New product release | Zhian Network【Zero Trust SDP Access Control System】officially launched!

insert image description here

Recently, according to the "2022 Cloud Office Industry Research Report", from 2021 to 2023, China's collaborative office industry will maintain an annual growth rate of more than 10%, and the number of remote office workers has increased by 115% in the past ten years. Ushering in a wave of remote office demand.

Under the turmoil, employees' remote access to internal network resources of the enterprise has also produced many security risks, so more and more enterprises have begun to think about what is the core appeal of enterprises for remote office? How to deal with security challenges in the cloud era?

Based on this, aiming at the pain points of data security in the scenarios of remote business access and open data sharing, Zhian Network launched the [Zhian Zero Trust SDP Access Control System] to build a safe and reliable network space for more Internet users.

▲Cloud Control Zero Trust Access Control System

                        **基于零信任的数据安全**

A new generation of remote office security solutions

Cloud Control·Zero Trust Security Access Control System is a remote access control system based on Zero Trust SDP (Software Defined Border) and IAM (Identity Management) technology, which can implement security isolation for business. Visitors need to run Zero Trust terminals. Authorized accounts can be used to connect and access authorized business systems only after passing authentication, and user permissions can be dynamically and continuously adjusted according to visitors' access behaviors, operating environment and other factors, which can replace traditional VPN and data leakage prevention and data desensitization systems.

                          ## 产品功能

App incognito

The real domain name, port and other information of the business system can be effectively protected through the SPA single-packet knocking capability. Only trusted terminals installed with the cloud control zero trust client can access the business system. Attackers cannot discover the user's business system by relying on scanning tools, thereby Realize the stealth effect;

Dynamic Authentication Authorization

The cloud control system continuously evaluates the trust of users' access behaviors, and dynamically controls and adjusts user access rights by detecting abnormal behaviors, unauthorized behaviors, threats, and terminal configurations to ensure the security of application services;

Access control

The cloud control system only grants the minimum permissions required by personnel through layers of authorization and defense mechanisms, and performs fine-grained access control;

Application access acceleration and performance optimization

Through multiple technologies of protocol optimization, transmission optimization, link optimization, and data optimization, integrate global high-quality links to improve network access speed and success rate;

Cross-platform, multi-terminal access

Terminals such as mobile phones/computers/iPad are conveniently connected, and the client supports mainstream operating systems such as Android, iOS, Windows, macOS, etc., allowing users to connect securely anytime, anywhere;

Unified management

Unified work platform, integrated application SSO single sign-on, unified internal and external network access, work entrance, remote management;

situational awareness

Large-screen display of multi-dimensional application terminal access data, employee access behavior awareness, application operation status awareness, internal risk awareness, system anomaly awareness, and real-time location of abnormal status.

                       ## 适用场景

Remote office scene

Employees can safely access OA, ERP, CRM, finance, BI, email and other systems; IT personnel can remotely develop, operate and maintain scenarios;

Unified Identity Management Scenarios

Focusing on the four major aspects of user identity, terminal equipment, access applications and activity data, it provides enterprises with unified and authoritative identity authentication services, which helps to achieve enterprise-level unified access control;

Terminal Security Management Scenarios

Business intensification of group units, centralization of Internet exports, unified security management and control of access PC terminals, and unified security baseline scenarios;

Reduce business exposure

Relocation of computer room, security drill, business security and other requirements shrink the resources originally on the Internet to the intranet of the enterprise;

Third-party remote access scenarios

Access scenarios for third-party suppliers, partners, supply chains, and outsourcing/outsourcing personnel.

                        ## 产品优势

global visualization

View and solve security issues from a global perspective of the entire cyberspace;

quick implementation

It does not affect the existing network architecture of the enterprise, is compatible with all types of business applications, supports all mainstream types of terminals, and can be deployed quickly;

high performance

The transmission performance is high, and it can be connected immediately when it is used, and it will not consume additional server and network resources. The transmission performance is more diversified than traditional SSL VPN.

Zhian Network focuses on the research and development and layout of cutting-edge technologies. Based on the zero-trust SDP (software-defined boundary) and IAM (identity management) technology, the remote access control system V2.0 can seamlessly connect enterprise applications and Data, providing security protection and controlled network access rights for the enterprise digital business environment, reducing the risk of data leakage, can be widely used in many industries such as e-commerce, finance, manufacturing, construction, and the Internet.

▲ China Academy of Information and Communications Technology Zero Trust Industry Map

Prior to this, Zhian Network has joined authoritative organizations and lists in the industry such as Zero Trust Laboratory, Zero Trust Standard Working Group, Top 100 Zero Trust Products Graph, and China Institute of Information and Communications Zero Trust Map; this time Zhian Network [Zhian Zero Trust SDP The official release of Access Control System] also further marks that the technical realization path, scene practice experience, stable product performance and complete product maturity of Zhian Network Zero Trust products have been highly recognized by the market. In the future, it will be used in education, Medical, communications, finance, government and other industries have been implemented and deployed to effectively solve the remote office needs of users and contribute to the development of the zero-trust security industry.

In the future, Zhian Network will be committed to the innovation and implementation of zero-trust technology, continue to create "full-scenario" zero-trust security products, and cooperate with colleagues in the industry to bring out the maximum value of zero-trust technology in the era of cloud-edge collaboration!

insert image description here

Guess you like

Origin blog.csdn.net/zhianwangluo/article/details/130195109