0512-80682876
ada_sun@cipon.net
Employees need to conduct security audits on document operations to meet the need for rapid traceability of security incidents;
Effectively manage the use of external devices such as mobile storage to avoid the risk of leakage of mobile storage devices;
It is necessary to control instant messaging software to avoid data leakage and malicious speech dissemination;
The computer software and hardware lack comprehensive and effective security control.
Solution
The group headquarters has deployed six terminal security audit system servers and adopted a hierarchical deployment approach to achieve unified security policy control over the terminals in Haier Group headquarters, industrial parks, and industrial and trade jurisdictions;
Collaborate with the group's AD to deploy the client;
Synchronize organizational structure with the group portal and periodically synchronize personnel information to the terminal security audit system;
By implementing security policies such as host process and file operation behavior auditing, internet behavior auditing, and instant messaging auditing, we aim to achieve traceable auditing of end-user operation behavior within the group.
Program value
1. Implement unified management and operation of 3W terminal assets across the entire group.
2. Through various security control strategies, audit and trace illegal operations of end users to facilitate traceability in case of security issues.
3. Adopt full process management control to ensure the trustworthiness of the terminal. The online and offline status of the terminal will be managed and controlled to prevent the leakage of confidential information.
4. Automation and full lifecycle management to achieve comprehensive "maintainability". Adopting automated methods for management to improve maintenance efficiency. Continuous management throughout the entire lifecycle enables a comprehensive understanding of the management status of all terminals.