Product Center
4009-610-038
Contact Us
Location:Home > Product Center >Detection of defensive >
With the deepening of the industry informatization construction, production, business support system of the network structure is more and more complex, the resulting number and variety of all kinds of application and the server is also increasing, in case of wrong operation maintenance personnel, or using the same initial system Settings, is likely to bring safe hidden trouble, affecting the reliable operation of the system.
Product advantage
Perfect security configuration knowledge base, covering operating systems, network equipment, database, middleware, virtualization platform and nearly 50 such equipment and system security configuration to reinforce Suggestions, IT can comprehensive guidance information system security configuration and reinforcement work.
Unique custom security configuration check function, can by the user to add more equipment check project, quickly adapt to the safety standard updates and the development of the network system construction.
On the basis of a variety of industry standard and grade specification, implement compliance checks on the user information system.
According to the different reading people's need to create a suitable for different roles statements, generated based on the different roles, different content and format of the report, from multiple perspectives reflect the security situation in the overall configuration of the network.
Key features
Product built-in default equipment and check the template system, support configuration verification in accordance with the requirements for information security rank protection;
Support for multiple protocol remote login inspection target system, support equipment security configuration check online and offline configuration verification equipment security;
Security configuration verification process only check the system configuration, no any modify the system configuration, ensure business continuity and security;
Support custom check security configuration function to support according to the level of information system security protection requirements for system configuration verification;
Provide audit inspection process behavior;
To provide based on the analysis of the role, statistical reports.
Green au configuring security verification system is very suitable for operators, financial, energy, government, education and other industries the user's security operations work.
广东大中信息技术有限公司 Powered by hunuo.com 粤ICP备18106562号-1