Jiaotu technology releases free Server Security Products
On July 6, August 30, jiaotu technology, a leading information security vendor in China, held a product launch conference at the Beijing National Convention Center, "officially releasing the free server and website security product-cloud Lock Based on the operating system kernel reinforcement technology.
The Conference was attended by researcher of the computing Institute of the Chinese Emy of sciences, Chairman of the Chinese Emy of information, academician of the Chinese Emy of engineering, and academician Ni guangnan, a famous computer expert; well-known cryptology experts at home and abroad, security operation system experts, technical consultant of the national secrecy Bureau, director of the China Electronics society, and Director of the Information Security Technology Engineering Center of the Chinese Emy of sciences, Mr. Qing sihan; director of the Beijing Key Laboratory of network security protection technology, director of the network security Laboratory of the Chinese Emy of Sciences Institute of high performance, director of the Zhongguancun Network Security Open Laboratory, Director Liu baoxu, Consultant of the Zhongguancun Security Industry Alliance, Mr. Lu Baohua, and other industry leading experts; well-known Internet media persons such as Lu songsong, Ding daoshi, tke, Zhu Zhe, and Wang Jiwei.
Speech by Chen Ming, Chairman of jiaotu Technology
It is reported that the cloud lock is the first free server security software in the C/S architecture, and security management and monitoring on the server can be achieved through the PC side. Cloud locks support windows and linux operating systems on a cross-platform basis. The core defense system is based on the operating system kernel reinforcement technology and web access control technology, features cover six modules: system protection, website protection, traffic protection, security optimization, security monitoring, and security logs, it helps users effectively defend against CC attacks, SQL injection, XSS cross-site attacks, vulnerability attacks, viruses, Trojans, backdoors, and other hacker behaviors.
Wang Jian, cloud lock product manager, said: There are a lot of security software on the market, but most of them are based on the Protection at the network layer and application layer, but there are few security software for the protection at the server system layer, however, users have a strong demand for this, and the system-layer protection is our expertise. Jiaotu technology has accumulated more than ten years of research on system security technologies. Cloud locks are both advanced in solving security problems and in terms of technical maturity. As a kernel-level protection product, cloud lock can penetrate into the underlying kernel of the operating system. Unlike traditional security products in the market, it introduces the kernel-level mandatory access control model to website protection, this is a major innovation of the cloud lock, and this mode can also be used to protect other applications and prevent attackers from bypassing.
Forum discussion (from the left: Li Ke, executive vice president of jiaotu technology, Academician Ni guangnan, Professor Qing sihan, and Mr. Lu Baohua)
In addition, although the cloud lock uses sophisticated kernel-level cutting-edge technologies, it emphasizes the ease-of-use and availability of the product. Each function is tailored to the specific needs of users and helps users solve security problems, and quickly determine the time, location, and stakeholders of the security risk situation, so that users can respond to the situation in a timely manner. At the same time, the linux version of the cloud lock implements a revolutionary remote graphical interface management, instead of traditional linux Server O & M management, the system frees managers from tedious work and greatly reduces the O & M burden. Second, cloud locks are designed for free, so that webmasters of small and medium-sized enterprises and server O & M managers can enjoy the protection provided by high-end security technologies for free without having to bear high costs.