Page 1: Tianhao Intrusion Detection and Management System (IDS)
IDS is a self-developed intrusion detection security product. Its main role is to help users quantify and locate threats from internal and external networks, provide targeted guidance and security decision-making, and It can evaluate the overall level of network security. IDS adopts a new generation of intrusion detection technology that integrates multiple analysis methods. It adheres to the “high-performance hardware platform with security optimization†and adheres to the “completely tested and effective†method. Presenting the product's core value orientation can accurately analyze and report various abnormal events and attacks that are taking place in the network in accordance with the user-customized strategy, realize the "overall detection" of the network, and provide real-time alarm information and The format report provides users with informative, actionable security advice, helps users improve security measures, and ensures that information is “presented†to users.
Comprehensive Testing - Comprehensive Information Collection: Tianyi IDS supports multi-level, distributed deployment, unified delivery of policies, and centralized information collection.
——Comprehensive protocol analysis: Tianyi IDS supports protocol self-identification and protocol plug-in technology, which can accurately identify protocols and new protocols of unconventional ports.
——Comprehensive detection mechanism: Tianzhu IDS supports two detection methods based on features and principles, and on the basis of guaranteeing detection accuracy, expands the range of detection identities.
——Comprehensive event analysis: VenusStar has a set of industry's most standard follow-up service support system to ensure rapid and accurate response to new events.
——Comprehensive detection scope: Tianyi IDS provides various anomaly detections such as network intrusion events, network violation events, and traffic anomalies.
——Comprehensive detection performance: Tianyi IDS adopts the shortest time priority algorithm to ensure the detection efficiency of products under high load conditions of network data.
Effective Presentation - Accurate Alarm Information: Tianhao IDS combines environmental fingerprinting technology and performs secondary matching with stored environmental information after discovering an attack behavior, and presents the alarm information that can be sure as "useful" to reduce the user's individuality. The analysis operation consumes.
——Detailed information presentation: In addition to information such as the address and agreement of both parties of the incident, Tianyi IDS's alarm information includes specific descriptions of the incident, vulnerability information, patching suggestions, and influencing systems, and can present the most detailed event information. To the user.
- Threat address location: Tianhe IDS provides alarm display in combination with actual geographic topology. In the case of large-scale deployment, the device topology can be combined with the geographic topology so that the administrator can intuitively and quickly determine the threat.
——Extensive Report Presentation: Tianyi IDS provides analysis reports based on multiple parameters such as time, address, and events. Combined with historical analysis data, it can clearly demonstrate the development trend of security construction and assist in considering the level of network security construction.
VenusStar has the largest market share in intrusion detection products for 8 consecutive years in the domestic market. The success of the market has ensured the continued development of the largest IDS product in the industry, which in turn ensures that Tianyi is the preferred brand of IDS products for users.
VenusStar has the largest user group in the industry. Through a perfect service mechanism, it ensures that users can effectively use the product while at the same time timely and continuously obtain various types of security threats, enabling users to have the latest and most complete threat detection event library in a timely manner.
VenusStars is the only professional IDS vendor authorized to view Microsoft's source code, Microsoft MAPP Security Partner and CNCERT's chief partner. It has the nation's first post-doctoral workstation for information security and the most powerful vulnerability excavation team in China - ADLAB. Secured the most cutting-edge research on intrusion detection.
Page 2: Wei Si network security isolation card (dual hard disk)
Weisi network security isolated card (double hard disk) V1.00 series products are physical isolation products approved and sold by the State Secrecy Bureau and approved by the Ministry of Public Security. The products enable physical isolation between internal confidential networks and external public networks. There is no physical connection between the external network, so that the information of the internal network will not be leaked; it can prevent network viruses and network hackers from permeating and attacking the internal network through the external network to ensure the security of intranet data and network applications.
The control principle is to install two hard disks (intranet and extranet hard disks) in the computer, which belong to two independent networks inside and outside. The network cable of the two networks and the control lines of the two hard disks are both connected to the network security physical isolation card, and the dedicated hardware control circuit on the card controls the switching between the hard disk and the network to ensure that only one hard disk and one network are working at the same time. State, while the other hard disk and the other network are completely physically isolated or non-working, the two networks and the hard disk cannot work at the same time, cannot access each other, and are physically isolated from each other, thus ensuring the maximum internal core network and data. safety.
For network environments where users are single-wired, Weiss offers a network security isolated hub solution.
The network isolation hub is a multi-switching switching device. When used in conjunction with a network security isolation card, it can transfer the switch between the internal and external networks originally completed on the isolation card to the remote device for switching. In this way, the network workstation computer uses only one network. The cable can physically isolate the internal and external networks and connect the internal and external networks in a time-sharing manner.
At present, Wei Si series of physical isolation products have been widely used in government, finance, scientific research, telecommunications, scientific research and military and other units, the number of users has more than 10,000.
Features of the product 1. Comply with the requirements of Article 6 of the State Council on Confidentiality, "The Regulations for the Computer Network's International Networking and Security Management of Confidentialities'" that the computer's internal network and external network must be physically separated."
2, pure hardware design, truly physical isolation. Effectively prevent network viruses and network hackers from attacking the internal network through the external network, so that the internal network operates in a very secure environment.
3, support for fast switching, switching time between internal and external network systems as short as 10 seconds.
