-
Product advantages
-
Product functions
-
Application scenarios
-
Customer cases
-
solution
-
Product advantages
- Safer and more reliable
It strictly conforms to national standards, meets the requirements of cybersecurity classified protection, and the product performance is more stable and reliable; The product adopts the national cryptography algorithm as the account authentication method, which increases the security of the product to a greater extent; It adapts to a variety of localized environments.
- High flexibility of permission control
Through fine-grained login rule configuration, flexible custom access control policies, enhanced user authentication, and multi-person approval for sensitive processes, it meets the needs of high flexibility of permission control to a greater extent.
- Automated O&M
Through continuous improvement of automated O&M methods such as automatic resource password change and password filling, O&M efficiency is improved to a greater extent.
- Refined audit of resource access
By supporting multi-dimensional auditing, combined with rich audit logs and playback videos, it provides users with refined audit of resource access, providing a rich and credible basis for the traceability of responsibility for security issues.
Product functions
- Unified user management
It supports unified management of bastionhost users, including user groups, login methods, user roles, and expiration dates. At the same time, it supports the maintenance of user login rules, that is, allowing or denying users to log in on a certain IP, and the login priority.
- Unified identity authentication
You can use multiple authentication factors to authenticate users to log in to a bastionhost, and other enhancement factors include login failure lock, password strength check, password validity check, IP/MAC address blacklist limit, login time limit, etc.
- Unified resource management
It supports unified management of hosts, applications, and database resources, including resource access, resource monitoring, application release, resource grouping, and type management. It supports the management of a wide variety of resources.
- Unified authorization management
For platform functions, it supports the function authorization of users with different identities and different business needs through the configuration relationship among account, role, and menu/function. Implement fine-grained control over user resource access authorization for managed resources.
- Unified resource O&M
It provides practical and convenient O&M solutions to improve O&M efficiency, including optional O&M tools, multiple protocol parsing, and batch O&M. it provides O&M tools including H5, putty, securityCRT, mstsc, mobaXterm, winscp, etc.
- Unified O&M audit
Audit types are divided into session audit (real-time session, historical session), character audit, graph audit, and log audit.
Application scenarios
-
Regulatory compliance
-
Complex management scenarios
-
Cybersecurity Classified Protection 2.0 proposes to focus on the protection of critical infrastructure, and the use of key infrastructure resources has also become a key target, requiring strict security control over resource access, operation and maintenance, and auditing.
-
The reality is that many enterprises often have a problem of a large number of personnel and resources with complex relationships. As a result, the risks of lack of resource management and resource access authorization management, unfavorable supervision of the resource access process, and difficulty in post-event audit are becoming increasingly prominent.
Customer cases
More options
Empower customers to quickly and securely migrate to the cloud,
If you have any questions about Inspur Cloud, please contact us
Are you interested in our solutions?
Please do not hesitate to contact us! We're here to help.