Unified security management and o好線peration and maintenance audit 北弟solution for operators
Industry pain points and needs

With the continuous expansion of tel們黃ecom operators' information ne廠樹twork scale, network internal control s道文ecurity management has increasingly 內高become the focus of telecom operator雪很s' information construction. It討人 is the basic guarantee of the interna請日l information application manag房又ement system of telecom operators店坐. Only when the computer networ答土k is unblocked and network security i音讀s ensured, can telecom operators u可雜se the advanced information management 兒刀system to improve internal managemen票明t, so as to improve the efficie間土ncy, management level and competit們費iveness of film operators. Howe術空ver, with the complexity of inte聽畫rnal information systems and personnel 呢會operating these systems, how to rea匠遠lize the safe access of operators個報' maintenance personnel to the maintena錯視nce network and internal network, and h議林ow to better ensure the maintenance 小內personnel's authority management, o音吧peration process monitoring and behavio中要r audit of network internal servers ha草書ve become the problems that maj資裡or operators have to face.

Industry demand
Combined with the current security sit醫樂uation faced by the informatiza上他tion development of colleges an費時d universities, there are mainly the美音 following risks in operation and mai從你ntenance management:
1. Management status: at present木業, the business support network 話訊and value-added service network are i做朋mportant supports for the business 公黃operation of operators. The operation一還 and maintenance management person算什nel shall conduct daily inspection 放嗎on the comprehensive settlement sy文道stem, billing and accounting syst黃光em, business analysis system, cus生大tomer relationship management sys但那tem and partner relationship management城門 system in the business support ne慢對twork; The systems of the value-adde人了d service network include intelligen短慢t network system, SMS system and M照習MS system for operation and maintenance音飛 management. There are many types人近 of systems and complex business logic短我. The operation and maintenance 兒做personnel should be responsible f山就or the operation and maintenance ma厭弟nagement of multiple business sy服小stems at the same time. There ar北公e problems of multi-point login, de對人centralized management and inaccurate i黑去dentification and authorization c都靜ontrol;
2. Password management risk: in th我員e key core business of the who男都le information system, the pas雨土sword management and authority 畫多management of the application sy自廠stem and database are complex, 機匠and some compliance requirements微子 require regular modification of the厭志 equipment management password, which 離務brings unimaginable workload to the ope友兒ration and maintenance personnel;
3. Permission allocation: the complexit時東y of core business system application d上朋etermines that multiple roles (身市system / database / security / audit 又草administrator / maintenance agent, et長話c.) share accounts and cross manage山愛. How to control personnel permissi很會ons according to the principle of m身們inimum permission allocation;
4. Business terminal risk: the知行 MIS configuration and misoperation of 可校operation and maintenance personnel may朋跳 directly affect the business continu能區ity, which is not effectively 麗話and reasonably avoided, and it is d通到ifficult to prove and trace afterwa從畫rds.
Our programme


How to effectively and standard子短ize the management of operators and ope妹雨ration behavior is the core of 商吧data center operation and mainten現體ance management. Palladium's unif兵你ied security management and comprehen民友sive audit system solution adopts t拿樹he management idea of "preventio議事n in advance, control in process a低新nd post audit". From the perspecti會放ve of how to reduce operational ris知很k, take people, operation and 制到technology as the management core.

Through the construction of Pall年是adium unified safety managemen術南t and comprehensive audit syst兒玩em, the following effects are ach冷飛ieved:

one   Provide users 費校with unified access and platform for o靜刀peration and maintenance;

two   Realize the centra你姐lized control and management of account公會 number, authentication, author喝學ization and audit of business suppo睡船rt system, DCN network operation ma兵現nagement system, operating system, d雪如atabase, network equipment and other IT海紙 resources;

three   Realize centr理來alized and role-based master-slave a媽購ccount management, and realize fine-g動電rained permission allocation and m一做anagement of role attribute leve兒費l;

four   Realize centrali近說zed identity authentication and a匠黃ccess portal;

five   Realize centralized我謝 access authorization, access control 雪鐘based on centralized control secur金也ity policy and role authorization mana草她gement;

six   Realize centraliz信厭ed security audit management, col不司lect and record users' use of key and道哥 important resources of business su間商pport system;

seven   Meet the requiremen雜視ts of compliance audit and operati畫電on and maintenance management.


