DeepTrust AC Full Network Behavior Management AC

spotlightBehavioral safetySensing insider threats, making the entire network visible and controllable

DeepTrust AC Network-wide Behavior Management supports the visual control of terminals, applications, data and traffic across the network, intelligently sensing internal risks such as terminal access violations, Internet violations and sensitive data leakage, and realizing integrated behavioral control of terminal access control, Internet access control and data leakage control.suretyControl.

1756882921 2023083003360832
DeepService AC Full Network Behavior Management AC 3

Products

Network-wide behavior management AC series products include network-wide AC gateway devices, internal threat management system ITM, and integrated terminal security clients. The products are capable of linkage, and through terminal access control, Internet access control, data leakage control, and internal threat perception, the complete closed-loop control program helps users to deal with the behavioral security risks of internal personnel at all stages.

Terminal access control

Establishing security norms for terminal access to the network, reducing security hazards and the risk of data leakage.

  • Terminal Discovery:

Highly accurate identification of terminal types, asset sorting and classification management of access terminals (PCs, cameras, IoT terminals, etc.);

  • Access Authentication:

Provides 802.1x, Portal and other methods for authentication, adapting to a variety of scenarios such as employee and visitor access;

  • Security checks:

Check the security of the terminal before entering the network, including no update of operating system patches, no installation of antivirus software, etc;

Behavioral authority control is realized for the networked terminals, including USB flash drive control, anti-illegal outreach, and so on.

1757136617 2021112303203663 850x450 1
DeepService AC Full Network Behavior Management AC 4

Internet access control

Safeguard online norms and online experience to avoid violations and reduce online complaints.

  • Flexible flow control:

Supports dynamic flow control to give full play to the value of bandwidth and guarantee reasonable bandwidth allocation;

  • Compliance Audit:

Patented SSL auditing technology is enhanced and logs are stored in accordance with the law for a comprehensive and oversight-free compliance audit;

  • Fine control:

Based on the massive URL library and application rule base, it realizes application segmentation action control and accurately matches the enterprise Internet control specification;

  • Behavioral Perception:

Scenario-based intelligent analysis of logs for work efficiency analysis, addictionreticulationapplications such as analytics to fully utilize the value of behavioral data.

Data Leakage Control

Establish norms for data outsourcing, analyze risks and prevent sensitive data leakage.

  • Outgoing control:

Support network leakage control and terminal leakage control, strictly blocking the data leakage path.

  • Data Audit:

Comprehensive network auditing, business auditing, terminal auditing, data usage and distribution are clearly documented.

  • Risk Analysis:

Linkage ITM realizes outgoing risk analysis and business risk analysis, and intelligently identifies and warns of data leakage.

  • Leak Retrospective:

Linkage ITM realizes file similarity search, OCR image recognition and other traceability methods to meet the needs of traceability and forensics in multiple scenarios.

WeiboWeChatFacebookCopy link