Case selection | Juming log audit + Juming next-generation firewall jointly protect the internal network security of Changning Yongxin Energy Technology Co., Ltd.

Changning Yongxin Energy Technology Co., Ltd. has continued to expand its core business in recent years, investing a lot of resources in the construction of information systems, and its level of informatization is increasing day by day. In this process, companies are paying more and more attention to the protection of core data assets, and the security protection of data assets has become a major challenge for enterprises.

Project construction background

For compliance requirements and the purpose of protecting core assets, the company has adopted an isolation network security domain to prevent the leakage of internal core data. The physical isolation of internal and external networks prevents information leakage caused by the mixed use of internal and external networks to a certain extent. However, company employees still need to directly access the Internet for business and office needs. The continuous evolution of network attack technology has greatly increased the inconsistency of Internet access. Certainty makes network and data protection work increasingly complex.

In order to cope with the increasingly severe network security compliance audit requirements and sustainable business development, Changning Yongxin Energy Technology Co., Ltd. finally chose to cooperate with Juming Network to build strict and efficient network security protection after a long period of market research. barrier.

Main construction needs

01 Meet policies and regulations
. From the perspective of the company's sustainable development, Changning Yongxin Energy Technology Co., Ltd. needs to comply with relevant compliance regulations and legal requirements, including the "Cybersecurity Law of the People's Republic of China", "Information Security Technology Information System Security Level" Protection technical requirements" etc.

02 Protect the security of the intranet
. With the development of business, the company's internal business data is constantly being generated, transferred, and used. Massive core business data is retained in the intranet environment for security reasons. Therefore, it is necessary to reduce network threat intrusions and intrusions on the Internet. Block network security attacks, such as port scanning attacks, denial of service attacks, etc.

03 Internet access behavior management
is due to office and business needs. Employees need to communicate with customers in a timely manner on the Internet and exchange information via email... From the perspective of protecting intranet data security, it is necessary to reasonably control access rights to network resources, and to control employees’ access to the Internet. Conduct reasonable guidance on behavior to reduce the probability of intranet infection.

Construction effect

By deploying Juming comprehensive log analysis system (SAS) and Juming next-generation firewall system (NGFW), unified management of log data information and security isolation of internal and external networks are achieved.
Insert image description here
Legend: Juming comprehensive log analysis system

Juming's comprehensive log analysis system supports stand-alone, distributed collection, and cluster deployment methods . The flexible deployment method can meet the retention time requirements of network logs set by various policies and regulations. Based on Juming Network's rich network security protection experience, the system has built-in massive and effective security policy scenario models , including abnormal behavior analysis, business attack analysis, traffic statistics, etc., which helps to detect security incidents in a timely manner. The system adopts a high-performance log collection, analysis and storage architecture, combined with high-compatibility log parsing capabilities. The powerful log processing performance can perfectly adapt to the flexible development of the customer's network environment.
Insert image description here
Legend: Juming next-generation firewall system

Juming's next-generation firewall system provides comprehensive security protection and provides a solid barrier for network security protection in multiple dimensions. The product's built-in intrusion prevention engine supports real-time detection, alarm or interception of various hacker attacks and malicious traffic such as buffer overflows, SQL injections, worms, Trojan backdoors, etc.; the massive local virus database and sandbox linkage function can quickly detect all types of Network viruses; effectively defend against various DOS/DDOS attacks by analyzing and extracting attack characteristics. In addition, comprehensive and precise application control can be achieved based on multi-dimensional policy configurations such as user, location, time, application, behavior, and content to standardize and control employee online behavior .

About Juming

Juming Network is a leading domestic security operator invested by Tencent, the National Small and Medium Enterprises Development Sub-Fund, Jiangsu Hi-Tech Yida Ninghai Venture Capital Fund, etc. With advanced technology and high-quality services, the company's products currently serve more than 10,000 government and enterprise customers in education, medical, government, telecommunications, energy, finance and other industries , and more than 6,500 cloud hosting customers. The company has established dual headquarters centers in Beijing and Nanjing, and has branches in Hebei, Shandong, Hunan and other places. Its business covers 31 provinces and cities across the country and Hong Kong.

Juming Network will always adhere to the service concept of "customer orientation, sincere cooperation, mutual benefit and win-win, and advantage sharing", and lead the development direction of the domestic network security industry with advanced technology, excellent products and professional supporting services.

Guess you like

Origin blog.csdn.net/juminfo/article/details/133139516
Recommended