A new generation of vulnerability scanning management system independently developed by the research team of Guolian Yi'anUnified system vulnerability management platformIt covers cyberspace asset detection, system vulnerability scanning, virtual machine vulnerability scanning, web vulnerability scanning, security monitoring, database security scanning, security baseline verification, industrial control vulnerability scanning, wifi security detection, APP security scanning, big data platform vulnerability scanning, Windows security reinforcement, classified protection compliance association, distributed management and other functions, which can comprehensively and accurately detect various vulnerabilities in the information system and provide professional and effective vulnerability analysis and patching suggestions. At the same time, combined with the credible vulnerability management process, the vulnerability is warned, scanned, repaired, and audited. At present, the platform has been applied to different environments of many customers such as Internet, LAN, industrial Internet, cloud environment, and big data center. The platform has seven main features:
One is the adoption of multi-tenant managementYou can set vulnerability scanning policies that meet the characteristics of different tenants, and you can view only the vulnerabilities of the current tenantPlatform administrators can manage and monitor the vulnerability of the global and unified system
The second is to support the detection of cyberspace assetsTraverse the asset space to realize network-wide asset discovery, identify surviving hosts, network devices, databases and other related devices and attributes in the network environment, automatically generate network topology, and support asset export, import and manual correction of asset data
The third is to override vulnerability scanningThe system covers vulnerability scanning functions such as space asset detection, system vulnerability scanning, virtual machine vulnerability scanning, web vulnerability scanning, database security scanning, security baseline verification, industrial control vulnerability scanning, wifi security detection, APP security scanning, big data platform vulnerability scanning, and classified protection compliance association
The fourth is to carry out Windows security reinforcementSupports automatic and manual security hardening for Windows OS configuration, network, access, logging, and protection. The reinforcement content includes: configuration management (host configuration, user policy, identity authentication, patch management, software management), network management (service port, firewall management), access management (peripheral management, automatic login, remote login, wireless network card), log audit, malicious prevention (data protection, anti-virus software), etc.;
Fifth, realize report associationThe system analyzes the scan results in the form of reports and graphs, and can be predefined, customized, and analyzed from multiple angles and levels. Provides a complete vulnerability risk level, vulnerability category, vulnerability description, vulnerability type, and vulnerability solution
Sixth, complete distributed vulnerability managementThe system can issue scanning tasks to the subordinate engine, receive the scanning results uploaded by the subordinate engine, conduct unified analysis, and generate the overall scanning report
Seven is that it can be upgraded with one click:Using the built-in product upgrade module of the program, the vulnerability library and software can be upgraded, locally upgraded, and regularly upgraded through the network or local data packets.
In the face of endless vulnerabilities, how to build a "real-life" unified system vulnerability management platform is a headache for network security vendors and customers. Guolian Yi'anRelevant person in chargeDenote.
About Guolian Yi'an
Founded in 2006, Beijing Guolian Yi'an Information Technology, formerly known as Beijing Zhiheng Alliance Technology, is a leading enterprise focusing on the research and development of classified protection, hierarchical protection, business continuity security and big data security product solutions and related technologies in the field of confidentiality and non-secret. A number of the company's security technologies have filled the domestic technology gap, and have been widely used in the fields of **, finance, confidentiality, telecom operators, military industry, large and medium-sized enterprises, energy, education, medical e-commerce and so on.
In addition to R&D and production of professional security products, Guolian Yi'an also provides customers with professional security services such as expert consultation on detection and protection solutions, source security assessment, security operation and maintenance on duty, intelligent terminal security assessment, security penetration testing, and professional security training.