Case selection|Juming Network’s multi-product joint deployment establishes an information security barrier for Beijing Yingxiang Hotel

Beijing Yingxiang Hotel is located in Changping District, the back garden of Beijing, above the Dragon Vein, with a total area of ​​approximately 18,666 square meters. It is mainly engaged in four major businesses: catering, accommodation, hot springs, and weddings. Every detail of the hotel exudes the atmosphere of the national trend, is full of artistic temperament, and is auspicious. With its exquisite screen walls, exquisite carvings, and thick stone carvings, it has a Beijing flavor. It is the only modern Chinese-style boutique hotel in Beijing, the capital.

The hotel is adjacent to the Badaling Expressway, surrounded by many scenic spots and natural landscapes. It is close to the Great Wall and the Ming Tombs, and the transportation is convenient.
Insert image description here

Project construction background

The classical, elegant and luxurious style and convenient location attract many Chinese and foreign guests to stay here. The hotel completes services such as guest information inquiry, ID card and passport entry, credit card information, and room status information entry through the information system, which indispensably stores a large amount of citizen information and personal sensitive information. Therefore, hotel information security is particularly important.
In order to reduce the hotel's network environment information security risks, improve the security protection capabilities of the information system, and at the same time, in order to meet relevant national laws, regulations and institutional requirements. Beijing Yingxiang Hotel seeks the help of security vendors to add a security barrier to the hotel's information system and data.
After in-depth market research and extensive testing, Beijing Yingxiang Hotel finally chose to cooperate with Juming Network.

Construction effect

According to the needs of Beijing Yingxiang Hotel, Juming Network deployed Juming Comprehensive Log Analysis System (SAS) , Juming Security Operation and Maintenance Audit System (SOA) , and Juming Next Generation Firewall (NGFW) as an overall solution to achieve this. Security protection and isolation of information systems and data. Legend: Juming comprehensive log analysis system
Juming's comprehensive log analysis system supports
distributed cluster deployment
, compression storage and other capabilities, providing a solid guarantee for retaining log information for more than 180 days . At the same time, the system has built-in multiple compliance templates , providing three levels of protection and SOX Act classification by default, fully meeting the relevant requirements of the "Cybersecurity Law" and "Customs and Security Regulations".
In terms of centralized information collection and equipment coordination and linkage, Juming's comprehensive log analysis system has built-in rich standardization strategies. It now supports the analysis of 1,000+ heterogeneous equipment logs from many domestic and foreign manufacturers , and can analyze existing data in the network environment of Beijing Yingxiang Hotel. Network equipment and security equipment realize the unified collection and storage of log information. Legend: Juming safety operation and maintenance audit system
Juming's security operation and maintenance audit system supports 6 authentication methods such as dynamic passwords , fingerprints , and passwords . It associates accounts with specific natural persons, verifies the identity of the person who logs in to the account, and greatly enhances the uniqueness of user authentication. By binding natural persons with operation and maintenance permissions, operation and maintenance accounts, and equipment resources, and granting different permissions according to the roles and needs of different operation and maintenance personnel, the minimum granular authorization achieves the purpose of refined permission control . The system's built-in work order module can meet the dynamic application for permissions of operation and maintenance personnel in different scenarios, and supports offshore approval functions to facilitate users to handle emergencies and improve work order efficiency. Juming's security operation and maintenance audit system fully meets the policy requirements of "Classified Security 2.0" on access control, identity authentication, and centralized management. Juming next-generation firewall provides L2 to L7 layer security protection capabilities , including border access control , DOS protection , intrusion detection and prevention , virus protection , etc. Based on the flexible and fine-grained access control function of the next-generation firewall, it provides multiple control strategies such as user identity and application, and implements precise access management and control to ensure the reasonable use and protection of the group's network resources. In addition, Juming's next-generation firewall can accurately detect and block malicious behaviors and respond promptly to effectively prevent various network threats and attacks.



Legend: Juming next-generation firewall system

About Juming

Juming Network is a leading domestic security operator invested by Tencent, the National Small and Medium Enterprise Development Sub-Fund, Jiangsu High-tech Investment Yida Ninghai Venture Capital Fund, etc. The company has successively won the titles of "High-tech Enterprise", "Jiangsu Province Specialized and New Enterprise", "Key Software Enterprise in Jiangsu Province Planning and Layout", "Jiangsu Province Software Enterprise Technology Center Certified Enterprise", "Nanjing Engineering Technology Research Center Certified Enterprise" Enterprise", "Double-Soft Enterprise", "Innovative Entrepreneur Cultivation Enterprise", "Entrepreneurship Nanjing High-level Entrepreneurial Talent Introduction Enterprise", "National Industrial Information Security Monitoring Emergency Support Unit", "Top 10 Data Security Enterprises", "Key "Taxpaying Enterprise" and other honors, the company focuses on intelligent network security analysis and detection, provides comprehensive information security protection, and makes unremitting efforts to achieve the mission of "making security easier".
With advanced technology and high-quality services, the company's products currently serve more than 10,000 government and enterprise customers in education, medical, government, telecommunications, energy, finance and other industries , and more than 6,500 cloud hosting customers . The company's business covers 31 provinces and cities across the country. Hong Kong region .

おすすめ

転載: blog.csdn.net/juminfo/article/details/134063744