Contact Us

Address: 1st Floor,Building 4, 1088th, Huyi highway, Shanghai
TEL:021-31080981
Email:soline@soline.com.cn
P.C.:201802

Internet Security Service

Service Description

      Internet security refers to the use of various technical software and hardware combinations and corresponding management measures to enable the normal operation of service systems exposed on the public network, and to ensure the availability, integrity and confidentiality of network data. The specific meaning of Internet security will change as the "angle" changes. For example: From the perspective of users (individuals, companies, etc.), they hope that information involving personal privacy or business interests will be protected by confidentiality, integrity and authenticity when transmitted on the public network. From the perspective of an enterprise, the most important thing is the security encryption and protection of internal information.

Service System

▽Access control: Through the establishment of an access control system for specific network segments and services, most attacks are prevented before they reach the target;

▽Check for security vulnerabilities: through periodic checks on security vulnerabilities, even if the attack can reach the target, most of the attacks can be invalidated;

▽Attack monitoring: through the establishment of an attack monitoring system for specific network segments and services, most attacks can be detected in real time, and corresponding actions can be taken (such as disconnecting the network connection, recording the attack process, tracking the source of the attack, etc.);

▽Encrypted communication: Active encrypted communication can prevent attackers from understanding and modifying sensitive information;

▽Authentication: A good authentication system can prevent attackers from impersonating legitimate users;

▽Backup and recovery: A good backup and recovery mechanism can restore data and system services as soon as possible when the attack causes losses;

▽Multi-layer defense, after the attacker breaks through the first line of defense, delay or block him from reaching the target;

▽Hide internal information so that the attacker cannot understand the basic situation in the system;

▽Set up a security monitoring center to provide security system management, monitoring, drainage protection and emergency services for the information system;

Service Steps

※Intrusion detection system deployment  


Intrusion detection capability is an important factor to measure whether a defense system is complete and effective. A powerful and complete intrusion detection system can make up for the relatively static defense of firewalls. Real-time detection of various behaviors from external networks and campus networks, timely detection of various possible attack attempts, and corresponding measures. Specifically, the intrusion detection engine is connected to the central switch. The intrusion detection system integrates intrusion detection, network management and network monitoring functions. It can capture all data transmitted between the internal and external networks in real time. It uses the built-in attack signature database and uses pattern matching and intelligent analysis methods to detect intrusions on the network. Behaviors and abnormal phenomena, and record related events in the database, as the basis for the network administrator’s subsequent analysis; if the situation is serious, the system can issue a real-time alarm so that the school administrator can take timely countermeasures.


※Vulnerability scanning system deployment


The most advanced vulnerability scanning system is used to conduct regular security inspections on workstations, servers, switches, etc., and provide system administrators with detailed and reliable security analysis reports based on the inspection results, which provides an important basis for improving the overall level of network security.

※Network version of anti-virus product deployment

In this network anti-virus program, we finally have to achieve one goal: to prevent virus infection, spread and outbreak in the entire local area network. In order to achieve this, we should take corresponding measures in the areas where the virus may be infected and spread in the entire network. Anti-virus means. At the same time, in order to effectively and quickly implement and manage the entire network's antivirus system, it should be able to realize multiple functions such as remote installation, intelligent upgrade, remote alarm, centralized management, and distributed detection and killing.

      With the rapid development of network technology and the rapid increase in network penetration, the potential threats facing the network are also increasing. A single protection product has long been unable to meet the needs of the market. The development of overall network security solutions has become an inevitable trend, and users are increasingly demanding pragmatic and effective overall security solutions. The overall security solution requires products to be more integrated, intelligent, and convenient for centralized management. Combining software and hardware, management strategies are integrated into the overall security solution. Faced with increasingly large and complex networks, relying only on traditional network security equipment to ensure the security and smoothness of the network layer can no longer satisfy the manageability and control of the network. Therefore, network management software represented by terminal access solutions began to integrate into the overall security solution. The terminal access solution starts by controlling the secure access of user terminals to the network, enforces user security policies on access user terminals, strictly controls terminal network usage behaviors, provides effective protection for network security, and helps users achieve more active security protection. Achieve the goal of efficient and convenient network management, and comprehensively promote the construction of the overall network security system.