Management Orientation of Gu Shan Innovation Network Technology Co., Ltd.

The company's business orientation is-information security solutions and service providers, and its key business is the construction of e-government system with security characteristics.

The main business includes: network security consultation, evaluation, design, training and construction, overall information security scheme, classified network system, high-end network integration, network security service, e-government software development, high-end IT service of database minicomputer, etc.

The main products include: firewall, VPN, router, switch, network antivirus, security isolation, CA certification, security scanning, intrusion detection, encryption machine, data backup, website monitoring and recovery, minicomputer, server, database and so on.

The core competitiveness of the company's business is the construction of confidential information system; The network security service provider NSSP proposed by the company is one of the earliest companies providing network security services in China. Security services mainly include:

Safety policy formulation

Customer network information security environment, application requirements analysis and function analysis

General principles of information security, security management system, policy implementation and inspection and handling guidelines

Security risk assessment, audit and inspection

Analyze the hidden dangers of customers.

Vulnerability scanning and analysis of network equipment, operating system, network and application services

System vulnerability repair and reinforcement

Operating system, network equipment, database, cgi program.

Firewall configuration and optimization, etc.

Emergency response service

Emergency response services, intrusion analysis, finding back doors and preserving evidence.

Restore customers' normal network, eliminate hidden dangers and give security solutions.

Security network outsourcing service

Risk assessment, system recovery, reinforcement and optimization

Safety consultation, technical support, remote management and safety training.

Authorization attack and detection

Check the security of the customer network.

Test the customer's network security capability.

The corresponding system repair suggestions are given.