Industrial monitoring and situational awareness platform
Centralized safety management system
Industrial safety isolation network gate system
Industrial safety audit system
Industrial control honeypot system
Industrial asset exploration and full life cycle management system
UHC Security Audit protection system
The host security hardening system
Industrial network security terminal gateway system
Industrial Safety assessment System
Vulnerability information base
Industrial control safety risk assessment services
Industrial control assets sorting and full life cycle management services
Industrial control security penetration services
Industrial control safety active defense services
Industrial control security border protection services
Industrial control safety operation services
Training actual combat parallel simulation laboratory construction services
Cyberspace security wall chart prevention and control platform
Website cloud protection platform
Fishing drill service platform
Application host Integrated protection system G01
Network asset mapping analysis system D01
Internet exposure asset risk dynamic monitoring system FD01
Network violation external audit system E01
Network attack blocking system K01
2018年6月,The General Office of the State Council issued the Implementation Plan for Further Deepening the "Internet + Government Services" and Promoting the "One Network, One Door, One Time" reform of government Services,Aims to further deepen the "Internet + government services",Make full use of information technology to solve the problems of difficult, slow and complicated work, which are strongly reflected by enterprises and the masses。The plan proposes to deepen the reform of "decentralization service", further promote the "Internet + government services", accelerate the construction of a national integrated online government service system, and promote cross-level, cross-regional, cross-system, cross-department, cross-business collaborative management and services。
There are problems of "unclear information assets, unclear equipment distribution, and unknown vulnerability risks";
Host defense is weak, it is difficult to prevent zero-day vulnerability attacks, and lack of disposal measures after being invaded;
Lack of means to detect attacks quickly and deal with them immediately;
It can effectively solve the invisible problem of e-government and Internet, and make the assets of cyberspace controllable, manageable and visible;
It can effectively and quickly discover and locate network attack behaviors, respond to and dispose of them in time, and achieve early detection, early prevention, early disposal and early treatment;
It can effectively improve the emergency response ability of each business department to security incidents