- Cloud Computing
- Information Security
- Intelligent Operation & Maintenance
The wave of telecommuting sweeping across the country means a new challenge for companies.
How can companies safely and efficiently access the Intranet, check mails, and approve OA in a special period?
How to prevent the leakage of sensitive information in financial and human resources posts?
How to ensure the security of the connected business system?
Balancing the efficiency and security of telecommuting has become a major concern.
Security challenges posed by remote access
● VPN product vulnerability
● Identity theft
● Unauthorized terminal access
● Data leakage
● Bandwidth hogs
How to respond to challenges brought by remote access security?
ECCOM Telecommuting Security Reinforcement
The multi-dimensional security solution system of ECCOM can help enterprise users properly handle data security, access security and office environment security in the face of ever-expanding mobile and telecommuting demands.
● Integration of VPN with Next Generation Firewall (NGFW)
The vulnerability scanning and fixing of VPN access platform, along with IPS detection of firewall, bring users with ease of mind regarding high-risk vulnerability exploitation;
User permission enhancement enables identity identification and application program identification as well as content identification and threat protection against access traffic.
● Terminal access and Multi-Factor Authentication (MFA)
Collect OS and patch information, host firewall version, disk encryption and other information for connected terminals, as a means of security policy matching;
A range of access identification and information verification through MFA prevent identity theft and illegal authorization.
● Closed-loop management model of big data security operation and maintenance
Integrate multiple endpoints with the platform data, and detect corresponding attack techniques and find out hidden threats through the behavior analysis based on machine learning.
Joint multi-event investigation of assets/identities: check the internal relationships between different security events and detect and respond to potential security events from multiple dimensions based on the collection and analysis of identity and security event contexts.
ECCOM Big data analysis,New next-generation Closed-Loop Model of Monitoring and Management for security Operation and Maintenance
Tel : 400-820-5-820,800-820-5-820
mail : TAC@eccom.com.cn
web : www.ECCOM.NET.CN
ECCOM Smart Service
360° Comprehensive Lifecycle Services