Industrial monitoring and situational awareness platform
Centralized safety management system
Industrial safety isolation network gate system
Industrial safety audit system
Industrial control honeypot system
Industrial asset exploration and full life cycle management system
UHC Security Audit protection system
The host security hardening system
Industrial network security terminal gateway system
Industrial Safety assessment System
Vulnerability information base
Industrial control safety risk assessment services
Industrial control assets sorting and full life cycle management services
Industrial control security penetration services
Industrial control safety active defense services
Industrial control security border protection services
Industrial control safety operation services
Training actual combat parallel simulation laboratory construction services
Cyberspace security wall chart prevention and control platform
Website cloud protection platform
Fishing drill service platform
Application host Integrated protection system G01
Network asset mapping analysis system D01
Internet exposure asset risk dynamic monitoring system FD01
Network violation external audit system E01
Network attack blocking system K01
The wall map prevention and control platform is based on the map view of cyberspace geographic information,It is to centrally control cybersecurity related data, participants, and assets,And its data, business and relevance through security technology, computer technology, artificial intelligence, big data technology and spatial geographic information technology to monitor, analyze, judge, control, decision-making, command, dispatch, early warning, notification, governance。Docking with the platform of national authorities,We will form a comprehensive prevention and control system that integrates various sectors, vertical and horizontal connectivity, and coordinated coordination,Establish a normal, systematic, and practical cybersecurity working mechanism and a multidimensional, modern, and longitudinally-deepening comprehensive prevention and control system for the cyber society,Form a wall chart combat platform with the ability to improve the response and disposal of cybersecurity emergencies and major risk prevention and control。
The comprehensive prevention and control system of network security builds the basic data layer, intelligent analysis layer, and network security business layer,Under the interaction and fusion of "man-Earth-net" relationship,Through the deployment of soft and hard probes and other ways to strengthen monitoring and early warning of various key facilities, Internet of Things applications, and important information systems,Based on massive network security events with geographic information characteristics,Through resource integration,Transform network big data into network security incident information resources,And through big data, machine learning and other analytical methods and technologies,Analyze and judge network security incidents,Processing with deep learning and pattern recognition,Finally through the map of cyberspace,To realize the concretization and digitization of cyberspace,And then create a three-dimensional, multi-dimensional comprehensive prevention and control pattern,Build a comprehensive cybersecurity prevention and control system that integrates "prevention and control",To achieve the protection of critical information infrastructure, important networks and big data,Realize "dynamic defense, active defense, in-depth defense, precise defense, overall prevention and control, and mass prevention and treatment" of network prevention and control。Thus, it provides intuitive and valuable information for decision makers to reduce the uncertainty of decision-making, and fully supports the organization's "wall chart operations and prevention and control" capabilities。
Fully support different brands of different types of security data acquisition equipment and different sources of different structures of data,Adopt a variety of data docking methods such as active acquisition, active acquisition and passive reception,Based on data center data visualization, intelligent governance,To form an all-round security data collection and analysis capability of all elements in cyberspace。
The visualization technology based on network geographic map information integrates network security events and cyberspace asset data to enrich the visual expression from the dimensions of geography, assets and events, comprehensively display and describe the distribution and attributes of cyberspace resources, and realize the visual expression of cyberspace elements。Events are used as trigger conditions,Quickly concatenate events, assets, and geographic elements through graphics,Clarify the interaction between the various elements,To form a set of dynamic, real-time, reliable and effective cyberspace operational command map,Make the asset base more clear, incident discovery more accurate, threat positioning more accurate, threat analysis more intelligent, threat tracing more automatic;Improve the capabilities and efficiency of business units in incident discovery, forensic location, and traceability,Make the work of functional departments more intelligent, automatic and visual。
Established threat intelligence data center (including 360, Qianxin, Tencent, Ali and other intelligence) Shandong data center。
Comprehensively enhance the ability of cybersecurity incident detection, early warning and joint handling。
We will build protective positions for critical information infrastructure and comprehensively improve its defense capabilities and levels。
Strengthen the ability to monitor and handle online public opinion, and be able to conduct timely guidance for hot events。
Establish a monitoring mechanism and technical means for political cases and incidents, realize the ability to proactively discover and deal with them, and effectively curb the occurrence of such cases and incidents。
