Independent development of proprietary real-time operating kernel
The protocol based on the underlying network is adopted, which is compact and real-time.
Ensure the safety, efficiency and integrity of the system.
Dedicated drivers and real-time memory management
Independently developed dedicated embedded security middleware, web middleware and database middleware.
It has the characteristics of small volume, high efficiency and strong openness
The relationship among performance, openness and space is considered.
Make full use of multi-process, * * * memory technology and various buffering technologies to ensure speed.
Various patent algorithms trigger seven-level allocation buffer algorithm.
Three-dimensional dynamic protocol matching algorithm
Hierarchical token bucket filtering algorithm
Packet filtering index algorithm
File hash storage algorithm
Fast parsing and caching algorithm of IP packet
Various unique technologies, reverse trigger remote assistance technology
Zero copy technology based on DMA
Dynamic protocol identification technology
The second advantage: the most comprehensive illegal address database in China.
More than 70 categories, the most comprehensive database of violent, pornographic, spy and virus websites, and can automatically learn and update constantly, effectively protecting the network.
The most practical protocol feature library
15 big classification 100 small classification integrates p2p, IM and streaming media strategies.
Powerful QOS management function
Any characteristics of people, departments, policies, file types, websites, ip and services can be controlled.
The third advantage: the highest matching and easy installation.
Bypass, bridge, NAT, proxy
Distributed \ Centralized \ Stacked \ Hot Standby and Multiplexing
High scalability
The fourth advantage: the most comprehensive authentication and authorization method.
Nearly 20 binding methods: Ip? Mike. Host name? ldap? The local radius AD http uses the Usb key client program.
Best completely seamless one-time authentication technical support: AD httpauth pop3.
Fifth advantage: powerful data center and various data storage and backup methods.
Strong data redundancy: 1) The audit center is easy to use 2) The only data center with both built-in and external facilities can meet the requirements of any organization for long-term mass data storage.
Powerful search and export capabilities: 1) Accurate search of any element 2) Support fuzzy search similar to search engines.
3) Support full-text retrieval including doc\ppt\txt\excel, etc. 4) Support ftp, file sharing, pop3 interface and other backup methods.
The sixth advantage: the most complete qualification.
Software Copyright of "Golden Shield Network Behavior Management System"
Software Product Certification of "Golden Shield Network Behavior Management System"
Evaluation Report of Shanghai Key Laboratory of Computer Software
Evaluation report of three computer security products of the Ministry of Public Security
Sales license of computer security products of the Ministry of Public Security
Software Enterprise Certification of Ministry of Information Industry
2007 Webmaster's World Editor's Choice Award
2007 China Safety Information Network Editor's Recommendation Award
Authentication and Sales License of Internet Audit Management System of Ministry of Public Security
Product inspection certificate of classified information system of State Secrecy Bureau
In 2008, it was funded by the National Science and Technology Innovation Fund for SMEs.
The most recommended products of global webmasters in 2009
Excellent solutions for computer security protection in 2008
Seventh feature: proven.
Thousands of high-quality users choose Golden Shield, and the test of various complex network environments makes Baochuang occupy the first place in the high-end market of network behavior management! !