- Cloud Computing
- Information Security
- Intelligent Operation & Maintenance
In recent years, information security attack techniques and defensive measures have been evolving. A wide range of attack tools are gaining intelligence and simplicity. New variants of attack techniques appear more complicated and changeful. Hackers have clearer targets to attack. An industrial chain has emerged consequently. All of these pose a challenge to the protection of enterprises from security threats in their digital shift.
ECCOM Threat Protection Solution
In order to address these aforementioned problems, ECCOM Network System Co., Ltd. (ECCOM) has proposed a comprehensive threat protection solution, which provides four-tier protection:
● 1st Tier: DDoS protection——Offer protection from DDoS attacks from the network layer to the application layer;
● 2nd Tier: Identification and screening of applications on the border of the network—With the help of next-generation firewalls, identify, screen and control applications attempting to access data centers, especially screening APT attacks hidden in application data;
● 3rd Tier: Identification and screening of applications in data centers—applications in enterprises are usually divided into three layers, front-office server, middleware and back-office database. Threats are uncovered and screened by using Web application firewalls and vulnerability detection devices;
● 4th Tier: Virtual environment protection—Inside cloud and virtualized data centers have turned into an enormous net, which contains numerous virtual devices on which different systems and applications are running. Protection among these virtual devices is of vital importance.
The threat protection solution provided by ECCOM has the following strengths:
● All-around Threat Protection——Resist all kinds of threats, being able to block threats not only from the network layer, but also from the application layer, and particularly from slow HTTP attacks and APT attacks on the application layer;
● Intelligent Application Analysis—Build controls on applications, rather than on IP and ports as it was, so as to not only improve data security, but also find out access to enterprises’ applications through application analysis and enhance visibility of applications;
● Powerful Application Visibility—Provide user-friendly and efficient management interface, and complete and elaborate reports, with which users can have a company-wide view of application control status and get rid of and block threats to their applications in a timely and effective manner;
● Efficient Processing Performance—Apply new technologies to physical architecture and data model, and quicken identification and processing of threats and scanning of application data.
Tel : 400-820-5-820,800-820-5-820
mail : TAC@eccom.com.cn
web : www.ECCOM.NET.CN
ECCOM Smart Service
360° Comprehensive Lifecycle Services