Deployment mode


Program advantages
Mature and stable

More than ten years of market ver吃看ification and technology accumulation,如個 and a large number of successful cases煙樹 have been deployed in complex appl很用ication production environment,那從 especially many operators and fi書做nancial cases;  

The equipment is easy to maintain and 家秒manage. It has obvious advantages 數跳in the case of multi machine depl體化oyment. It has participated in 員短the deployment of large projects wi生放th 30 equipment deployment, 14 equipm農術ent for cluster management, 2000 c討友oncurrent users and 10000 asset author人樹ization management;

There are many industry cases o開吃f operators: China Mobile Group Zhejia民樹ng Co., Ltd., China United Communic年男ations Co., Ltd. Zhejiang bran技讀ch, China Telecom Co., Ltd. Shangh鐵美ai branch and China Telecom Co南通., Ltd. Anhui Branch.

Safe and reliable

At the same time, two sets of unifie西和d operation and maintenance platf會你orms with independent applicat動黃ions and complete functions are provide這微d. The device HA can achieve re冷西al-time synchronization of configura票頻tion and audit log;

Strong adaptability to network environ理什ment, realize green deployment通一, do not change the original network to筆知pology, support cluster deployment and 土看cross network segment deployment;

The system development and update遠新 shall follow the safety software deve地空lopment life cycle process to r紙討ealize version management, and each 國木iterative upgrade shall ensure熱件 that the best practices are met.

modern techniques

Support local authentication, ad domai離紙n authentication, radius authe下間ntication, fingerprint authentica線年tion, wechat authentication, SM喝拿S authentication, etc., with the most c得請omplete identity authentication m嗎低ethods in the industry;

The system login strategy of users是個 can be set, including limiting login 通訊IP, login time period, port, accoun但可t, etc., to ensure that new users c我湖an access the background resourc這爸es they have permissions and re會裡alize controllable operation and m雪去aintenance;

Support the alarm and blocking of hi區去gh-risk commands, and effectively 綠算control the risks caused by misoperat樹一ion and high-risk operation in ope嗎冷ration and maintenance;

Unified management of in band and out在喝 of band operation and maintenance, t村湖he only mainstream KVM over IP produc會話ts in the industry that simultan你農eously support Avocent, Raritan, a愛個ten, etc;

The original database operation and m員畫aintenance audit platform covers mai美計nstream commercial database enter熱店prise applications and operation and些銀 maintenance operations.


Customer Benefits


1. Help customers meet the compliance新話 requirements of network security l外資evel protection, network security law, 風妹ISO27001, SOX act, etc;

2. Realize centralized identity auth信不entication and access portal, re場草alize centralized access author司愛ization, access control and role aut是森horization management based on central答白ized control security policy, 花水and ensure that various business delive他美ry systems in the network center pro熱數vide 7x24 hours of uninterrupted o鐵海peration and maintenance;

3. Realize core data assets, intranet國工 core network equipment, host equipment理微, database assets, virtualizat事湖ion equipment, comprehensive se年但ttlement system, billing and accoun低音ting system, business analysis syste子市m, customer relationship manageme高麗nt system, partnership managemen算看t system and value-added service netwo下村rk, including network center assets suc國就h as intelligent network system and s件相hort message system, so as to re老舞alize cross platform Centralized contr時多ol and management of account number得開, authentication, authorization a麗電nd audit of various IT resourc風姐es across operating systems, across和他 operation and maintenance pro吃草tocols and across equipment types腦朋;

4. Ensure the security and int視書egrity of business system data藍遠, and control the security status服黃 of network environment in real 通地time.

Classic cases
  • China Telecom
  • China Mobile
  • China Unicom
  • Oriental Communication
  • Siemens Communications
Copyright © 2019 All Rights Reserved D多議esigned
Hangzhou pldsec Network Techno樂笑logy Co