unified Endpoint Security Management System (aES)
Shenxin aES is a unified endpoint security product that provides intelligent protection for PC, server/virtual machine, and container security. Through static file AI, dynamic behavior AI, and behavior correlation analysis capabilities, it effectively detects and protects against ransomware attacks, vulnerability exploitation attacks, and various intrusion threats. At the same time, through the network side true linkage capability, it helps users to truly closed-loop handle host incidents discovered on the network side, and build an effective endpoint security protection system.
Core advantages
Intelligent protection: Good security protection effect: AI automatic protection technology can automatically protect against various types of attacks such as ransomware, phishing, and 0DAY, helping users quickly block security threats and reduce losses caused by security incidents.
True linkage: Product linkage and easy closed-loop: Strong alliance between security products to achieve a security effect of 1+1>2, solve problems such as difficult user threat localization, incomplete disposal, and low closed-loop efficiency, and achieve effective closed-loop of security incidents.
Full scenario: Strong applicability in different scenarios: China is the first to implement the "one end, one center" approach, PC、 The end-to-end integration management of servers, containers, and information technology environments supports SAAS based lightweight delivery, greatly enhancing the security visibility and management convenience of endpoints across the entire network.