当前位置:网站首页>Meichuang data security management platform has obtained the evaluation certificate of "data security product capability verification plan" of the Institute
Meichuang data security management platform has obtained the evaluation certificate of "data security product capability verification plan" of the Institute
2022-06-28 04:02:00 【database security】
In recent days, , China academy of information and communications ( hereinafter referred to as “ China Academy of communications ”) published “ Data security product capability verification plan ” The fifth issue of the list .
Meichuang data security management platform ( abbreviation :DSM) Successfully passed the test and obtained the data security product verification certificate , This certificate is the highest level certification for data security product inspection of China Academy of communications , It means that meichuang's data security control ability has been recognized by authorities .
This time 10 Among the manufacturers that have passed the inspection of data security products , have only 4 The company evaluates the ability of the data security management and control platform . Meichuang data security management platform relies on advanced product concepts , Pass the test . Besides ,DSM Also get 2022 Digital Fair “ Leading technology achievement award ” And so on .
Meichuang data security management platform is designed to solve the problem that various security platforms can not effectively cooperate 、 The cost of operation and management is increasing 、 Enterprises are unable to cope with increasingly complex security threats , Help users realize standardized asset management 、 Secure multi terminal linkage 、 Operational value-added enterprise level data security and efficient smart governance products . The product integrates full flow aggregated storage 、 Massive information processing and query 、 Identify and count all assets 、 User behavior (UEBA) In-depth analysis of 、 Big data real-time intelligent response and other functions , Help users make full use of user data security protection scenarios , The asset can be managed in the whole domain 、 Risk can be seen all over the world 、 Policy global linkage .
This evaluation focuses on verifying DSM The following function points
1、 Safety capability docking
DSM Support waterproof dam with database 、 Database firewall 、 Database security audit 、 Dynamic desensitization 、 Database transparent encryption 、 Noah anti blackmail 、 Data desensitization and data watermarking 、 Docking of dark data discovery and classification and grading products .
2、 Centralized configuration capability
DSM As a unified and centralized management center : Have global asset management 、 Identity global management 、 Centralized management of security tasks and policies .
3、 Centralized dispatching capability
DSM And the sub equipment have realized the issuance and implementation of security tasks and protection strategies , At the same time, it has the ability to monitor the scheduling execution status , Dispatch by issuing 、 The results are reported to a unified platform , Centralized supervision .
4、 Information sharing
By collecting information about endpoint components , Combine... From a global perspective UEBA Conduct comprehensive correlation analysis , At the same time, the analysis results are fed back to the endpoint components , Realize global information sharing , Improve risk identification ability .
Platform architecture
Product value
DSM Have centralized management of data security policies 、 Security incidents 、 Unified management and control of security risks 、 Centralized operation and maintenance capability ; It also provides assets 、 identity 、 Visual view after risk analysis , Break the isolated island of endpoint products , Realize centralized management .
1、 Centralized control
Linkage of all safety components , Achieve centralized asset governance 、 Identity governance and policy management 、 Risk management , Increased data security construction and maintenance costs , There is no need to repeat the configuration on the security component .
2、 Improve risk monitoring and protection capability
Collect the security logs of each perspective , Conduct global comprehensive correlation analysis , Realize the risk monitoring of the whole domain , Discover risks in time and provide timely protection to security components through information sharing . recycling UEBA Further research and judgment , Forecast risk , The detection rate of risks has been comprehensively improved .
3、 Sustainable operations
Integrated security situation 、 Risk monitoring 、 Emergency response 、 Safety control in one , Realize unified data security management and sustainable operation . Help enterprises to realize the global manageability of assets 、 Risk can be seen all over the world 、 Purpose of policy global linkage , Fully invigorate the user data security protection scenario .
except DSM Outside , At present, meichuang already has dark data discovery and classification and grading systems 、 Data desensitization system 、 The three products, including the database security audit system, passed the ICT Institute “ Data security product capability verification plan ” And get the certificate .
边栏推荐
- Market competitiveness of robot programming education
- 密码加密md5和加盐处理
- 歐洲家具EN 597-1 跟EN 597-2兩個阻燃標准一樣嗎?
- 开关电源—Buck电路原理及其仿真
- Backtracking maze problem
- JVM一:JVM入门以及Class文件认识
- 指针链表
- Understanding and learning of parental delegation mechanism
- Uncertainty principle
- How the uni app automatically switches the requested address according to the environment
猜你喜欢
One article tells you what kubernetes is
Chapter 14 AC-DC power supply front stage circuit note I
Particle theory of light (photoelectric effect / Compton effect)
How to write a software test report? Here comes the third party performance report template
开启创客教育造物学的领域
关于 SY8120I 的DC-DC的降压芯片的学习(12V降至3.3V)
django. core. exceptions. ImproperlyConfigured: mysqlclient 1.3.13 or newer is required; you have 0.9.3
基于正点原子stm32的mini板的TFTLCD显示实验
leetcode:494.数组中添加加减运算符得到指定值的所有方法
多项目设计开发·类库项目引入入门
随机推荐
解析STEAM教育框架下未来教师研究能力
Several ways of sharing printers in LAN
Chapter 1 Introduction to bash
MSC 307(88) (2010 FTPC Code) Part 9床上用品试验
数组的方法
How to modify a se38 editor theme
小程序image组件不显示图片?
leetcode:单调栈结构(进阶)
友链须知
Several important physical concepts
ELK 搭建日志分析系统 + Zipkin服务链路追踪整合
Arrangement of basic electrical knowledge (II)
以自动化赋能转型,飞鹤乳业加速迈向数字化!
Database migration
Notes to friendship chain
上线MES系统后,企业发生了这些变化......
机器人编程教育的市场竞争力
Uncertainty principle
01 MongoDB的概述、应用场景、下载方式、连接方式和发展历史等
等保三级密码复杂度是多少?多久更换一次?