• Product introduction

  • Dominant characteristic

  • User value

Product introduction

The wall map prevention and control platform is based on the map view of cyberspace geographic information,It is to centrally control cybersecurity related data, participants, and assets,And its data, business and relevance through security technology, computer technology, artificial intelligence, big data technology and spatial geographic information technology to monitor, analyze, judge, control, decision-making, command, dispatch, early warning, notification, governance。Docking with the platform of national authorities,We will form a comprehensive prevention and control system that integrates various sectors, vertical and horizontal connectivity, and coordinated coordination,Establish a normal, systematic, and practical cybersecurity working mechanism and a multidimensional, modern, and longitudinally-deepening comprehensive prevention and control system for the cyber society,Form a wall chart combat platform with the ability to improve the response and disposal of cybersecurity emergencies and major risk prevention and control。

The comprehensive prevention and control system of network security builds the basic data layer, intelligent analysis layer, and network security business layer,Under the interaction and fusion of "man-Earth-net" relationship,Through the deployment of soft and hard probes and other ways to strengthen monitoring and early warning of various key facilities, Internet of Things applications, and important information systems,Based on massive network security events with geographic information characteristics,Through resource integration,Transform network big data into network security incident information resources,And through big data, machine learning and other analytical methods and technologies,Analyze and judge network security incidents,Processing with deep learning and pattern recognition,Finally through the map of cyberspace,To realize the concretization and digitization of cyberspace,And then create a three-dimensional, multi-dimensional comprehensive prevention and control pattern,Build a comprehensive cybersecurity prevention and control system that integrates "prevention and control",To achieve the protection of critical information infrastructure, important networks and big data,Realize "dynamic defense, active defense, in-depth defense, precise defense, overall prevention and control, and mass prevention and treatment" of network prevention and control。Thus, it provides intuitive and valuable information for decision makers to reduce the uncertainty of decision-making, and fully supports the organization's "wall chart operations and prevention and control" capabilities。

Dominant characteristic
System characteristics
  • 01

    Multi-source heterogeneous data acquisition capability

    Fully support different brands of different types of security data acquisition equipment and different sources of different structures of data,Adopt a variety of data docking methods such as active acquisition, active acquisition and passive reception,Based on data center data visualization, intelligent governance,To form an all-round security data collection and analysis capability of all elements in cyberspace。

  • 02

    The supervision of geographic information in cyberspace can be seen

    The visualization technology based on network geographic map information integrates network security events and cyberspace asset data to enrich the visual expression from the dimensions of geography, assets and events, comprehensively display and describe the distribution and attributes of cyberspace resources, and realize the visual expression of cyberspace elements。Events are used as trigger conditions,Quickly concatenate events, assets, and geographic elements through graphics,Clarify the interaction between the various elements,To form a set of dynamic, real-time, reliable and effective cyberspace operational command map,Make the asset base more clear, incident discovery more accurate, threat positioning more accurate, threat analysis more intelligent, threat tracing more automatic;Improve the capabilities and efficiency of business units in incident discovery, forensic location, and traceability,Make the work of functional departments more intelligent, automatic and visual。

  • 03

    National authoritative threat intelligence and comprehensive threat intelligence data

    Established threat intelligence data center (including 360, Qianxin, Tencent, Ali and other intelligence) Shandong data center。

  • 04

    Real-time monitoring, early warning, and handling of major cybersecurity risks and threats

    Comprehensively enhance the ability of cybersecurity incident detection, early warning and joint handling。

  • 05

    Protect local critical information infrastructure, critical networks and big data security

    We will build protective positions for critical information infrastructure and comprehensively improve its defense capabilities and levels。

  • 05

    Improve the ability to discover and handle online public opinion, and firmly grasp the initiative of online public opinion

    Strengthen the ability to monitor and handle online public opinion, and be able to conduct timely guidance for hot events。

  • 05

    Proactively discover and promptly handle cyber security cases related to politics

    Establish a monitoring mechanism and technical means for political cases and incidents, realize the ability to proactively discover and deal with them, and effectively curb the occurrence of such cases and incidents。

  • 05

    Ability to coordinate defense, dispatch and command comprehensive prevention and control and decision-making

    The security related people, things, things, places and their mutual relations are unified and coordinated, and the policy linkage and disposal mechanism of security orchestration, automation and response (SOAR) is developed to solve the single security protection of fragmented information security data island。Build a network security command platform to realize core business systems such as threat perception, real-time monitoring, information reporting, emergency command, supervision objects, intelligence information, inspection and supervision, management evaluation, and offensive and defensive drills, and comprehensively improve the level of network security collaborative supervision and command services。

