Information security products

· Information security products

1, high-performance encryption chip products

2, a digital signature products

3, key management products

4, key encryption products

· User authorization and authentication products

1, authentication and authorization server

2, smart IC card

3, user authentication security card

4, digital certificate management systems: People use online digital certificates to identify each other's identity

· Security platform / system

1, the network virus detection and removal products

2, security and virtual private network router products

3, firewall and system isolation system

4, database security system

5, secure operating system: secure operating system refers to the computer information system in discretionary access control, mandatory access control, label, identification, object reuse, auditing, data integrity, covert channel analysis, trusted path, the trusted recovery ten areas to meet the appropriate safety requirements.

· Detection of network security and surveillance products

1, Audit and network intelligence analysis system

2, the information network remote monitoring system

3, network security monitoring and early warning systems

4, network security risks Scan Tool

Guess you like

Origin www.cnblogs.com/Neavotre/p/11070478.html
Recommended