搜索
Search

Platform

Security platform for key information infrastructure
All categories
Number of views:
1002

Security platform for key information infrastructure

Retail price
0.0
Market price
0.0
Number of views:
1002
Product serial number
Category
Platform
Quantity
-
+
Stock:
0
1
产品描述
Parameters

Demand Analysis

As China's Internet continuously develops at a high speed, the network and its devices are more intelligent, large-scale, and diversified. However, challenges on the aspect of security such as complex network space, variable network environment, and increased network risks appear as well, and they have become important factors affecting the healthy development of the economy and society.

Product Introduction

The Critical Information Infrastructure Security Protection (CII) is a set of overall solutions for public security organs to monitor network backbone nodes as well as important networking systems and websites within their jurisdiction. CII can monitor intrusion behaviors and virus transmission at network backbone nodes and Internet websites in real time, timely report on large-scale network intrusion behaviors, virus transmission and other events, as well as analyze and make early warning for the potential security risks and malicious attacks of the network.

Core Functions

The main functions include real-time monitoring, threat perception, reconnaissance and investigation, traceability, hierarchy protection, notification and warning, intelligence information, rapid disposal, command and dispatch, and offensive and defensive drills.

 

Product Advantages:

1. Three major-center designs provide visual presentation, deep mining analysis, basic scheduling and collection of data.

2. The super-fusion design, can be docked with the collection devices from other manufacturers, analyze intelligent data, and achieve multi-vendor data collision and association analysis.

3. Intelligent analysis capability: The main functions include in-depth mining and validation of the results of the analytical model, analysis and mining of data through visual analysis or interactive analysis, and custom construction of new analytical models.

4. Threat intelligence capability: Possessing the intelligence information from multiple sources, gathering malicious IPs, malicious URLs, malicious programs, vulnerability information, etc. Facing the security threat of cyberspace, it uses the big data analysis and mining method to realize real-time threat monitoring for various industries and application systems.

 

Typical application

Application scenarios

Deployment plan

User value

Establishing a security threat data analysis and notification disposal center by collecting relevant data related to network security. Making an early warning on the network security threats in a certain period of time and in the future through network security event analysis based on big data. Conducting emergency response and disposal for relevant network security events through mechanism construction, to form the big data analysis capability for multi-source threat intelligence and the network security monitoring and early warning network covering the whole province, so as to build an information security notification system for internal and external linkages in the public security industry, and improve the capabilities of public security organs in terms of monitoring, discovery, situational awareness, early warning and emergency response.

Scan the QR code to read on your phone
We could not find any corresponding parameters, please add them to the properties table
这是描述信息

Service hotline:
400-810-7766 (24H)
E-mail:

shfw@leadsec.com.cn
Address:

Zhongguancun, 8 dongbeiwang west road, haidian district, BeijingSoftware park 21

  • Douyin
    Douyin
  • WeChat
    WeChat
  • Weibo

Copyright Beijing Leadsec Technology Co., Ltd.    京ICP备1124454号     Power by:300.cn  Beijing