User value
  • Solve the problem of low data collection quality

    Data is the core of future enterprise security capabilities, and the quality and value of data is the basis for security prevention and control capabilities。At present, from the perspective of traditional situational awareness projects, the number of probes is insufficient and the quality of data collected is not high, which will seriously affect the accuracy of data processing and analysis。At the same time, for applications such as threat detection and traceability, collecting asset information and device logs is far from enough, and more full-factor data needs to be collected。

    The wall chart prevention and control platform is based on network defense G01, network exploration D01, network connection E01, network shield K01, third-party vendor traffic data, log data and asset data,Build a high-quality data governance system by combining threat intelligence sources (including 360, Qianxin, Tencent, Ali Intelligence Source),Ensure high granularity, accuracy and efficiency of data。

  • Solve the problem of lack of risk awareness of enterprise network assets

    In many enterprises, there are many network assets and complex application of network security products。Many enterprises cannot accurately grasp the security risk degree of their network assets due to reasons such as the degree of emphasis and product capabilities. As a result, original alarms of security devices are used as indicator sources rather than valid alarms as data sources in daily security analysis。It is difficult for security operation and maintenance personnel to distinguish valid alarms and respond to them。

    The wall chart prevention and control platform uses the perspective of asset safety to examine the overall security and protection status of assets, including but not limited to the perception and use of assets around the situation of asset harm, asset weakness, asset attack, etc

  • Solve the problem of low automation capability

    Most traditional situational awareness systems are still at a low level when it comes to automation,Mainly: 1, the degree of informatization and technical ability is insufficient,The accuracy of risk identification is difficult to guarantee;2. Security providers generally lack understanding of users' businesses,Difficulty in forming business-based algorithms, scripts, and orchestration;3. Management process,Lack of rule support for automated response handling,Human intervention is required;4. It is difficult to communicate between devices,The ability of coordination and linkage is weak。

    The wall chart prevention and control platform realizes the automatic response mechanism with comprehensive cooperative defense ability through the intelligent and visual data governance of the data center, rich algorithm library and custom algorithms and strategies, automation and response (SOAR) and other capabilities

  • Solve the problem of insufficient operational support capacity

    When the traditional situational awareness platform data is available, the platform is built, and there are no qualified security talents, the platform and functions will not be used, and the ability to land can not be truly achieved, and the corresponding return on security investment can not be obtained。

    The unique collaborative defense and scheduling command functions of the wall Chart prevention and control platform centralize the coordination and control of various resources, and combine the capabilities of machine learning, artificial intelligence and automated analysis to standardize and reduce the ability requirements of front-line operators

  • Solve the problem that it is difficult to unify the interface and standard of security products

    At present, various product manufacturers and platform construction units operate independently, and lack a unified data interface, which brings a lot of trouble to data collection, equipment docking, threat intelligence sharing, etc., increases a lot of unnecessary workload, and fails to take advantage of the core competition point of network security - collaborative sharing。

    The wall chart prevention and control platform fully supports different brands and different types of security data acquisition equipment and different sources and different structures of data,Adopt a variety of data docking methods such as active acquisition, active acquisition and passive reception,Based on data center data visualization, intelligent governance,To form an all-round security data collection and analysis capability of all elements in cyberspace。

  • Solve the problem of changing the traditional concept of security

    Network security is a capability system, if only rely on log analysis, alarm events, threat intelligence and other security tools piled up, lack of enough knowledge and talents to serve the operation, lack of clear management process to support the guarantee, it is impossible to achieve the effective implementation of active security capabilities。

    With the concept of "data-driven service, service-driven security", the wall Chart prevention and control platform has established a complete safety operation system, safety technology system and safety standard system to achieve the delivery of new safety capabilities。

  • Solve the problem that the security mechanism does not respond smoothly

    The platform effectively connects the problems of the independent islands of each unit system in the past, transforms the passive defense method into active discovery, and realizes the ability of accurate detection and protection and emergency linkage。

  • Realize the conversion of active and passive defense

    This platform will change the passive response mode of the protection unit in the past, achieve accurate and timely early warning before the impact of security risks, and build an elastic defense system in real time, in order to avoid, transfer and reduce the risks faced by network security to the maximum extent。

  • Solve the problem of actual combat level gap

    This platform will build an offensive and defense drill platform, and improve the technical ability and level of disposal personnel through continuous combat。

Shandong Yuntian Safety Technology Co., LTD. All rights reserved Lu ICP No. 17007379-1

Lu public network Anbei 37010202002190

" class="hidden">苏州卫生职业技术学院