Design Concept

Find the best balance between IT managers (CSOs) and operations engineers

Continuous improvement in management level
Security risks gradually decrease

Foundation

Centralized Management

Prerequisite

Identity Authentication

Method

Access Authorization

Core

Permission Control

Guarantee

Conduct Audit

Top Core Functions

authentication management

  • ▪ Support OTP authentication
  • ▪ Support static password authentication+other authentication combinations for two factor authentication;
    Support custom selection of multiple authentication methods for combination authentication;

Account

  • ▪ Support account cycle encryption
  • ▪ For newly registered resources, one click account extraction is possible
    ▪Customize and add accounts, customize basic account information; Batch import and export accounts, supporting AD domain and Excel template import methods;

Resource management

  • ▪ Network resources: security devices, network devices
  • ▪ Resource types are displayed uniformly through a bar chart
    ▪ Directly referencing memory space

authentication management

  • ▪ Support OTP authentication
  • ▪ Support static password authentication+other authentication combinations for two factor authentication;
    Support custom selection of multiple authentication methods for combination authentication;

Account

  • ▪ Support account cycle encryption
  • ▪ For newly registered resources, one click account extraction is possible
    ▪Customize and add accounts, customize basic account information; Batch import and export accounts, supporting AD domain and Excel template import methods;

Resource management

  • ▪ Network resources: security devices, network devices
  • ▪ Resource types are displayed uniformly through a bar chart
    ▪ Directly referencing memory space

Highlight

01

Flexible deployment

  • Cluster elastic deployment;
  • Multi active deployment of two locations and three centers;
  • Total score grading deployment, cloud virtualization deployment
02

Database operation and maintenance audit

  • Database operation and maintenance video database downlink audit database proxy direct connection video audit, monitoring SQL statement audit, SQL statement blocking.
03

B/S application resource operation and maintenance audit

  • Call Google Chrome Operations Single Sign On
  • Real time monitoring of B/S application resource operation and maintenance
  • B/S application resource video audit
01

Flexible deployment

  • Cluster elastic deployment;
  • Multi active deployment of two locations and three centers;
  • Total score grading deployment, cloud virtualization deployment
02

Database operation and maintenance audit

  • Database operation and maintenance video database downlink audit database proxy direct connection video audit, monitoring SQL statement audit, SQL statement blocking.
03

B/S application resource operation and maintenance audit

  • Call Google Chrome Operations Single Sign On
  • Real time monitoring of B/S application resource operation and maintenance
  • B/S application resource video audit