The so-called traditional information security products refer to those information security products with a single function. They generally include:
User identity authentication, such as static passwords, dynamic passwords (SMS passwords, dynamic passwords) Password token, mobile phone token), USB KEY, IC card, digital certificate, fingerprint iris, etc.
Firewall: an access control system that sets up barriers between the internal network and the insecure external network to prevent illegal access to internal resources from the outside and prevent unsafe access from the inside to the outside. But it may have security issues of its own and may also be a potential bottleneck.
Secure router: Because WAN connections require dedicated router equipment, network transmission can be controlled through the router. Access control list technology is usually used to control network information flow.
Security server: The security server mainly focuses on the security and confidentiality of information storage and transmission within a local area network. Its implementation functions include the management and control of local area network resources, the management of users in the local area network, and all security in the local area network. Auditing and tracking of relevant events.
Security Management Center: Since there are many security products on the Internet and they are distributed in different locations, it is necessary to establish a set of centralized management mechanisms and equipment, namely a security management center. It is used to distribute keys to various network security devices, monitor the operating status of network security devices, and is responsible for collecting audit information of network security devices, etc.
Intrusion detection system (IDS): Intrusion detection, as an effective supplement to traditional protection mechanisms (such as access control, identity recognition, etc.), forms an indispensable feedback chain in information systems.
Intrusion prevention system (IPS): Intrusion prevention, as a good supplement to IDS, the intrusion prevention system is a computer network hardware that occupies an important position in the development of information security.
Secure database: Since a large amount of information is stored in computer databases, some information is valuable and sensitive and needs to be protected. A secure database can ensure the integrity, reliability, validity, confidentiality, auditability, access control and user identification of the database.
Data disaster recovery equipment: As an important remedial measure in an important enterprise information security management system, data disaster recovery plays a decisive role in the entire enterprise information security management system. Data disaster recovery equipment includes data recovery equipment, data replication equipment, data destruction equipment, etc. Commonly used data disaster recovery equipment includes efficiency source HD Doctor, Data Compass, Data Copy King hard disk duplicator, disk opener, etc. In fact, any kind of enterprise information security products, whether software or hardware, cannot 100% protect enterprise information security, not to mention that new information security risks are constantly emerging, which to a certain extent has also led to Limitations of enterprise information security products. Countries with early informatization development such as Europe and the United States discovered this problem before 2004, so around 2000 they began to develop information security focusing on emergency remediation of information security incidents, that is, professional data recovery and secure data erasure and destruction. In order to distinguish the product from previous information security products such as firewalls and anti-virus software, the international enterprise information security industry calls this information security product "modern enterprise information security product".
It is understood that most of my country's data information security products are limited to anti-virus software, firewalls, backup tools and other traditional data information security products that European and American countries had eliminated as early as 2004. Most of these outdated product functions can only resist external attacks, simple secondary storage of data information, etc. There are no good solutions for the prevention of internal leaks, daily maintenance of information systems, and remediation after data information security incidents occur. These backward data and information security products are far from being able to meet the needs of data and information security in the era of rapid development of informatization. Therefore, it is particularly important for data information security to develop a data information security system with the world's top data security technology.
With the continuous improvement of the informatization development of Chinese enterprises, the research and development of domestic enterprise information security products has also entered the stage of modern enterprise information security products. The representative work is the data information security guarantee of the national high-tech enterprise Efficiency Source Technology. System SD-DSM integrates data information security defense, daily data information security supervision, and data information security accident emergency remediation. It can thoroughly investigate data information security risks and provide full and comprehensive data information for the unit's data information system. Safety and security.
According to Zhang Bin, chief technical engineer of Efficiency Source, in recent years, the National Development and Reform Commission, the Ministry of Science and Technology, and the National Security Administration have strongly supported the development of data and information security systems in all fields. In 2014, the information industry was As a basic industry for the development of informatization during the "Twelfth Five-Year Plan". SD-DSM is one of the high-tech products vigorously supported by the country. It is also the first domestic data information security system with the most complete functions and the most advanced technology in all fields. It integrates dozens of international cutting-edge data security patents. technology, which brings together international mainstream data security technologies such as high-speed offline data backup, data recovery, and secure data erasure and destruction. It is a masterpiece that marks the beginning of the era of integrated protection of all areas of data and information security in my country. It can provide three-in-one data information security protection for the information systems of enterprises and institutions, thereby ensuring the efficient and orderly progress of information operation and maintenance management of enterprises and institutions. The core technology of this system has passed the certification of the National Security Bureau Testing Center and the Military Information Evaluation Center, received special project funding support from the National Ministry of Science and Technology, and has been successfully equipped in the China Academy of Engineering Physics, the State Security Bureau, and the 57th Research Institute of the General Staff Department , COFCO Group, Sichuan Changhong Group and more than 100 national key units and departments, and has received widespread praise.