当前位置:网站首页>Meichuang data security management platform has obtained the evaluation certificate of "data security product capability verification plan" of the Institute
Meichuang data security management platform has obtained the evaluation certificate of "data security product capability verification plan" of the Institute
2022-06-28 04:02:00 【database security】
In recent days, , China academy of information and communications ( hereinafter referred to as “ China Academy of communications ”) published “ Data security product capability verification plan ” The fifth issue of the list .
Meichuang data security management platform ( abbreviation :DSM) Successfully passed the test and obtained the data security product verification certificate , This certificate is the highest level certification for data security product inspection of China Academy of communications , It means that meichuang's data security control ability has been recognized by authorities .

This time 10 Among the manufacturers that have passed the inspection of data security products , have only 4 The company evaluates the ability of the data security management and control platform . Meichuang data security management platform relies on advanced product concepts , Pass the test . Besides ,DSM Also get 2022 Digital Fair “ Leading technology achievement award ” And so on .
Meichuang data security management platform is designed to solve the problem that various security platforms can not effectively cooperate 、 The cost of operation and management is increasing 、 Enterprises are unable to cope with increasingly complex security threats , Help users realize standardized asset management 、 Secure multi terminal linkage 、 Operational value-added enterprise level data security and efficient smart governance products . The product integrates full flow aggregated storage 、 Massive information processing and query 、 Identify and count all assets 、 User behavior (UEBA) In-depth analysis of 、 Big data real-time intelligent response and other functions , Help users make full use of user data security protection scenarios , The asset can be managed in the whole domain 、 Risk can be seen all over the world 、 Policy global linkage .
This evaluation focuses on verifying DSM The following function points
1、 Safety capability docking
DSM Support waterproof dam with database 、 Database firewall 、 Database security audit 、 Dynamic desensitization 、 Database transparent encryption 、 Noah anti blackmail 、 Data desensitization and data watermarking 、 Docking of dark data discovery and classification and grading products .
2、 Centralized configuration capability
DSM As a unified and centralized management center : Have global asset management 、 Identity global management 、 Centralized management of security tasks and policies .
3、 Centralized dispatching capability
DSM And the sub equipment have realized the issuance and implementation of security tasks and protection strategies , At the same time, it has the ability to monitor the scheduling execution status , Dispatch by issuing 、 The results are reported to a unified platform , Centralized supervision .
4、 Information sharing
By collecting information about endpoint components , Combine... From a global perspective UEBA Conduct comprehensive correlation analysis , At the same time, the analysis results are fed back to the endpoint components , Realize global information sharing , Improve risk identification ability .
Platform architecture
Product value
DSM Have centralized management of data security policies 、 Security incidents 、 Unified management and control of security risks 、 Centralized operation and maintenance capability ; It also provides assets 、 identity 、 Visual view after risk analysis , Break the isolated island of endpoint products , Realize centralized management .
1、 Centralized control
Linkage of all safety components , Achieve centralized asset governance 、 Identity governance and policy management 、 Risk management , Increased data security construction and maintenance costs , There is no need to repeat the configuration on the security component .
2、 Improve risk monitoring and protection capability
Collect the security logs of each perspective , Conduct global comprehensive correlation analysis , Realize the risk monitoring of the whole domain , Discover risks in time and provide timely protection to security components through information sharing . recycling UEBA Further research and judgment , Forecast risk , The detection rate of risks has been comprehensively improved .
3、 Sustainable operations
Integrated security situation 、 Risk monitoring 、 Emergency response 、 Safety control in one , Realize unified data security management and sustainable operation . Help enterprises to realize the global manageability of assets 、 Risk can be seen all over the world 、 Purpose of policy global linkage , Fully invigorate the user data security protection scenario .
except DSM Outside , At present, meichuang already has dark data discovery and classification and grading systems 、 Data desensitization system 、 The three products, including the database security audit system, passed the ICT Institute “ Data security product capability verification plan ” And get the certificate .
边栏推荐
猜你喜欢

MySQL master-slave replication, separation and resolution

A solution to the inefficiency of setting debug mode in developing flask framework with pychar

基于正点原子stm32的mini板的TFTLCD显示实验

Leetcode: monotonic stack structure (Advanced)

English语法_形容词/副词3级-比较级_常用短语

2021 year end summary and 2022 outlook

加法器—笔记

数字电路学习笔记(一)

Detailed explanation of KVM common commands

从遇见大咖到成为大咖,昇腾AI开发者创享日给开发者带来无限可能
随机推荐
One article tells you what kubernetes is
第14章 AC-DC电源前级电路 笔记一
多线程与高并发六:线程池源码解析
Elk builds log analysis system + Zipkin service link tracking integration
领歌leangoo敏捷看板工具新增导出卡片文档和粘贴共享脑图节点功能
English语法_形容词/副词3级 - 比较级
回溯—迷宫问题
小程序输入框闪动?
事件委托的原理
How to learn a programming language systematically| Dark horse programmer
MSC 307(88) (2010 FTPC Code)第2部分烟气和毒性测试
多线程与高并发五:等待队列及Executor和线程池详解(重点)
双亲委派机制的理解学习
Analyzing the comprehensive application ability of educational robot
月赛补题
Cannot edit in read-only editor if it appears in vscode
Building a server monitoring platform with telegraf influxdb grafana
等保三级密码复杂度是多少?多久更换一次?
Database migration
PyCharm设置仿sublime配色方案