当前位置:网站首页>Meichuang data security management platform has obtained the evaluation certificate of "data security product capability verification plan" of the Institute
Meichuang data security management platform has obtained the evaluation certificate of "data security product capability verification plan" of the Institute
2022-06-28 04:02:00 【database security】
In recent days, , China academy of information and communications ( hereinafter referred to as “ China Academy of communications ”) published “ Data security product capability verification plan ” The fifth issue of the list .
Meichuang data security management platform ( abbreviation :DSM) Successfully passed the test and obtained the data security product verification certificate , This certificate is the highest level certification for data security product inspection of China Academy of communications , It means that meichuang's data security control ability has been recognized by authorities .

This time 10 Among the manufacturers that have passed the inspection of data security products , have only 4 The company evaluates the ability of the data security management and control platform . Meichuang data security management platform relies on advanced product concepts , Pass the test . Besides ,DSM Also get 2022 Digital Fair “ Leading technology achievement award ” And so on .
Meichuang data security management platform is designed to solve the problem that various security platforms can not effectively cooperate 、 The cost of operation and management is increasing 、 Enterprises are unable to cope with increasingly complex security threats , Help users realize standardized asset management 、 Secure multi terminal linkage 、 Operational value-added enterprise level data security and efficient smart governance products . The product integrates full flow aggregated storage 、 Massive information processing and query 、 Identify and count all assets 、 User behavior (UEBA) In-depth analysis of 、 Big data real-time intelligent response and other functions , Help users make full use of user data security protection scenarios , The asset can be managed in the whole domain 、 Risk can be seen all over the world 、 Policy global linkage .
This evaluation focuses on verifying DSM The following function points
1、 Safety capability docking
DSM Support waterproof dam with database 、 Database firewall 、 Database security audit 、 Dynamic desensitization 、 Database transparent encryption 、 Noah anti blackmail 、 Data desensitization and data watermarking 、 Docking of dark data discovery and classification and grading products .
2、 Centralized configuration capability
DSM As a unified and centralized management center : Have global asset management 、 Identity global management 、 Centralized management of security tasks and policies .
3、 Centralized dispatching capability
DSM And the sub equipment have realized the issuance and implementation of security tasks and protection strategies , At the same time, it has the ability to monitor the scheduling execution status , Dispatch by issuing 、 The results are reported to a unified platform , Centralized supervision .
4、 Information sharing
By collecting information about endpoint components , Combine... From a global perspective UEBA Conduct comprehensive correlation analysis , At the same time, the analysis results are fed back to the endpoint components , Realize global information sharing , Improve risk identification ability .
Platform architecture
Product value
DSM Have centralized management of data security policies 、 Security incidents 、 Unified management and control of security risks 、 Centralized operation and maintenance capability ; It also provides assets 、 identity 、 Visual view after risk analysis , Break the isolated island of endpoint products , Realize centralized management .
1、 Centralized control
Linkage of all safety components , Achieve centralized asset governance 、 Identity governance and policy management 、 Risk management , Increased data security construction and maintenance costs , There is no need to repeat the configuration on the security component .
2、 Improve risk monitoring and protection capability
Collect the security logs of each perspective , Conduct global comprehensive correlation analysis , Realize the risk monitoring of the whole domain , Discover risks in time and provide timely protection to security components through information sharing . recycling UEBA Further research and judgment , Forecast risk , The detection rate of risks has been comprehensively improved .
3、 Sustainable operations
Integrated security situation 、 Risk monitoring 、 Emergency response 、 Safety control in one , Realize unified data security management and sustainable operation . Help enterprises to realize the global manageability of assets 、 Risk can be seen all over the world 、 Purpose of policy global linkage , Fully invigorate the user data security protection scenario .
except DSM Outside , At present, meichuang already has dark data discovery and classification and grading systems 、 Data desensitization system 、 The three products, including the database security audit system, passed the ICT Institute “ Data security product capability verification plan ” And get the certificate .
边栏推荐
猜你喜欢

Analyzing the comprehensive application ability of educational robot

Cannot edit in read-only editor if it appears in vscode

MSC 307(88) (2010 FTPC Code)第2部分烟气和毒性测试

Several important physical concepts

Arrangement of basic electrical knowledge (I)

leetcode:494. All methods of adding and subtracting operators to the array to get the specified value

La norme européenne en 597 - 1 pour les meubles est - elle la même que les deux normes en 597 - 2 pour les ignifuges?

机器人编程教育的市场竞争力

关于 SY8120I 的DC-DC的降压芯片的学习(12V降至3.3V)

数字电路学习笔记(一)
随机推荐
数组的方法
窗帘做EN 1101易燃性测试过程是怎么样的?
小程序输入框闪动?
如何修改SE38编辑器主题
11_刻意练习精讲
C语言十进制与BCD码的相互转换
Understanding and learning of parental delegation mechanism
Adder - Notes
第14章 AC-DC电源前级电路 笔记一
Open the field of maker education and creation
English notes - cause and effect
Using elk to build a log analysis system (I) -- component introduction
Database migration
【Linux】【Mysql】ERROR 1698 (28000): Access denied for user ‘root‘@‘localhost‘
开启创客教育造物学的领域
《性能之巅第2版》阅读笔记(二)--CPU监测
English语法_形容词/副词3级 - 比较级
A Preliminary Study of Blackbody radiation
Notes to friendship chain
门级建模—学习笔记