Welcome Customer !

Membership

Help

Hangzhou Dipu Technology Co., Ltd
Custom manufacturer

Main Products:

ybzhan>Products

Hangzhou Dipu Technology Co., Ltd

  • E-mail

  • Phone

  • Address

    6th Floor, Zhongcai Building, No. 68 Tonghe Road, Binjiang District, Hangzhou City, Zhejiang Province

Contact Now

Huiyan Security Testing Platform

NegotiableUpdate on 12/13
Model
Nature of the Manufacturer
Producers
Product Category
Place of Origin
Overview
Huiyan Security Detection Platform is an active security management product independently developed by Dipu Technology based on industry regulations. Can serve as a supervisory and inspection tool for industry regulatory authorities, quickly identifying assets, accurately locating risks and hidden dangers, responding promptly to notifications, and promoting rectification; It can serve as a management and monitoring platform for industry-specific key information infrastructure, combined with security incidents, to help users sort out assets, assess the impact of vulnerabilities, quickly dispose of them, and form a security management loop. more
Product Details
PRODUCT FEATURES Product characteristics more
Asset mapping and analysis Relying on tens of thousands of asset fingerprint features, assets are quickly identified through active detection, effectively inventorying asset information including IP, MAC, device type, device manufacturer, software and hardware versions, open ports/services, etc., forming an asset information database. The platform can conduct analysis and statistics based on various dimensions of assets, and generate independent asset inventory reports.
Asset Vulnerability Detection The platform supports identifying various system vulnerabilities, middleware vulnerabilities, database vulnerabilities, cloud platform vulnerabilities, web vulnerabilities, industry-specific vulnerabilities (such as IPC vulnerabilities in video private networks, business platform vulnerabilities, etc.), as well as industry vulnerabilities ..
Automated vulnerability verification The platform supports simulating manual penetration testing to verify vulnerabilities and automatically determine their authenticity. Users can develop targeted vulnerability repair plans based on the detection results.
Boundary integrity detection Detect users' violations that undermine the integrity of network boundaries, such as private Internet access, private routing, dual use of one machine, use of portable WiFi, etc., and actively monitor the status of private network boundaries to prevent cross overs ..
Security centralized control management Support distributed deployment mode, achieve data collection and correlation through a centralized management platform, uniformly monitor the current asset security status of local and subordinate units, realize early warning notification, special investigation, and comprehensive display.
Security situation analysis In response to the discovered asset risks, the platform provides data analysis and display from various dimensions, allowing users to quickly understand the overall security status of cyberspace assets from the display screen
<>
PRODUCT SPECIFICATION Product specifications more
PRODUCT FUNCTION Functional Value
Industry based asset identification capability Through the asset recognition engine independently developed by Dipu Technology, fingerprint extraction and analysis of unique assets in various industries can be carried out to quickly discover existing network surviving devices and display them with refined asset information.
Industry Vulnerability Special Testing Combining the vulnerability mining achievements of Dipu Technology in various industries, as well as the latest security vulnerabilities disclosed in the industry, users can choose to detect the required vulnerabilities for investigation and quickly identify asset risks.
Simulate artificial infiltration The platform uses simulated manual methods to analyze vulnerabilities, and the entire process does not require user participation. It automatically verifies, judges, and finally generates a detection report containing the results of vulnerability verification. Users discover exploitable vulnerabilities, expose risks, and urge rectification.
Violation of external contact detection The platform can construct external network messages and perform boundary security checks on the entire network through active detection technology, ensuring the integrity of user network boundaries without the need to install any plugins.
Industrial safety knowledge base Based on DeepTech's in-depth research on security pain points and risk hazards in various industries, we provide users with tools and methods for vulnerability discovery, exploitation, and reinforcement, enabling industry users to improve their own security operation and maintenance capabilities.
Customized security report The platform can provide customized security reports with industry attributes. Through interactive design, it improves the report reading experience for industry users and allows them to intuitively understand their own security status.
Support large-scale object detection The platform supports detection tasks based on A/B/C segments, and greatly improves detection efficiency and reduces personnel time costs in scenarios with massive assets through multi task and multi-threaded detection modes.
Easy to operate platform The platform operation process for ordinary users does not exceed 5 steps, and supports the activation of expert configuration mode, allowing operators to quickly get started using it.
Specialized software and hardware platform** A dedicated hardware platform using Feiteng CPU and Shengke exchange chip, with software platform authorized to use Kirin kernel

**This feature is only supported on specific models

Similar Product Recommend