Free Download

Please fill in the following information for free trial.

  • Company

    *
  • Name

    *
  • Post

    *
  • E-mail

    *
  • Phone

    *
  • Code

    Get code

Download

Please click the Download button to download the resources.

Down

Products & Solutions

Telecommuting Security Reinforcement

Solution Overview

The wave of telecommuting sweeping across the country means a new challenge for companies.

How can companies safely and efficiently access the Intranet, check mails, and approve OA in a special period?

How to prevent the leakage of sensitive information in financial and human resources posts?

How to ensure the security of the connected business system?

Balancing the efficiency and security of telecommuting has become a major concern.

 

 

Security challenges posed by remote access

● VPN product vulnerability

● Identity theft

● Unauthorized terminal access

● Data leakage

● Bandwidth hogs

How to respond to challenges brought by remote access security?

 

ECCOM Telecommuting Security Reinforcement

The multi-dimensional security solution system of ECCOM can help enterprise users properly handle data security, access security and office environment security in the face of ever-expanding mobile and telecommuting demands.

● Integration of VPN with Next Generation Firewall (NGFW)

The vulnerability scanning and fixing of VPN access platform, along with IPS detection of firewall, bring users with ease of mind regarding high-risk vulnerability exploitation;

User permission enhancement enables identity identification and application program identification as well as content identification and threat protection against access traffic.

● Terminal access and Multi-Factor Authentication (MFA)

Collect OS and patch information, host firewall version, disk encryption and other information for connected terminals, as a means of security policy matching;

A range of access identification and information verification through MFA prevent identity theft and illegal authorization.

● Closed-loop management model of big data security operation and maintenance

Integrate multiple endpoints with the platform data, and detect corresponding attack techniques and find out hidden threats through the behavior analysis based on machine learning.

Joint multi-event investigation of assets/identities: check the internal relationships between different security events and detect and respond to potential security events from multiple dimensions based on the collection and analysis of identity and security event contexts.

 

Relevant Content

ECCOM  Big data analysis,New next-generation Closed-Loop Model of Monitoring and Management for security Operation and Maintenance

Big Data Analysis

 

TAC

Tel    : 400-820-5-820,800-820-5-820
mail  : TAC@eccom.com.cn
web  : www.ECCOM.NET.CN


Services

Services

ECCOM Smart Service
360° Comprehensive Lifecycle Services

More >


Contact Us

Shanghai

TEL:021-61372888

Nanjing Office

TEL: 025-84677650

Hangzhou Office

TEL: 0571-26890266

Beijing-Yintai Centre

TEL: 010-85216999

Beijing-Shoudong Centre

TEL:010-87224666

Jinan Office

TEL:0531-67880519

Xi'an Office

TEL:029-89384503

Shenzhen-Futian Office

TEL: 0755-33966800

Guangzhou Office

TEL: 020-28059288

Xiamen Office

TEL: 0592-5376000-92020

Fuzhou Office

TEL:

Chengdu Office

TEL: 028-65533878

Chongqing Office

TEL:023-88280080

Kunming Office

TEL:0871-3602050

Wuhan Office

TEL:027-87267899

Xianggang Office

TEL:+852 39735958


Contact Us

Shanghai

TEL:021-61372888

Nanjing Office

TEL:025-84677650

Hangzhou Office

TEL:0571-26890266

Beijing Branch

TEL:010-85216999

Ji'nan Office

TEL:0531-83186508

Xi'an Office

TEL:029-88178595

Shenzhen Branch

TEL:0755-33966800

Guangzhou Branch

TEL:020-28059288

Xiamen Office

TEL:0592-5376000-90213

Fuzhou Office

TEL:0591-38160599

Chengdu Office

TEL: 028-65533878

Chongqing Branch

TEL:023-88280080

Kunming Office

TEL:0871-63602050

Wuhan Office

TEL:027-87267899

Nanchang Office

TEL:0791-88228229

Hong Kong Branch

TEL:+852 39994888