Huorong Terminal Security Management System V2.0 (Enterprise Edition)
The 2.0 version not only inherits the ultimate professional product quality and core technology of the 1.0 version, but also adds more protection functions for the vulnerabilities of the enterprise's internal and external networks, expands the scope and methods of enterprise terminal management, improves product compatibility and usability, and ultimately achieves a more intuitive visualization of threats, making management lightweight and fully achieving the goal of protecting the enterprise's network property and information security.
Terminal control article: Threats can be encountered, enemy situation must be identified first
Terminal security dataization, visually presenting threat information.
The "Enterprise Edition" presents various threat information intercepted and processed at the terminal in the "Control Center", making it convenient for administrators to intuitively understand the security status of the enterprise and formulate timely and appropriate security policies based on the displayed information.
Multi level center
Support multi center management, solve cross departmental and cross regional management challenges, and systematically incorporate enterprise networks into strict protection to ensure security without blind spots.
Customization Strategy
Free grouping management of terminals, customizing and issuing strategies such as virus scanning, vulnerability repair, and asset management, and supporting operations such as adding, deleting, modifying, and querying policies.
Mobile storage media management
It can enable the use and disabling of USB devices, portable devices, USB wireless networks, USB wired network cards, printers, optical drives, and Bluetooth, and support read-only operations on USB devices, portable devices, and optical drives.
Hardware asset management
Record and update changes in terminal assets, including hardware changes, additions, losses, etc., to assist operations and maintenance personnel in accurately and effectively managing and recording hardware assets, facilitating financial auditing and other work.
patch management
Provide efficient and convenient centralized vulnerability management, allowing for real-time monitoring of all terminal vulnerability fixes, including high-risk vulnerabilities, functional vulnerabilities, and overlooked vulnerabilities, and issuing repair tasks.
Log report management
Support terminal virus scanning, virus defense, system defense, network defense, access control, vulnerability repair, terminal management, system management log recording and statistics, and can display and export the generated log reports.
Disaster recovery backup
By setting up a backup center, we can avoid losses caused by unexpected situations such as downtime, power outages, software and hardware failures. The backup center can automatically switch and take over the main center, ensuring that terminal security is not affected.
account management
Through the "Super Administrator" account, add and manage other administrators to oversee different modules of the control center, reducing and optimizing the workload of management personnel.
API interface
By calling pre-defined API interfaces, open linkage with other products (such as admission systems), it is convenient to query the information of terminals deploying Huorong products, including terminal address, terminal name, terminal version, grouping strategy, terminal online status, virus database version, etc. With the improvement of the product, more linkage information and functions will gradually be opened up in the future.
Terminal Protection: Technology Driven, Deep Protection
Independent research and development to avoid constraints
Unique "universal shell shedding" and "dynamic behavior killing" technologies, based on the "virtual sandbox" environment, accurately judge through behavior characteristics, with high killing and low false alarms.
Continuous iteration to counter unknown threats
Local antivirus, not affected by network disconnection
Multi level defense system
Build sufficient protection depth
Combining single step defense with multi-step malicious monitoring, monitoring hundreds of defense points (including firewalls), effectively preventing various malicious programs from attacking and tampering with the system, and protecting terminal vulnerabilities.
Multi level active defense system
01. Flexible network management: Equipped with a complete firewall, it can comprehensively prevent network connections of terminals from three dimensions: "protocol", "source", and "application".
02. Botnet protection rules: By scanning network communication data, identifying malicious communication between hosts and hackers through Botnet, RAT, and backdoor programs, and intercepting them without human intervention.
03. Vulnerability attack protection technology: For serious worm level vulnerabilities and web service vulnerabilities, create "virtual patches" in advance to protect the operating system or program with vulnerabilities from hacker attacks.
04. RDP weak password penetration protection: Through secondary verification and IP whitelist settings, it prevents the risk of terminal password leakage and attacks. Especially effective in defending against ransomware that often uses weak RDP passwords for intrusion.
05. Application reinforcement and protection technology: Monitor the behavior of protected processes to prevent hackers from exploiting vulnerabilities or zero day vulnerabilities in the application to launch attacks on the host.
06. Comprehensive system reinforcement: System reinforcement includes 86 protection points for the system, including file protection, registry protection, and sensitive action protection.
Mature and stable product performance
Strict professional ethics