Welcome Customer !

Membership

Help

Beijing Tianda Qingyuan Communication Technology Co., Ltd
Custom manufacturer

Main Products:

ybzhan>Products

Beijing Tianda Qingyuan Communication Technology Co., Ltd

  • E-mail

  • Phone

  • Address

    6th Floor, Building D, No. 31 Jiaoda East Road, Haidian District, Beijing

Contact Now

Web page tamper proof protection system

NegotiableUpdate on 05/02
Model
Nature of the Manufacturer
Producers
Product Category
Place of Origin
Overview
The TDGuard webpage tamper proof protection system adopts the most advanced system driver level file protection technology currently available. Based on an event triggered monitoring mechanism, it efficiently implements webpage monitoring and protection functions, completely eliminating the possibility of website being illegally tampered with
Product Details
Web page tamper proof protection system

天大清源网页防篡改保护系统

The TDGuard webpage anti tampering protection system adopts the most advanced system driver level file protection technology, based on event triggered monitoring mechanism, efficiently realizes webpage monitoring and protection functions, and completely eliminates the possibility of website being illegally tampered with. Its performance, flexibility, and security are far superior to traditional protection technologies, supporting various web formats and occupying minimal system resources, less than 2%. It does not require additional devices and does not change the existing network architecture. The system also supports automatic publishing of web pages and various remote management functions. TDGuard has become the preferred security product for anti tampering protection of websites of domestic governments and various enterprises and institutions.

Traditional web page protection technologies include polling detection technology, embedded technology, event triggering mechanism, etc. Extensive practice has shown that polling detection technology has low detection efficiency, consumes a large amount of server load and bandwidth resources, and cannot completely prevent external access to illegally tampered websites in a short period of time. It is the first generation of web page anti tampering technology. In the past, when bandwidth resources were relatively scarce and application systems had limited system application resources, it could not restore web pages in real time and often lagged behind; With the development of technology, various applications running on websites are gradually increasing, and server load will be the biggest challenge faced by webpage anti tampering technology. The application of embedded technology reduces the probability of tampering to a certain extent, but its deployment method is relatively complex. The choice of encryption algorithm seriously affects the server load, and there are often a large number of externally inaccessible webpages, which belongs to the second generation monitoring technology; The event triggered mechanism has been widely proven to be the least load detection technology for servers. It is simple, mature, and reliable, and has become the most mainstream detection technology at present. Combined with the event triggered mechanism, the file filtering driver level multi factor detection technology is a third-generation new anti tampering technology. Through the underlying file driver technology, it fundamentally solves the accuracy of file detection and the protection of subfolders. The program runs a monitoring program in the background, and once a file change is detected, it immediately blocks illegal change attempts, ensuring good efficiency and security. It can provide good protection for large and medium-sized websites.

Key advantages:

1. Advanced technology, adopting third-generation tamper proof technology, mature, stable, and reliable;

2. High efficiency, consuming less than 2% of server resources, far higher than similar products;

3. Drawing on the suggestions of network administrators, the operation is extremely simple, greatly improving the efficiency of staff.

Main features:

1. Based on event triggering mechanism, save server resources;

2. Based on driver level file protection technology, supports various formats, including various dynamic pages;

3. Support large-scale deployment of virtual machines and hot backup website systems;

4. Support classification of webpage format types for easy classification protection;

5. Support tampering detection in offline state and automatic backend operation;

6. Fully protected technology, supporting large-scale continuous tampering attack protection;

7. Support process blacklist and whitelist management to prevent illegal program execution;

8. Support backup trusted end security protection;

9. Real time monitoring to completely prevent tampered content from being viewed by the outside world;

10. Support server performance monitoring and threshold alarm function;

11. Support separate file tampering protection;

12. Support folder tampering protection;

13. Support multi-level directory folder content tampering protection;

14. Support remote file synchronization function, remote directory protection and recovery function;

15. Support multiple automatic file upload methods and manual synchronization methods;

16. Support SQL injection attack protection;

17. Support cross site scripting attack protection;

18. Support access protection for system files;

19. Support URL utilization protection composed of special characters;

20. Support access protection for hazardous system paths;

21. Support the construction of dangerous cookie attack protection;

22. Variant protection against various types of attacks.

Management characteristics:

1. Fully support cross platform unified management function;

2. Support automatic webpage upload function without manual intervention;

3. Support multi role user management function;

4. Automatically detect file system changes and log them in real-time, supporting breakpoint resume function;

5. Support functions such as message alerts, sound alerts, email alerts, or customized SMS alert modules;

6. Implement a complete audit function for website content modification records, supporting filtering and export queries;

7. Support functions such as automatic synchronization and modification of web pages;

8. The C/S structure of the system ensures high reliability;

9. Support multiple remote management functions of the server, such as remote takeover, remote wake-up, remote shutdown, remote user logout, etc;

10. Support multiple policy management, policy settings support immediate effectiveness, no need to restart;

Flexible deployment:

1. Support multi site distributed deployment and unified centralized management function;

2. Easy deployment without changing the existing network architecture;

3. Support server redundancy dual machine and load balancing distribution;

4. Support user authentication, use encrypted transmission, secure and reliable;

5. Encrypt the transmission process to prevent eavesdropping and tampering.

天大清源网页防篡改保护系统