Welcome Customer !

Membership

Help

Hangzhou Dipu Technology Co., Ltd
Custom manufacturer

Main Products:

ybzhan>Products

Hangzhou Dipu Technology Co., Ltd

  • E-mail

  • Phone

  • Address

    6th Floor, Zhongcai Building, No. 68 Tonghe Road, Binjiang District, Hangzhou City, Zhejiang Province

Contact Now

Operation and Maintenance Audit Management Platform

NegotiableUpdate on 12/13
Model
Nature of the Manufacturer
Producers
Product Category
Place of Origin
Overview
Operation and Maintenance Audit Management Platform DPtech OSP is a new generation of secure operation and maintenance audit product that integrates account management, identity authentication, single sign on, resource authorization, access control, and operation auditing. Being able to conduct effective operation and maintenance audits of government and enterprise IT assets, elevating operation and maintenance audits from event audits to operational content audits, comprehensively addressing government and enterprise operation and maintenance security management issues through pre prevention, in-process control, and post audit, thereby improving the IT operation and maintenance management level of government and enterprise. more
Product Details
PRODUCT FEATURES Product characteristics more
Support multi factor authentication The user login authentication method supports static password authentication, mobile dynamic password authentication, USB-KEY authentication, AD domain authentication, SMS authentication, national secret dynamic token authentication, Radius authentication, iris authentication and other authentication methods, and also supports combination authentication.
Support action flow configuration Support action flow configuration and provide extensive application access. No matter how the accessed resources design login actions, single sign on and audit access can be achieved through action flow configuration.
Support dual person authorization Support two person collaboration, access to critical equipment can only be achieved with mutual agreement of both parties, achieving mutual supervision and restraint between the main and deputy positions.
Support multi-level approval When critical resources are accessed, multiple levels of approval authorization can be customized. Only after passing each level of approval can the resources be accessed. Only when the minimum number of votes required for approval is reached can it be considered as approved at this level, thereby improving the security of critical device access.
Support automatic password change Provides a comprehensive automatic password change function, supporting custom password change cycles, password strength, and multiple password change methods.
Support command blocking Support the protection of resources through command approval, which means that when a command on the control list is requested to be executed, it can only be executed after approval. Otherwise, the command will be blocked, effectively controlling the execution of high-risk commands.
high availability Support dual machine hot standby deployment, providing users with a highly reliable and easy-to-use dual machine solution, with a primary and backup machine switching time of less than 3 seconds.
Emergency operation and maintenance In case of emergency, provide emergency operation and maintenance functions, bypass the access approval process for emergency operation and maintenance, and wait for the relevant approver to review after the operation and maintenance is completed.
<>
PRODUCT SPECIFICATION Product specifications more
PRODUCT FUNCTION Functional Value
account management Support monitoring and management of the entire lifecycle of master and slave accounts, reducing the difficulty and workload of device administrators managing a large number of user accounts, and developing unified and standardized account security policies for accounts
Authorization management Provide a unified interface for associated authorization of users, user groups, resources, and resource groups, combined with refined security authorization policies, to achieve fine-grained allocation of operation and maintenance permissions and maximize the protection of IT resource security
authentication management Support multiple authentication and combination authentication methods such as static password, dynamic password, USB-KEY, digital certificate, dynamic token, biometric, etc. The authentication transmission process is encrypted to ensure the security and reliability of authentication
Audit Management Provide various audit methods such as command audit, content audit, and video audit, with detailed operation audits for different devices and access methods, reproducing the operation process of operation and maintenance personnel in a real and intuitive way. The supported operation and maintenance protocols include Telnet, FTP, SFTP, SSH1, SSH2, RDP, VNC, etc
action flow Support action flow configuration and provide extensive application access. No matter how the accessed resources design login actions, single sign on and audit access can be achieved through action flow configuration
Password modification plan Support regular changes to the real password of the target device, and support custom password change cycles and password strength. The password change method supports manual specification of fixed passwords, generation of passwords through password tables, generation of random passwords based on device mounted password policies, and generation of the same password based on password policies
access control Support command approval rules, users need administrator approval before executing high-risk commands; Command approval rules can specify operation and maintenance personnel, access devices, device accounts, and command approvers
Audit Log Support keyboard, clipboard, window title, file transfer records, and when auditing and replaying graphic resources, playback can start from a specified location on a keyboard, clipboard, window title, or file transfer record
Compatible with IPv6 Fully supports IPv6, the device itself can configure IPv6 addresses for client access, and supports target devices to configure IPv6 addresses for single sign on and auditing
Client compatibility Fully supports Windows, Linux, domestic Kirin system, Android, IOS, Mac OS and other clients, achieving cross terminal adaptability BYOD (Bring Your Own Device)
Specialized software and hardware platform** A dedicated hardware platform using Feiteng CPU and Shengke exchange chip, with software platform authorized to use Kirin kernel

**This feature is only supported on specific models

Similar Product Recommend