Shen Xin Technology Co., Ltd. is a product and service provider focusing on enterprise security, cloud computing and IT infrastructure.
2. Qi Anxin
Focus on the cyberspace security market and provide a new generation of enterprise-level network security products and services for government and enterprise users. With continuous R&D and innovative security capabilities with actual combat attack and defense as the core, it has developed into a leading network security provider based on big data, artificial intelligence and security operation technology in China.
3. Venus Star Information Technology Group Co., Ltd..
A comprehensive provider of network security products, trusted security management platforms, security services and solutions with completely independent intellectual property rights. It has achieved coverage in the fields of network security, data security and application business security, and formed an information security industry ecosystem.
4. Tian Rongxin (Nanyang)
China's leading provider of network security, big data and secure cloud services. Take the lead in launching independent intellectual property firewall products to fill the gap in China, and independently develop the first ASIC architecture firewall in China, from the world's first new generation trusted parallel computing security platform to the cloud era super 100 G rack-mounted "Qingtian" security gateway.
5. Mayabak
Now it has grown into a leading electronic data forensics industry in China, a leading public security big data enterprise, and an expert in cyberspace security and big data intelligence. Its business scope has expanded from the traditional network security department to the industries of supervision commission, taxation, customs, municipal supervision, emergency response, etc., and has continuously extended to the civilian market, covering all provinces, municipalities, autonomous regions and parts of the country.
6. Blue Shield shares
The company has built a complete business ecosystem based on security products, covering security solutions, security services and security operations, providing one-stop information security solutions for customers in major industries. At the same time, aiming at the expanding trend of information security extension, the company continued to promote the development strategy of "big security" industry through the two-wheel drive mode of "independent research and development+investment merger and acquisition", and laid out the layout with the three dimensions of "technology upgrading", "space expansion" and "IT level breakthrough" as the main line, and built a complete ecological map of "big security" industry.
7. Lumeng Technology
Provide full-line network security products, all-round security solutions and systematic security operation services. The company has established overseas subsidiaries in Silicon Valley, Tokyo, London and Singapore to deepen its global business and establish a China brand in the global network security industry.
8. Ren Zixing
It is one of the earliest enterprises in China to set foot in the field of network information security, and is committed to protecting the network information security of state management institutions, operators, enterprises, institutions and individuals.
9. Anheng Information
The main business is the research and development, production and sales of network information security products, providing customers with professional network information security service. Products and services involve application security, big data security, cloud security, Internet of Things security, industrial security and industrial Internet security.
10, Shanshi Net Guest
We have been focusing on the innovation of cutting-edge technologies in the field of network security, providing network security products and services including border security, cloud security, data security and intranet security, and are committed to providing users with all-round, smarter and zero-disturbance network security solutions.
What is the working principle of the network gate?
Cut off the common protocol connection between networks; Decompose or recombine the data packet into static data; Security review of static data, including network protocol check and static code analysis; Confirmed safety data flows into the internal unit; Internal users obtain the required data through strict authentication mechanism.
What is a gateway?
Gateway exchanges data between two different security domains by protocol conversion, and only the information explicitly requested by the system can pass. Its information flow usually serves general applications. Note: the word "door" of the gate is taken from the meaning of lock. In the process of information ferry, the internal and external networks (upstream and downstream) have never been physically connected, so the gate product must have at least two sets of hosts and one physical isolation component to complete the physical isolation task.
At present, single-host gateway or filtering products with two or more processing engines in a single host are not real gateway products and do not meet the physical isolation standards. It is just a security product of packet filtering, similar to a firewall. Note: Single-host gateway mostly uses one-way gateway to hide people's eyes and ears.
Why use isolation doors?
When the user's network needs to ensure high-intensity security and exchange information with other untrusted networks, if the physical isolation card is used, it will not meet the needs of information exchange; If you use a firewall, you can't prevent the leakage of internal information and the penetration of external viruses and hacker programs, so there is no way to talk about security.
Promise. In this case, the isolation gateway can meet these two requirements at the same time, and avoid the shortcomings of physical isolation card and firewall, which is the best choice for data exchange between physically isolated networks.
What's the difference between an isolation gateway and a firewall?
There are mainly the following differences:
A. The isolation gateway adopts a dual-host system, with internal terminals connected to the protected internal network and external terminals connected to the external network. This dual-system mode completely protects the internal network, even if the external network is attacked or even paralyzed by hackers, it can't hurt the internal network. The firewall is a single host system.
B. The isolation gateway adopts its own defined private communication protocol, which avoids the loopholes of the general protocol. The firewall adopts the general communication protocol, namely TCP/IP protocol.
C. The isolation gateway adopts special hardware control technology to ensure that there is no real-time connection between the internal and external networks. The firewall must ensure real-time connection.
D. Any response of the isolation gateway to the external network is guaranteed to be a response to the request sent by the legitimate users in the internal network, that is, a passive response, while the firewall will not judge the external network response, that is, an active response. In this way, the gateway can avoid the attacks of Trojans and hackers.