Enterprise unified security management 器城and operation and maintenance audit sol刀雨ution
Industry pain points and needs
With the rapid development of informat黑紙ion technology, network information坐體 application is everywhere. The emer資雪gence of new modes of production a化麗nd life, such as e-commerce, e-govern生請ment, online banking and information su相快perhighway, has not only greatly im小聽proved our production efficiency,黃議 but also raised the impact on huma服分n social life to the level of produc這科tion relations and social superstructu慢木re, and human society has real們喝ly entered the information socie業多ty. In all kinds of network inf刀金ormation applications, the server has 慢紅played an extremely important rol雪妹e, how to manage and maintain the se到到rver, how to ensure the security of 喝湖the server has become the first problem木鐘 to be solved.
Facing the challenges of syste相男m and network security, IT operation an筆路d maintenance management and IT inte信長rnal control and external audit, mana動計gers need effective technical means 長購to carry out accurate management, 她舊retrospective audit, real-time mon學如itoring and alarm in accordance就通 with industry standards. How 雪紅to improve the system operation哥工 and maintenance management lev自化el, meet the requirements of rele一開vant standards, prevent hackers from草技 invading and malicious access, t答綠rack user behavior on the server,朋間 reduce operation and maintenance costs為多, and provide control and audit basis h樹熱ave become more and more difficu照店lt problems for these enterprises.



Industry demand
Under the current domestic network 鄉城conditions, each enterprise server and房腦 web server and other network equ聽輛ipment, generally adopt the centralize北為d hosting model of computer room. In pr要河actical applications, an equipmen廠影t room with dozens to hundreds o懂地f servers can be equipped with 快子only one or two network management pers到西onnel. This cannot meet the manage師道ment requirements of a large number of 都店servers in the equipment room.

Therefore, in the daily manage你子ment and maintenance of the equipment,拿錢 you can either log in to the o子道peration and management directly or se自做nd personnel to the equipment room to o光來perate the external display of司唱 the required equipment.

The existing network security produc吃少ts mostly focus on the network level從大 of security management. For example: i文船nternal and external network isolation,件地 network communication encrypti山快on, prevention of low-level ne玩睡twork attacks and so on. And d看房id not consider the actual daily wor東討k encountered in the application leve做但l or system management level of the pro年懂blem. Through our practical inve離作stigation, users are mainly conc鄉上erned about the following issues at 店雨the application level and system manage麗信ment level:

1. How to prevent information l習場eakage of enterprise core data;

2. How to supervise and audit the op體間eration of core assets.


Our programme

In response to the above two com睡個mon problems, Parady identified the fol站月lowing reasons from a large number of 村做project practices:

1. Loose management of user names and站開 passwords in the internal cor低得e system of the enterprise;

2. After a security incident occ區如urs, the source of the incident 銀這cannot be quickly and accurately loc你海ated, let alone prevented in t放用ime;

3. No operation records can be audit哥妹ed afterwards. Therefore, it is not是計 known how to patch the security h我司oles in the system;

4. Due to the lack of one-to-o新不ne identity authentication, natural 上煙persons cannot be located even if 一站the source of security inciden熱在ts is found;



According to the above phenomenon, in o門友rder to ensure the security of e醫那nterprise core information, Hangz自作hou Palladi Network Technology Co., Lt黃我d. independently developed the "Palladi路在 unified security management and comp笑錢rehensive audit system", the system mai但對nly includes authentication, acco紙煙unt, authorization, audit four cor微算e functions, using the system ca城喝n easily achieve the following 得看purposes:

1. Verify the account password of e資舞ach system operator on a one-to-on說還e basis. You can check the specific ope裡子rator by logging in to the accoun微身t.

2. In single sign-on mode, each syst日森em operator only needs to use his own 裡內user name and password to log i熱輛n, and then can directly use vario場對us background systems within his autho新知rity without re-entering the u玩火ser name and password of each backgrou開農nd system. This limits the background s知拿ystem's various user names and passwo友謝rds to the maximum extent;

3. Set permissions for each admi是間nistrator. The administrator can manag知的e the device only within the permitte電媽d range to avoid human errors.

4. Track and record the online stat人朋us, operation status and equipm制林ent running status of each opera冷拍tor, and any equipment changes are 唱拿under control.

Unified security management and oper朋還ational audit system based on informati金事on system to collect, record, all kinds友你 of security incident analysis u微厭ser operation behavior, position服這ing the ins and outs of the operator 暗內to reconstruct events process, 慢日until the full source and audit日信 log analysis orientation events 村那do not tamper with, there is no 笑匠denying the fact that basis and anal不光ysis tools to improve safety manage吧朋ment strategy.



Deployment way


Customer Benefits

Standardize operation and maintenan靜海ce behavior


Establish a unified security ma謝筆nagement and comprehensive audit platf還務orm, unified access, centralized auth女雨ority control, and realize centralize不視d and standardized management of op志離eration and maintenance operations.黑店 The platform can manage the access 錯分and maintenance of different systems討商 in a unified manner, including acco費空unt management, identity authentic志去ation and authorization. Based on us到姐er permissions, unified networ鐵暗k layer and application layer acc員和ess control can be implemented on the p森相latform to improve system security.校服 Reduce the working pressure of 農日the administrator, improve the workin市水g efficiency and ensure the smooth i唱對mplementation of the management 票地system.


Compliance requirements met



Meet the compliance audit requirements 劇她of the Ministry of Public Security技雨, such as the Basic Requiremen會朋ts for Network Security Level Protect了習ion; Provide audit reports of operat銀紅ion and maintenance management and 來雪original and accurate operation樂身 logs for the supervision departm小公ent; Help to improve the organizatio遠子n's IT internal control and security au放放dit system.


Reduce operation and maintenanc歌地e risks, and quickly locate faults an書員d track responsibilities
The technology of fortress host is ado又黑pted to avoid the direct connection自姐 of illegal terminals and insec一機ure terminals to core resources and下說 reduce the influence of Trojan hors土公es, commercial espionage and internal s多了ecurity threats on core resources.美黑 Standardized management of third-p站銀arty maintenance and system integrator開答 site construction to prevent exte器還rnal risks; When a safety acciden少區t occurs, responsibility identificatio數坐n and safety incident tracing can be c多術arried out quickly and accurately t近綠hrough playback of operation reco拿很rds.

Classic cases
  • 科大訊飛
  • 寶鋼集團
  • 德邦物流
  • 東風汽車(chē)
  • 華潤集團
  • 廣汽集團
  • 全友家居
  • 國際航空
  • 九陽集團
  • 海天集團
Copyright © 2019 All Rights Reserve站務d Designed
Hangzhou pldsec Network Technolog志雨y Co