• International
  • Intl-繁体中文
  • Intl-简体中文
  • 中国站
  • 简体中文
Industry Trend Analysis
Security services are evolving and developing from technology to management

With the evolution of the information age, customers' demand for security services is also facing upgrading and transformation. How to adapt to the deployment and application mode of traditional information security service products in the cloud is a difficult problem for most customers. Information security classified protection services are constantly developing and upgrading in national standards, performance projects, security business, application projects, etc.

Business Challenge

Application Security

The authentication information should adopt at least two factor authentication, and the main network equipment should select two or more combination of authentication technologies for the same user; configure access control policies and rules; mark sensitive resources; and apply fault tolerance and self-protection.

Data Security

Data integrity check self-service capability; data transmission and storage confidentiality; operating system, network equipment, database management system, main application system, with local / remote backup and important information recovery function

Network Security

Effective monitoring, detection and blocking of network security "remote access and unauthorized access"; application level access control of core network nodes; independent management of regional devices and components centralized monitoring and management; centralized management of malicious code, virus and patch upgrade; centralized audit and centralized alarm.

Host Security

The access control policy is configured by the authorized subject, and the access rules of the subject to the object are specified. The granularity of the access control should be user level or process level for the subject, and file and database table level for the object. The security mark is set for the sensitive information, and the access of the subject to the information with security mark is controlled.

Application Scenario
Secure Communication Network

In order to ensure the integrity and confidentiality of data, network security audit is carried out on network security, including the operation status of network equipment, network traffic, user behavior in operation and maintenance, and encryption and decryption technology is used in the process of communication network data transmission.

Safe Area Boundary

e Cloud guarantees that the cloud platform it provides can achieve cross-border access, data flows communicate through border protection devices, and deploy access control mechanisms and set access control rules at the boundary of network area, so as to ensure the security of user area boundary on the cloud platform.

Overall Structure
It is suitable for customers whose basic condition is that the business application hosting platform meets the requirements of three-level classified protection certification, and apply for three-level classified protection certification with the application system as the main body. Application classified protection certification requirements include application hosting platform (cloud computing infrastructure platform) and application. e cloud provides a "shared responsibility" model for security service classified protection. The specific classified protection service process includes four stages: grading and filing, gap analysis, safety rectification, etc.
Architecture Characteristics

1、Free Migration 2、Scalability 3、Maturity and Stability 4、Security Architecture and Technical Measures 5、Network Technique 6、Network Coverage 7、Machine Room / Bandwidth Resources 8、Disaster Recovery Capacity

Recommended Products
Service Case
  • Finance
    Internationally Renowned Insurance Company
    The client is an internationally renowned insurance company, and its insurance business APP has a large number of mobile users. However, due to problems such as slow access on the mobile terminal and slow page loading and display, users have a lot of dissatisfaction with the client’s business APP. At the same time, information needs to be frequently synchronized between headquarters and branch offices, which has extremely high requirements for security.
    Use of the product
  • Law Service
    Large Scale Full-Service Law Firm in China
    The client is one of the largest full-service law firms in China, with a broad client base with branches located in London, Hong Kong and other places. Domestic employees in the company need frequent access to international applications. The client hopes to ensure that employees in London can have fast and stable access to the business system located in the Beijing data center meanwhile taking into account the costs.
    Use of the product
  • Finance
    Large Joint Venture Fund Management Company
    The client is one of the largest joint-venture fund management companies in Hong Kong from Mainland China. The original website is deployed in a self-built private cloud, whose expansion speed and security update speed incapable of meeting national regulations and business development needs. Client is searching for domestically produced cloud resources that are autonomous, self-controllable, secure, and flexible to expand to meet growing business development needs.
    Use of the product
Contact Us

We use cookies to ensure your high-speed browsing experience. By continuing to browse this site, you agree to our use of cookies. Details