Solution

0512-80682876

ada_sun@cipon.net

Ocean University Of China

Pain points and needs

1、Pay attention to the discovery and detection of weak passwords. There are numerous internal business systems at Ocean University of China, making management difficult. There is a high risk of hackers exploiting plaintext transmission and weak passwords within the internal network. Users hope to comprehensively analyze the data flow of internal business systems and automatically detect and block plaintext transmission or weak passwords.

2、Pay attention to ransomware and mining virus protection. Based on the diversity and complexity of the visiting user group, as well as the harsh external network environment, users hope to conduct security checks and detections on the entire network, analyze and locate potential mining and ransomware viruses in a targeted manner, and take timely warning and blocking measures.

3、Emphasize defense effectiveness and unified operation and maintenance. There are numerous network security devices for users, and the operation and maintenance management is quite complex. We hope to establish a unified security operation platform, which can achieve unified display of security events and linkage defense between security devices, reduce management complexity, and shorten the time for risk disposal.

4、The scheme design must meet the requirements of Level Protection 2.0. The overall design scheme must meet the relevant design requirements and basic requirements of Level Protection 2.0, and be able to assist users in passing the Level Protection evaluation.

The solution

1、Deploy the next generation firewall and online behavior audit equipment of Shenzhen Trust through the Internet exit to achieve Internet exit security protection and audit of internal users' Internet access behavior.

2、By deploying deep trust WEB firewall devices at the boundary of the data center, security protection of internal application systems in the data center can be achieved. By adopting a dual machine deployment approach, high availability of the network architecture can be achieved.

3、Deploy deep convincing latent threat probes on the core switches of backbone nodes to collect the full traffic of key nodes, and deploy deep convincing latent threat probes on the core switches of various campuses and data center aggregation switches to collect key traffic in a centralized manner.

4、Deploy the security awareness platform of SZSS on the core switch to analyze the threat of the whole network, and at the same time, link with the firewall at the Internet exit and data center boundary. When security problems are found, it can focus on analysis and link blockade.

5、Deploy Shenxin SSL VPN devices in the operation and maintenance area to achieve mobile office for teachers and ensure link security; Simultaneously deploying a deep trust behavior perception system to explore the value of students' online activities and identify potential risks.

6、By purchasing cloud eye services, device protection is combined with manual protection to achieve secure emergency response. By analyzing the current situation and threats of network threats, targeted security construction suggestions are provided.

Program value

The vulnerability of the entire network is clear at a glance, providing ample insight into potential risks

By using the Deep Trust Network Security Level Protection Solution, we assist users in sorting out assets and analyzing vulnerabilities such as vulnerabilities, weak passwords, plaintext transmission, etc., helping users accurately locate high-risk users and assist in their disposal.

Continuous detection and coordinated defense of advanced threats such as ransomware to ensure the security of the entire network

By utilizing new technologies such as big data analysis, artificial intelligence, and UEBA, we assist users in identifying potential advanced risks within their internal network, such as ransomware, mining viruses, and APT attacks, and provide one click solutions through expert services and endpoint protection software provided by DeepTrust.

Design according to standard, compliance requirements for level protection 2.0

Based on the latest "Technical Requirements for Network Security Level Protection Security Design" standard, the security concept of "one center, triple protection" and the design principle of "partition and domain" fully meet the compliance requirements of Level Protection 2.0, and assist users in smoothly passing the Level Protection evaluation.