[Post] Six secrets of Intranet Security

Source: Internet
Author: User
[Post] Six secrets of Intranet Security Post by: 2009-8-18 12:20:00

The development of the information industry has dramatically changed people's lives. However, it has also laid the groundwork for many security risks: data loss, information leakage, worms, and network abuse. Data shows that 70% of enterprise users in China are at a "high risk" level, and the annual economic losses caused by network leaks reach tens of billions.

in such a security situation, enterprises also pay more and more attention to Intranet security issues, but often do not wish to, often because of the Intranet Information Security Protection investment increases constantly, viruses, Trojans, and attacks are constantly generated. Hardware and bandwidth investment continues to grow, but the network is interrupted and the performance of key applications cannot be guaranteed. Intranet security problems constantly plague enterprises, tests the network management neural network.

powerful tools for enterprises to protect their security, it also requires a solid security line. As a polar galaxy Company (www.jidigalaxy.com) that has been committed to Intranet security for many years, it has conducted in-depth research on the Intranet security issues of enterprises. It is the first company in the world to launch the polar galaxy terminal and Intranet security management system, starting from six functional systems: Access control management, terminal maintenance management, patch distribution management, online behavior management, information access control, and terminal Asset Management, Intranet security is well solved.

Guan Chong Jian: access control management

The system monitors and manages terminals that illegally access the enterprise intranet. In terms of secure access management, the system can detect all online hosts in the internal network through monitoring and active detection, and determine whether the online host is a trusted host, for the detected illegal hosts, the system can proactively prevent them from accessing any network resources, so as to ensure that the illegal hosts do not affect the network, and cannot intentionally or unintentionally attack the network or attempt to steal passwords.

shaozejian: terminal maintenance management

Users and permissions of polar galaxy terminals and Intranet security management systems use the RBAC model proposed by the American National Standards Association, that is, role-based access control model. Role-Based Access Control provides a simple and flexible access control mechanism, which only assigns permissions to the role. You can obtain permissions by becoming a member of the role. This is more flexible and convenient than the management model directly authorized to users in the past. At the same time, management personnel can remotely gain control of the client through the console and perform operations in an immersive manner. Management personnel can solve problems of remote clients in real time and conveniently. It plays multiple roles in remote maintenance or remote operation of business systems.

Shang yangjian: patch distribution management

worms represented by Red Code , Nimda, worms, and shock waves in recent years The frequent outbreak of viruses has seriously affected global network operations and even the economy, these worms exploit the Program vulnerability in the operating system or application. At the same time, exploiting vulnerabilities has become one of the most common methods for hackers. Attackers first discover vulnerabilities through scanning tools and then use corresponding attack tools to launch attacks. This attack mode is simple and extremely harmful. The fundamental way to eliminate vulnerabilities is to install software patches. patch distribution management is increasingly becoming an important part of security management.

the polar galaxy terminal and the Intranet security management system provide two modes: network scanning and host scanning. the built-in Nessus scanning engine can also be linked with mainstream vulnerability scanning devices on the market. After scanning, You can automatically patch System Vulnerabilities Based on the scan results and send alerts. Patch distribution management mainly completes patch detection and installation on the client, and enhances the robustness of the client. Allows administrators to customize software distribution and complete Patch Management for free systems. Remote Software Distribution is supported. You can deeply detect the installation and running status of the anti-virus program on the client to provide authorization and authentication creden。 for the secure access management system.

Shao Shang Jian: online behavior management

for an enterprise network, the weakest link is not Intranet intrusion, but illegal Internet access and external behavior of the Intranet user terminal. The polar galaxy terminal and the Intranet security management system are mainly responsible for detecting and managing unauthorized access to unauthorized networks by users. Illegal external monitoring management can prevent users from accessing untrusted network resources and prevent security risks or information leaks due to access to untrusted network resources. The system audits and controls Internet access permissions, and audits and controls network behavior and outgoing mail, so that intranet terminals can access the internet securely and securely.

zhongchong sword: information Access Control

with the development of network technology and the busy business of enterprises, it is inevitable that various external devices are applied at any time on each terminal of the enterprise intranet, and multiple interfaces of the system need to be opened for various network applications. Take a variety of plug-and-play devices as an example. For example, a plug-and-play device can easily copy a large amount of important data instantly, but a large number of USB flash drive Trojans are brought into the Intranet through the device, this greatly reduces enterprise network security. At this time, it has laid a huge risk for Intranet security and brought new problems to the IT management of the Organization.

peripherals and interfaces are used to manage various peripherals and interfaces on the terminal. Polar galaxy terminals and the Intranet security management system can disable system peripherals and interfaces to prevent unauthorized use by users. In terms of disabling external storage devices, you can prohibit the use of Universal Mobile storage devices while allowing the use of authenticated mobile storage devices. At the same time, the polar galaxy terminal and the Intranet security management system can implement file operation control and file encryption for end users, completely solving the problem during information access, security risks.

Shao Chong Jian: terminal Asset Management ,

the increasing number of network devices in Modern Enterprises, the network structure is also more complex. Enterprise Network and asset management departments need to spend a lot of manpower and material resources to maintain the computer operating environment of enterprises. At the same time, the computer hardware technology is developing rapidly, and often needs to be updated and eliminated, or with the upgrade of software to upgrade the hardware. The computer management and statistics of enterprises by financial or asset management departments are often in a disordered and manual state. When devices are frequently updated, the original asset records are often lagging behind in management and inconsistent with the actual situation, resulting in confusion in device management.

the system automatically collects and analyzes various computer hardware information such as the physical memory, processor type, processor speed, number of processors, mathematical coprocessor, and bus type of the terminal computer. The system can report various hardware information through combined query, and query can be performed based on multiple keywords such as hardware and storage capacity. At the same time, the system can automatically collect and analyze the software information installed on the terminal computer, and query and collect statistics based on multiple conditions. The system intelligently automatically monitors changes in the system's hardware and software assets, records logs, and generates alarms. At the same time, it can independently adopt response measures based on policies to prevent asset changes from causing greater harm to clients or networks.

Postscript

If an enterprise has a polar galaxy terminal and an Intranet security management system, it can provide a complete combination of swords to load and maintain intranet security. I believe the enterprise's network managers will become more powerful, perfect for full security of enterprise intranet information.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.