Product overview Please call me: 0577-56996999.
Product introduction
Venus virtual network security management system consists of three parts: server system, security bridge and client system. Simple and fast deployment, powerful, suitable for government, military, industry and enterprises. Especially for the units with complex network structure, many access modes, wide network coverage and difficult client maintenance, the use of this system will greatly improve the network security performance and greatly reduce the network management cost.
The network security problem is almost insoluble in the existing computer network architecture. The root cause is that users often put applications with different security levels on a network. According to the "short board" principle, naturally the security level of this network is the security level of the application with the lowest security level. For example, browsing information online is an application with low security level, while online banking or scientific research and development is an application with high security level. If these two applications run on the same network at the same time, then the overall security level of this network is the security level of this application. In this case, no matter how strict your management is and how powerful your security measures are, it is almost in vain.
Network virtualization is the direction of future network development and will lead the technical direction to solve network security problems. Venus network security management system can virtualize the existing network without changing the existing network topology and increasing the existing network equipment. It can build multiple isolated and independent virtual networks on a physical network as needed, and various applications with different security levels can run on different virtual networks, which solves the problem that the existing computer network architecture cannot solve.
The network virtualization of Venus network security management system is very thorough, including the virtualization of terminal computers. You can virtualize a computer into several independent and isolated virtual computers as needed. Different virtual computers run different applications and store them independently. Even if one virtual machine is poisoned and crashes, it will not affect other virtual machines.
On the basis of network virtualization, Venus network security management system includes almost all commonly used network security management functions, including network access control, intrusion monitoring and prevention, flow control, computer IT asset management, ARP attack prevention, IP centralized management, computer peripheral centralized control, Internet monitoring management, computer recovery and restoration, computer remote service, etc.
product value
product value
Greatly reduce the customer information cost.
The higher the degree of informatization, the higher the investment in informatization. Users continue to purchase powerful network equipment such as switches and routers to plan the network and expand the scale; Continuously invest in network security products such as firewall, waterproof wall, intrusion detection system, security audit system, desktop security system and network security antivirus software; In order to isolate multiple networks, we must buy network isolation equipment, new computer equipment and duplicate network layout. In order to maintain the whole network, we have to invest a lot of maintenance engineers. But all the investment seems to have no end in sight.
The Venus system will change this situation. You don't have to pay expensive fees to buy powerful high-end switches, you just need the simplest network equipment to build a physical network, and all the remaining problems, including network transformation, network security and network maintenance, are solved by Venus.
Fundamentally solve the problems of network security and computer security.
1) On-demand networking: build an isolated business network at will without any additional cost;
2) Information security: Even if the computer is stolen, employees leave their jobs or the hard disk is unplugged, information will never be leaked, lost from the Internet or copied away;
3) computer security: the computer will never crash, and the operating system data will never be lost without reloading;
4) Mobile office security: people who are away on business can still safely enter the intranet office.
Greatly improve the efficiency of information operation and enhance the core competitiveness of customers.
1) It only takes 5 minutes to set up a new network, using a mouse and keyboard;
2) It only takes 3 minutes to re-plan a department and modify the network rules;
3) It only takes 2 minutes to remotely repair a crashed machine;
4) It only takes 1 minute to transfer a person's work and change his computer use right;
Product advantage
product features
The world's leading network virtualization technology;
At present, the forms of virtual networks in the world are VPN, VLAN and so on. These virtual network technologies virtualize some network resources, VPN virtualizes transmission channels, VLAN virtualizes network topology, and so on. Venus virtual network technology is far original for the company, aiming at the virtualization of the whole network, including the virtualization of computers, so the degree of virtualization is the most thorough.
On-demand networking fundamentally solves the network security problem;
According to the application requirements, this is the only way for network security. Venus system can set different virtual networks for different applications, set different security policies for different virtual networks, and formulate different security levels, which makes it possible to fundamentally solve network security problems.
Powerful centralized resource management function:
Whether it is network access rules, computer network access rights, client's online behavior, client's peripheral resources, or even all software and hardware resources, it can be centrally controlled and managed.
Suitable for all kinds of complex networks:
This system has nothing to do with network topology, network hardware equipment and network access mode. Whether it is dial-up access, VPN access or optical fiber access, whether it is Internet, MAN or LAN, this system can be used.
product function
product function
Computer virtualization
A physical computer can be virtualized into several independent and isolated virtual computers. Different virtual computers have different storage space, different equipment resources and different network access rights, just like different physical computers. One of the virtual machines is poisoned or even crashes, which will not affect other virtual machines. According to the needs, different applications can be run on different virtual computers, such as scientific research computers, internal office computers, internet computers and so on.
Network virtualization
A physical network can be virtualized into several independent and isolated virtual networks. Different virtual networks have different network topologies, different network equipment resources and different network access rules, just like different physical networks. One of the virtual networks is attacked or even crashed, which will not affect other virtual networks.
Multi-network (internal and external networks) isolation and switching
Using virtual network and virtual computer technology, complete multi-network isolation can be realized. This isolation forms a number of isolated physical networks, and the slave network equipment, transmission lines and terminal storage resources are all isolated. It has many advantages:
1) has low networking cost. Rebuild the existing physical network, and any number of networks can be set up with a set of network equipment and a set of computers without increasing network equipment.
