Strength certification | Ruishi mainframe forensics and traceability system has won the localization compatibility certification again

Ruishi Mainframe Forensics and Traceability System was awarded Kunpeng Technology Certification

Recently, the Ruishi mainframe forensics and traceability system independently developed by Zhongrui Tianxia has completed the compatibility test certification with the Kunpeng 920 processor of Huawei Technologies Co., Ltd. , and obtained the Kunpeng technology certification. This shows that Ruishi mainframe forensics and traceability system can provide security guarantee capabilities for Kunpeng 920 processor mainframes, and it marks that Zhongrui Tianxia has taken another step forward in promoting the gradual adaptation of security products to domestic equipment and system platforms.

Follow the wave of Xinchuang, and comprehensively help customers improve the security level of Xinchuang environment host

Since the 20th National Congress of the Communist Party of China, relevant national departments have paid more and more attention to security and technological self-reliance, and the Xinchuang industry has risen to the height of national strategy. In the next five years, the demand for the Xinchuang application system of key information infrastructure units from the party and government to energy, finance, operators, education, and medical care will explode in an all-round way. However, with the gradual escalation of cyberspace confrontation, the concealment, complexity, and harmfulness of various types of network attacks are increasing. How to ensure the security of Xinchuang hosts and terminals, and timely and effective detection of various threats has become the top priority of customers' daily security operations. . Under the guidance of relevant regulations such as the "Network Security Law" and "Regulations on the Security Protection of Key Information Infrastructures", closely following the industry's "big credit innovation" trend, Zhongrui Tianxia Ruishi Host Forensics and Traceability System is always on the road of credit innovation development Stay ahead of the industry.

In addition to the Kunpeng technology certification just obtained, Zhongrui Tianxia products have been adapted and interoperated with many mainstream domestic chips and domestic operating systems such as Tongxin Software, Guangshen Organization, Zhongke Controllable, Zhongke Sugon, Kirin, Feiteng, etc. Certification to meet the capability demands of related industries for high performance, high availability, high stability, and high controllability. In the future, we will continue to strengthen localization support to help customers continuously improve their network security operation capabilities under a comprehensive and controllable ecosystem.

 

 

About Ruishi Mainframe Forensics and Traceability System

Ruishi host forensics and traceability system is the industry's first host threat detection and forensics traceability system that focuses on traces of hacking activities . Different from the traditional terminal security protection and security detection software that detects malicious behavior through resident software probes, the Ruishi host forensics traceability system starts from the perspective of the attacker , and effectively collects and analyzes the traces that reside on the terminal after the hacker attack. Discover advanced threats. The product supports resident and green on-demand forensic detection. It has the characteristics of flexible deployment and low impact on business systems. It can effectively detect hidden and harmful advanced persistent attack (APT) traces residing in the terminal. The product quickly completes terminal data collection with one click, automatically generates threat reports, provides multi-dimensional expert analysis perspectives, supports custom rules, and completes terminal threat scanning and troubleshooting in minutes.

The products are suitable for scenarios such as host and terminal advanced threat detection and forensic analysis, daily security inspection, security emergency response, and special security inspection, and are widely used in key information infrastructure industries such as supervision, finance, energy, party and government, and national defense.

Guess you like

Origin blog.csdn.net/zorelworld/article/details/130321154