What are the product advantages of Shanghai Baochuang Technology-Golden Shield Online Behavior Management?

The first advantage: advanced technology

Independent development of proprietary real-time operating kernel

The protocol based on the underlying network is adopted, which is compact and real-time.

Ensure the safety, efficiency and integrity of the system.

Dedicated drivers and real-time memory management

Independently developed dedicated embedded security middleware, web middleware and database middleware.

It has the characteristics of small volume, high efficiency and strong openness

The relationship among performance, openness and space is considered.

Make full use of multi-process, * * * memory technology and various buffering technologies to ensure speed.

Various patent algorithms trigger seven-level allocation buffer algorithm.

Three-dimensional dynamic protocol matching algorithm

Hierarchical token bucket filtering algorithm

Packet filtering index algorithm

File hash storage algorithm

Fast parsing and caching algorithm of IP packet

Various unique technologies, reverse trigger remote assistance technology

Zero copy technology based on DMA

Dynamic protocol identification technology

The second advantage: the most comprehensive illegal address database in China.

More than 70 categories, the most comprehensive database of violent, pornographic, spy and virus websites, and can automatically learn and update constantly, effectively protecting the network.

The most practical protocol feature library

15 big classification 100 small classification integrates p2p, IM and streaming media strategies.

Powerful QOS management function

Any characteristics of people, departments, policies, file types, websites, ip and services can be controlled.

The third advantage: the highest matching and easy installation.

Bypass, bridge, NAT, proxy

Distributed \ Centralized \ Stacked \ Hot Standby and Multiplexing

High scalability

The fourth advantage: the most comprehensive authentication and authorization method.

Nearly 20 binding methods: Ip? Mike. Host name? ldap? The local radius AD http uses the Usb key client program.

Best completely seamless one-time authentication technical support: AD httpauth pop3.

Fifth advantage: powerful data center and various data storage and backup methods.

Strong data redundancy: 1) The audit center is easy to use 2) The only data center with both built-in and external facilities can meet the requirements of any organization for long-term mass data storage.

Powerful search and export capabilities: 1) Accurate search of any element 2) Support fuzzy search similar to search engines.

3) Support full-text retrieval including doc\ppt\txt\excel, etc. 4) Support ftp, file sharing, pop3 interface and other backup methods.

The sixth advantage: the most complete qualification.

Software Copyright of "Golden Shield Network Behavior Management System"

Software Product Certification of "Golden Shield Network Behavior Management System"

Evaluation Report of Shanghai Key Laboratory of Computer Software

Evaluation report of three computer security products of the Ministry of Public Security

Sales license of computer security products of the Ministry of Public Security

Software Enterprise Certification of Ministry of Information Industry

2007 Webmaster's World Editor's Choice Award

2007 China Safety Information Network Editor's Recommendation Award

Authentication and Sales License of Internet Audit Management System of Ministry of Public Security

Product inspection certificate of classified information system of State Secrecy Bureau

In 2008, it was funded by the National Science and Technology Innovation Fund for SMEs.

The most recommended products of global webmasters in 2009

Excellent solutions for computer security protection in 2008

Seventh feature: proven.

Thousands of high-quality users choose Golden Shield, and the test of various complex network environments makes Baochuang occupy the first place in the high-end market of network behavior management! !