2) convenient networking. Without the traditional networking mode, a new network can be established by moving the mouse, and the network topology, network access rules and network members can be modified at any time. Realize networking at any time and on demand! Don't worry about frequent department changes and business restructuring in the unit.
3) Switch security. Users only need to switch to different virtual machines to enter different networks. It is no longer necessary to purchase multiple terminals or hard disk isolation cards to switch networks. Because of the thoroughness of Venus virtualization, this switch is very safe.
Centralized control of network access rules
Network administrators can use this system to centrally manage all virtual subnets, including the network access rules of each subnet, each computer and each virtual computer. Network access rules include the settings of IP network segments, protocol types and ports that can communicate. Because Venus system can establish an independent network for an application, Venus system can define a separate network access rule strategy for an application!
Client flow control
By analyzing the client traffic and branch network bandwidth traffic in the network, we can detect the packet rules and prevent illegal intrusion and abuse of network resources.
ARP attack defense
We can find malicious ARP spoofers in the intranet, locate the "broiler" attackers in the intranet in real time, ensure that the terminal machine is not disturbed and attacked by ARP spoofing, ensure the normal and stable network communication, and quickly assist managers in locating problems in the network.
Internet behavior monitoring
Can monitor employees' online behavior, including when they can surf the internet and which websites they can go to; Can you chat, play games, speculate in stocks and so on with QQ?
Server intrusion detection and defense
Venus security bridge can protect the server and prevent illegal users from invading. No matter the intrusion from the internal network or the external network, it will prevent the Venus Bridge and make the server safe and worry-free.
Centralized management of computer assets
It can automatically collect the software and hardware information of the client, automatically discover the changes of various software and hardware assets and prevent the loss of assets.
Centralized control of computer peripheral equipment
Monitor the peripherals of each virtual computer (including: USB, infrared, serial port, parallel port, floppy drive, optical drive, wireless, Bluetooth, keyboard and mouse, printer, etc.). ). Monitoring types include: no access, read-only access and full access. Peripheral management can be carried out according to different applications, such as the same computer. When dealing with core business, you can't use USB, CD-ROM drive or floppy drive to prevent core data from being stolen. When switching to an external network, all ports can be opened.
Secure mobile office
VPN technology only solves the transmission security problem of mobile office. In fact, the biggest insecurity of mobile office comes from the uncontrollable mobile terminal computer.
Venus system will not reduce the security level because of mobile office. Mobile virtual computers that can access the company's core business network can still enter smoothly. But this virtual computer is controlled by the Venus system no matter where it is and under what network environment. Even if the hard disk is removed, other computers can't read the core data.
User access mechanism and private server restrictions
Implementing the user computer access mechanism can effectively manage the terminal computer. All clients can only enter a certain (virtual) network after authentication, and unauthenticated clients are not allowed to connect to the network, so that the running status of clients can be known in real time and managed. The access mechanism not only protects the server, but also protects every client computer that enters the network.
Some units have large networks, which are the structure of metropolitan area networks. Venus system can prevent unauthorized use of this network to set up servers and prohibit unauthorized business or non-business activities.
IP address bundling and centralized configuration management
Venus system can uniformly configure the IP addresses of computers in the private network, and monitor and manage them.
1)IP address unified configuration: the network administrator remotely configures the IP address and unifies the unique identification code of each terminal computer with the IP address.
2) No modification of IP address: The terminal computer's IP address modification authority can be disabled, and the terminal computer without modification authority cannot modify its own IP address at will.
3) Interception of illegal IP: The terminal computer with illegal IP will be forced to disconnect its network connection, making it unable to access any resources except this computer.
Computer recovery and recovery
Venus system has the special function of computer recovery, and its performance exceeds any computer recovery product on the market at present.
Venus system has the special function of computer recovery, and its performance exceeds any computer recovery product on the market at present.
1) Non-redundant system backup. The "computer dynamic time point creation technology" independently developed for the network is equivalent to establishing a time axis for the (virtual) computer, and users can increase the restore point at any time. The system does not need real backup, so there will not be a lot of storage space redundancy.
2) Multiple recovery points. Unlike recovery software or recovery cards on the market, it only supports one restore point. This feature can support up to hundreds of restore points.
3) Not afraid of plane collision. A poisoned or even crashed (virtual) computer can quickly return to normal without reinstalling the operating system.
4) Full recovery. At present, all the restore software on the market can only restore the system disk. This function can not only restore the system disk, but also restore the non-system disk. Therefore, viruses residing on non-system disks will also be removed.
5) lossless recovery. At present, all recovery software on the market will lose data once the system is restored. This function will not lose data after restoring the system. You can use the data tunnel function provided by this system to get the data back.
Computer remote service
Support remote desktop, with a powerful instant messaging system, information center managers can manage every client computer within their jurisdiction without leaving home. Can remotely carry out computer recovery, host audit and various consulting services.
1) supports remote calling and remote assistance.
2) Support automatic queuing of service requests.
Support powerful voice, video, text and file transmission.
Welcome to call me: 0577-56996999