-
Product advantages
-
Product functions
-
Application scenarios
-
solution
-
Product advantages
- Flexible engine technology
Virtual Fire Wall products use the HOOK architecture, integrate multiple security engines, and provide flexible scalability.
- Intrusion detection/prevention technology
The Virtual Fire Wall Attack Detection Engine uses a variety of comprehensive technical means to determine intrusion behaviors.
- Dual virus detection engine
It supports fast scanning and deep scanning, and selects different virus detection engines according to the protocol and application scenario of the application layer to be detected.
- Stable and reliable
The system is designed with full-link and high availability and high reliability for the underlying data storage, supporting non-disruptive storage elastic scaling of applications.
Product functions
- Fine-grained access control
A protection-in-depth rule includes the source address, destination address, source port, source MAC address, incoming network port, and outgoing network port.
- Integrated security protection
Through a single security policy, you can formulate multi-dimensional access control policies and integrate multiple protection capabilities.
- Deep content filtering
The full content detection technology is adopted; Deep filtering of content across multiple protocols based on streams and transparent proxies.
- Intrusion prevention
The product has a built-in database of more than 4,000 intrusion attack signatures, and has complete defense methods such as detection, blocking, and current limiting.
- Virus protection
The number of built-in virus signatures is not less than 3 million. Different defense strategies are adopted based on source/destination IP addresses, etc.
- Application control
According to different times and groups, strict management policies are issued for instant chat software, online games, etc.
- Session management
It has a complete status detection table and supports the restriction of concurrent sessions and new sessions based on IP globally.
Application scenarios
-
Department-level/user-level access control within the tenant
-
Virtual area boundary intrusion & virus attack protection
-
Audit of virtual area boundary access behavior
-
There are people in different departments and different roles, and they have different access rights to data. If there is no control over the access to data, it may lead to unauthorized access to the data, which in turn leads to the leakage of sensitive data. Through Virtual Fire Wall, the control over personnel or tenants' data access permission can be achieved.
-
This solution can effectively prevent threats to the virtual area boundary, including viruses carried by internal access to tenant units, attacks brought about by opening to the outside world, and other intrusion attacks and viruses.
-
Effectively audit network access and exit behaviors for the virtual boundary audit, including recording internal access behaviors, discovering illegal access, auditing external network access, and discovering illegal outreach.
More options
Empower customers to quickly and securely migrate to the cloud,
If you have any questions about Inspur Cloud, please contact us
Are you interested in our solutions?
Please do not hesitate to contact us! We're here to help.