Currently, the network security market is dominated by firewall, IDS/IPS, network switches, SOC, and other application-layer network security products. In addition to the above products, Wangyu Shenzhou Technology Beijing) Co., Ltd, introducing a new kernel reinforcement concept in the technical fields of Windows, Linux, and Unix systems, we have successfully developed dual kernel reinforcement and management modules for Windows, Linux, and Unix systems.
Product Overview
Unlike traditional security products based on network protection, such as firewalls and intrusion detection systems, the security reinforcement technology of the network God SecSSM server is based on the kernel-level security reinforcement technology of the operating system, when unauthorized and illegal users break through the firewall and other network security products through various means into the internal host, or even steal the maximum permissions of Windows, Linux, and Unix super administrators, wangshen SecSSM server security reinforcement technology will become the final and most robust line of defense. It disperses the unlimited power of the original Super administrators of Windows, Linux, and Unix systems so that they no longer have the ability to pose a threat to the system's own security, to fundamentally ensure the security of Windows, Linux, and Unix systems. That is to say, even if illegal intruders have the highest permissions of super administrators for Windows, Linux, and Unix, they cannot perform any damage or operation on all the core or important content of the system protected by the kernel reinforcement technology. The security reinforcement module of the network God SecSSM server works stably in Windows, Linux, and Unix systems to improve the security level of the system. It has the main features of the national level 3 security level standard, build a safer operating system platform for users.
Quickshield SecSSM is a server security kernel protection system that can be installed without changing the operating system. It is suitable for system management and security management. The security function of the operating system provides a security protection layer. Access to the file system is controlled by intercepting system calls to enhance the security of the operating system. It provides complete user authentication, access control, and audit functions. It adopts centralized management to overcome many management problems of distributed systems.
Security reinforcement and management system features of wangshen SecSSM Server
Wangshen SecSSM implements security protection at the operating system level. It becomes part of the operating system without changing the system execution file or modifying the kernel, you can implement the security control function without re-compiling the kernel.
Features:
1. Security Functions
1) Mandatory Access Control
At the kernel level, file-based mandatory access control, registry-based mandatory access control, process-based mandatory access control, and service-based mandatory access control are implemented.
2) Security Audit
Comprehensive Management of system logs and security logs.
3) Protection Functions of the system
Protects the system's processes from unusual termination, forgery, and information injection.
2. Security Level
Provides the security functions of national level 3 security level standards.
3. operability
Fully compatible with Windows, Linux, and Unix systems, professional and user-friendly operation interfaces, with low operating overhead, no system latency that can be noticed, and transparent to users.
Functions and features of the various modules of quickshield SecSSM:
1. File Mandatory Access Control Module
Allow users or processes to set access rules for files/directories with different access permissions, and set security levels for files/directories and users, implement access control based on the security model to implement flexible and mandatory access control based on the access control list fully compatible with Windows, Linux, and Unix systems), any user, including the super administrator) when the process or its calling process creates, deletes, modifies, reads, and other sensitive files or directories, it will filter and allow or deny the sensitive files or directories according to the SecSSM rules ).
2. Registry Mandatory Access Control Module
Allows you to set access rules for registry keys with different access permissions for processes. Any user, including the super Administrator) and the unauthorized process called to write the registry key set to "read-only" or "forbidden access" will be rejected unconditionally.
3. Process Mandatory Access Control Module
Allow access rules for processes with different access permissions. Any user, including the super administrator, and any unauthorized process called by the super Administrator, has no right to terminate or operate the process protected by the Network God SecSSM.
4. Service Mandatory Access Control Module
This module promptly discovers new application services or drivers and immediately terminates registration of application services or drivers to implement access control for the services.
5. File Integrity Detection Module
The User specifies the key read-only directory and data file name for which the verification information needs to be established, and the detection program automatically records the basic attributes and content checksum of all files in the directory. By regularly checking the validity of checksum, you can verify the integrity of important files or directories.
6. application-level service Integrity Detection
The detection program automatically records the basic attributes and content checksum of all services in the directory. The purpose of verifying service integrity can be achieved through regular checksum effectiveness detection.
7. cross-platform management
The Network God SecSSM supports multiple operating systems, including AIX, HP-UX, Solaris, Tru64, Linux, and Windows NT/2000/XP/2003. The network God SecSSM can manage servers of different operating systems at the same time, security policies are implemented, and the functions are basically the same in different operating systems. This shows good cross-platform performance and allows you to import and export configuration files to improve configuration efficiency.