KeywordsSecurity operator solution implementation face
Scenario Overview
H3C operator Security Hosting service solution helps operators to provide network security generation, generation and maintenance services for small and medium-sized enterprises, and to connect with dedicated line access to achieve line value-added. On behalf of the construction, operators through the lease or resale, the H3C UTM (Unified Threat Management, unified threat Management) equipment to the enterprise, and the UTM equipment deployed in the corporate network of the Internet exports, the implementation of firewalls, VPN, anti-virus, anti-spam, Anti-hacker intrusion, URL filtering, confidential information protection, P2P/IM control, Internet behavior audit, such as a series of security functions, for the enterprise network to carry out a comprehensive security protection.
In the aspect of generation, through the security hosting operations center deployed in the metropolitan Area Network, manage UTM devices that are distributed across the enterprise, monitor real-time security incidents, security breaches, or bandwidth abuses from within the network, ensuring that the customer understands the latest security information, quickly identifies real security events, and takes appropriate action to resolve customer issues. The secure hosting operations center can record all intrusion attempts and notify the customer of security incidents.
The significance of secure hosting services to SMEs is:
To obtain comprehensive network security protection at lower cost to solve the increasingly serious network security problem
Enjoy the carrier 7x24 hours of professional security services, so that it staff from the heavy network security maintenance work freed up, committed to more valuable information construction work
Regular access to a variety of clear, detailed, consistent with policy requirements of the network security reports, a comprehensive understanding of network security situation
For operators, through the implementation of secure hosting services can achieve the following purposes:
Increase operating income, improve ARPU value, realize the increment of broadband line
Enhance customer satisfaction and enhance customers ' adhesion
Meet the needs of current business transformation
In short, secure hosting is a flexible, secure business for the purpose of reaping results. From a global point of view, the managed security Service can make full use of resources, reduce waste, operators to carry out security hosting services to achieve the operator and the enterprise win the result.
Typical networking
Programme features
Most professional security features
Use H3C-A-full cotecna and rigorous state Test proprietary engine technology, real-time defense of a variety of network attacks, integrated Kaspersky Professional Virus library, complete killing network virus, to achieve the perfect combination of speed and efficiency; recognition technology based on Protocol feature Library , accurate identification including thunder, Skype and other applications, such as p2p/im or blocking control, limit the granularity of accurate to 8Kbps, comprehensive web filtering, mail filtering and Internet behavior Audit to maximize the security of information;
Unified operation and Maintenance management
Not only to provide professional UTM equipment, but also to provide operational management platform, business management platform and user-service platform, based on SNMP, TR069 Protocol Standard management interface, to achieve the cooperation with the third party management platform.
Granular user privilege Classification management, flexible package customization
Support the four level of authority management, the different user management authorization, can only see the equipment running the minimum permissions assigned to the user, and the high privileges only to operators operation and maintenance personnel open.
In addition, can be customized according to the needs of users, customized for the customer variety package.
Localized Quick response
More than 2,500 local research and development teams, to ensure rapid response to operators in the business promotion process of new requirements.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.