Operation and maintenance system audit

Introduction
of ANVIZ audit system operation and maintenance (fortress machine) (referred to as VS-BH), a defense can be reinforced *** new security products, with a strong security protection. The use of hierarchical, modular design, set user management, authorization management, authentication management and comprehensive audit in one, able to intercept unauthorized access and malicious ***, do not block lawful command to filter out all illegal target device access behavior.

Product Features

• advantage of
the platform focused on the account and password management, authorization management, SSO single sign-on, authentication management and audit management and other functions, from technical support to ensure the safe operation of the system.

• Comprehensive user management
to provide certificate authentication mode or in conjunction with third-party CA, dynamic tokens, biometrics, message authentication, etc., combined certification to ensure that legitimate users can access their backend resources, improve the security of access.

• powerful resource management capabilities
to support the number resource statistics, unix resources, network resources, windows resources, database resources, C / S resources, B / S resources, middleware resources, mainframe resources, middleware and financial sectors mainframe management .

• Security policies
provide fine-grained access control policies such as access time, address policy, RDP strategy, character commands, FTP, password command, lockout policies, audit policy and security ××× such as to maximize the protection of user resources.

• Configuration management
provides multi-level packet, AD domain synchronization group structure, the type definition of the group (user resource, integrated), of roles, and mount the authorization policy positions, automatically change the secret password and the PIN envelope dialing test functions.

• Audit Management
Support Command, content, character video, graphics, video and other acts of audit, and supports automatic generation of reports.

Product advantages

Logic commands automatic identification technology

能自动识别命令状态、编辑状态以及私有工作状态,准确捕获逻辑命令。

Distributed Processing Technology

Distributed design is conducive to the safe and correct implementation and operation of logging policies. Meanwhile, the use of secure connections between components in communication, policies, and logs are prevented from tampering.

Data encryption

Processing the user data using encryption techniques for data security and data integrity protection of user communication, intercept and prevent malicious users from tampering with the data, the user is not adequately protected vandalism during operation.
Regular expression matching technology

The combination of a regular expression into a tree structure may be genetic strategy, automatic matching control command. Tree can cause genetic strategy for the modern enterprise architecture for hierarchical classification management and control server provides a powerful tool.

Operation reduction technology

将用户的操作流程自动地展现出来,监控用户的每一次行为,判断用户的行为是否对企业内部网络造成危害。

Auditing search function

真正把每一次审计出的用户操作行为绑定到自然人身上,便于企业内部网络管理追踪到个人。

Graphics protocol proxy

实现多平台的多种图形终端操作的审计,如Windows平台的RDP方式图形终端操作,Linux/Unix平台的XWindow方式图形终端操作等。

A typical deployment
offers a variety of deployment options to support dual-HA deployment, clustering and distributed deployments, and has the following characteristics:

• No need to install any client agents, server engine
• no impact on traffic flow data
easy and intuitive operation • quick on-line
• without changing the existing network topology
• Centralized management support hierarchical deployment

 ![](https://s1.51cto.com/images/blog/201905/30/48c2c911e2aacc5bce2f4f261fe23490.png?x-oss-process=image/watermark,size_16,text_QDUxQ1RP5Y2a5a6i,color_FFFFFF,t_100,g_se,x_10,y_10,shadow_90,type_ZmFuZ3poZW5naGVpdGk=)

value of customer

Visual Database asset allocation and risk, enhance the ability of data security governance
• to help companies achieve centralized account management, reduce management costs
• Help companies achieve centralized authorization management and access control, to simplify the authorization process, reducing management pressure
• help companies reduce information assets damage and leaks
• to help companies meet compliance requirements, passed the IT audit
• help control the operation and maintenance of operational risk and afterwards reason and responsibility in enterprise

Guess you like

Origin blog.51cto.com/14347871/2402875