Welcome Customer !

Membership

Help

Hangzhou Dipu Technology Co., Ltd
Custom manufacturer

Main Products:

ybzhan>Products

Hangzhou Dipu Technology Co., Ltd

  • E-mail

  • Phone

  • Address

    6th Floor, Zhongcai Building, No. 68 Tonghe Road, Binjiang District, Hangzhou City, Zhejiang Province

Contact Now

Network Security Risk Management Platform

NegotiableUpdate on 12/13
Model
Nature of the Manufacturer
Producers
Product Category
Place of Origin
Overview
Dipu Technology Network Security Risk Management Platform is a product that helps users achieve asset mapping, vulnerability awareness, and operational management. The platform is based on secure big data analysis technology, and through active detection mechanisms, relies on visualization technology to achieve early warning and information notification of network security risks, implement the main responsibility of network security supervision, and achieve a closed-loop network security management. more
Product Details
PRODUCT FEATURES Product characteristics more
Asset mapping By combining active detection mechanisms with massive asset fingerprint libraries, IT assets can be accurately identified, including various business systems, IoT terminals, industry-specific devices, etc; Based on the zero trust security concept, utilizing real-time data collection technology ..
Vulnerability awareness Combined with a powerful vulnerability discovery engine, it identifies various industry-specific vulnerabilities, system vulnerabilities, middleware vulnerabilities, database vulnerabilities, web vulnerabilities, and cloud platform vulnerabilities, and simulates human infiltration to exploit these vulnerabilities ..
Operation Management Monitor the overall assets and risk situation of cyberspace from a macro perspective, and associate it with specific organizational structures and responsible persons to achieve suspicious asset reporting, vulnerability rectification reporting, industry violation reporting, and high-risk prediction ..
Industry compliance Based on industry standards, establish an internal compliance and security baseline model to monitor the compliance status of operation and maintenance personnel in real-time. For example, if high-risk ports are opened and device policies are changed, an alarm will be triggered in a timely manner ..
Visualization Analysis Present the network space assets and risk status from multiple dimensions such as risk level, asset type, responsible party, open services, production time, and geographical location; Provide information on asset health status, progress of vulnerability rectification, and performance ..
<>
PRODUCT SPECIFICATION Product specifications more
PRODUCT FUNCTION Functional Value
Mapping of Cyberspace Assets The platform has professional asset discovery and fingerprint collection capabilities, based on probe collection technology to achieve comprehensive network space data collection, and constructs "one machine, one file" asset ownership data for users according to industry organizational structure, hierarchical relationships, etc
Asset access risk management Conduct full security control over non compliant phenomena such as private connections and impersonation of network assets that have frequently occurred in the past network scenarios
Industry compliance baseline management Help users quickly establish a baseline management mechanism that is close to the industry, effectively perceive and prevent baseline security risks caused by personnel misoperation or malicious operations during the operation and maintenance process, and quickly recover
Vulnerability closed-loop management With the goal of a closed-loop system, establish management processes from various stages such as vulnerability discovery, alerting, notification, rectification, review, and re examination to supervise the closed-loop work of vulnerability rectification. The process is visualized and the results are quantifiable
Security situation analysis Help users perceive changes in cyberspace assets in real-time and dynamically monitor potential risks and hazards on assets. Security can be objectively evaluated from a global perspective, or from a micro perspective to understand the security situation of each organization or asset
Remote security reinforcement The platform provides remote reinforcement capability, which can remotely upgrade patches, close illegal ports, modify security policies, etc., comprehensively improving user operation and maintenance efficiency
Support distributed deployment Based on big data technology architecture, the platform can support real-time data collection and analysis of>500 probes, and the analysis capability can be continuously expanded to achieve millisecond level massive data queries and correlation analysis
System security The security risk control platform and detection probes use a private secure transmission protocol based on national encryption algorithms for data communication, and support digital certificates adapted to the industry. At the same time, administrators can set different user roles with different permissions. Comprehensively enhance the platform's own security capabilities to prevent the risk of sensitive data leakage
Specialized software and hardware platform** A dedicated hardware platform using Feiteng CPU and Shengke exchange chip, with software platform authorized to use Kirin kernel

**This feature is only supported on specific models

Similar Product Recommend