The security related people, things, things, places and their mutual relations are unified and coordinated, and the policy linkage and disposal mechanism of security orchestration, automation and response (SOAR) is developed to solve the single security protection of fragmented information security data island。Build a network security command platform to realize core business systems such as threat perception, real-time monitoring, information reporting, emergency command, supervision objects, intelligence information, inspection and supervision, management evaluation, and offensive and defensive drills, and comprehensively improve the level of network security collaborative supervision and command services。
Data is the core of future enterprise security capabilities, and the quality and value of data is the basis for security prevention and control capabilities。At present, from the perspective of traditional situational awareness projects, the number of probes is insufficient and the quality of data collected is not high, which will seriously affect the accuracy of data processing and analysis。At the same time, for applications such as threat detection and traceability, collecting asset information and device logs is far from enough, and more full-factor data needs to be collected。
The wall chart prevention and control platform is based on network defense G01, network exploration D01, network connection E01, network shield K01, third-party vendor traffic data, log data and asset data,Build a high-quality data governance system by combining threat intelligence sources (including 360, Qianxin, Tencent, Ali Intelligence Source),Ensure high granularity, accuracy and efficiency of data。
In many enterprises, there are many network assets and complex application of network security products。Many enterprises cannot accurately grasp the security risk degree of their network assets due to reasons such as the degree of emphasis and product capabilities. As a result, original alarms of security devices are used as indicator sources rather than valid alarms as data sources in daily security analysis。It is difficult for security operation and maintenance personnel to distinguish valid alarms and respond to them。
The wall chart prevention and control platform uses the perspective of asset safety to examine the overall security and protection status of assets, including but not limited to the perception and use of assets around the situation of asset harm, asset weakness, asset attack, etc
Most traditional situational awareness systems are still at a low level when it comes to automation,Mainly: 1, the degree of informatization and technical ability is insufficient,The accuracy of risk identification is difficult to guarantee;2. Security providers generally lack understanding of users' businesses,Difficulty in forming business-based algorithms, scripts, and orchestration;3. Management process,Lack of rule support for automated response handling,Human intervention is required;4. It is difficult to communicate between devices,The ability of coordination and linkage is weak。
The wall chart prevention and control platform realizes the automatic response mechanism with comprehensive cooperative defense ability through the intelligent and visual data governance of the data center, rich algorithm library and custom algorithms and strategies, automation and response (SOAR) and other capabilities
When the traditional situational awareness platform data is available, the platform is built, and there are no qualified security talents, the platform and functions will not be used, and the ability to land can not be truly achieved, and the corresponding return on security investment can not be obtained。
The unique collaborative defense and scheduling command functions of the wall Chart prevention and control platform centralize the coordination and control of various resources, and combine the capabilities of machine learning, artificial intelligence and automated analysis to standardize and reduce the ability requirements of front-line operators
At present, various product manufacturers and platform construction units operate independently, and lack a unified data interface, which brings a lot of trouble to data collection, equipment docking, threat intelligence sharing, etc., increases a lot of unnecessary workload, and fails to take advantage of the core competition point of network security - collaborative sharing。
The wall chart prevention and control platform fully supports different brands and different types of security data acquisition equipment and different sources and different structures of data,Adopt a variety of data docking methods such as active acquisition, active acquisition and passive reception,Based on data center data visualization, intelligent governance,To form an all-round security data collection and analysis capability of all elements in cyberspace。
Network security is a capability system, if only rely on log analysis, alarm events, threat intelligence and other security tools piled up, lack of enough knowledge and talents to serve the operation, lack of clear management process to support the guarantee, it is impossible to achieve the effective implementation of active security capabilities。
With the concept of "data-driven service, service-driven security", the wall Chart prevention and control platform has established a complete safety operation system, safety technology system and safety standard system to achieve the delivery of new safety capabilities。
The platform effectively connects the problems of the independent islands of each unit system in the past, transforms the passive defense method into active discovery, and realizes the ability of accurate detection and protection and emergency linkage。
This platform will change the passive response mode of the protection unit in the past, achieve accurate and timely early warning before the impact of security risks, and build an elastic defense system in real time, in order to avoid, transfer and reduce the risks faced by network security to the maximum extent。
This platform will build an offensive and defense drill platform, and improve the technical ability and level of disposal personnel through continuous combat。