4, good compatibility, applicable to the market of various mainstream models, mainstream hard drives, support for small chassis design, hard disk interface direction can be customized.
5. The isolated card is inserted into the PCI slot of the computer to isolate the network cable on the card and connect the internal and external networks respectively. The isolation card controls the connection and disconnection of the internal and external network's hard disk and the corresponding network.
6. Network and hard disk control use the same chip channel control to ensure network and hard disk switch synchronization.
7. Both internal and external networks can be switched freely.
8. Switching is convenient, switching between internal and external networks does not require hard switching, just click the icon on the screen to switch quickly.
9, with CMOS, BIOS rewrite warning function, switch password can be set when switching, to strengthen confidentiality.
10, with a floppy disk, optical drive, CD-ROM, USB flash drive and other detection tips and internal and external network shielding function 11, can be freely customized by the user to install the boot menu, you can customize the boot menu style.
12. It has the function of user-selectable setting switching mode. The user will move the cursor to the network status icon and right-click to perform the setting of switching mode such as shutdown and restart.
13, does not occupy the internal resources of the computer, will not cause any effect on the PC's performance and network.
14, support for plug and play, simple installation, user-friendly interface, easy to use, maintenance-free.
15, support IDE, SATA hard disk interface.
16, support DOS, WINDOWS9. X/ME/NT/2000/XP/Vista/Win7, LINUX and other operating systems.
IDS is a self-developed intrusion detection security product. Its main role is to help users quantify and locate threats from internal and external networks, provide targeted guidance and security decision-making, and It can evaluate the overall level of network security. IDS adopts a new generation of intrusion detection technology that integrates multiple analysis methods. It adheres to the “high-performance hardware platform with security optimization†and adheres to the “completely tested and effective†method. Presenting the product's core value orientation can accurately analyze and report various abnormal events and attacks that are taking place in the network in accordance with the user-customized strategy, realize the "overall detection" of the network, and provide real-time alarm information and The format report provides users with informative, actionable security advice, helps users improve security measures, and ensures that information is “presented†to users.
Comprehensive Testing - Comprehensive Information Collection: Tianyi IDS supports multi-level, distributed deployment, unified delivery of policies, and centralized information collection.
——Comprehensive protocol analysis: Tianyi IDS supports protocol self-identification and protocol plug-in technology, which can accurately identify protocols and new protocols of unconventional ports.
——Comprehensive detection mechanism: Tianzhu IDS supports two detection methods based on features and principles, and on the basis of guaranteeing detection accuracy, expands the range of detection identities.
——Comprehensive event analysis: VenusStar has a set of industry's most standard follow-up service support system to ensure rapid and accurate response to new events.
——Comprehensive detection scope: Tianyi IDS provides various anomaly detections such as network intrusion events, network violation events, and traffic anomalies.
——Comprehensive detection performance: Tianyi IDS adopts the shortest time priority algorithm to ensure the detection efficiency of products under high load conditions of network data.
Effective Presentation - Accurate Alarm Information: Tianhao IDS combines environmental fingerprinting technology and performs secondary matching with stored environmental information after discovering an attack behavior, and presents the alarm information that can be sure as "useful" to reduce the user's individuality. The analysis operation consumes.
——Detailed information presentation: In addition to information such as the address and agreement of both parties of the incident, Tianyi IDS's alarm information includes specific descriptions of the incident, vulnerability information, patching suggestions, and influencing systems, and can present the most detailed event information. To the user.
- Threat address location: Tianhe IDS provides alarm display in combination with actual geographic topology. In the case of large-scale deployment, the device topology can be combined with the geographic topology so that the administrator can intuitively and quickly determine the threat.
——Extensive Report Presentation: Tianyi IDS provides analysis reports based on multiple parameters such as time, address, and events. Combined with historical analysis data, it can clearly demonstrate the development trend of security construction and assist in considering the level of network security construction.
VenusStar has the largest market share in intrusion detection products for 8 consecutive years in the domestic market. The success of the market has ensured the continued development of the largest IDS product in the industry, which in turn ensures that Tianyi is the preferred brand of IDS products for users.
VenusStar has the largest user group in the industry. Through a perfect service mechanism, it ensures that users can effectively use the product while at the same time timely and continuously obtain various types of security threats, enabling users to have the latest and most complete threat detection event library in a timely manner.
VenusStars is the only professional IDS vendor authorized to view Microsoft's source code, Microsoft MAPP Security Partner and CNCERT's chief partner. It has the nation's first post-doctoral workstation for information security and the most powerful vulnerability excavation team in China - ADLAB. Secured the most cutting-edge research on intrusion detection.
Page 2: Wei Si network security isolation card (dual hard disk)
Weisi network security isolated card (double hard disk) V1.00 series products are physical isolation products approved and sold by the State Secrecy Bureau and approved by the Ministry of Public Security. The products enable physical isolation between internal confidential networks and external public networks. There is no physical connection between the external network, so that the information of the internal network will not be leaked; it can prevent network viruses and network hackers from permeating and attacking the internal network through the external network to ensure the security of intranet data and network applications.
The control principle is to install two hard disks (intranet and extranet hard disks) in the computer, which belong to two independent networks inside and outside. The network cable of the two networks and the control lines of the two hard disks are both connected to the network security physical isolation card, and the dedicated hardware control circuit on the card controls the switching between the hard disk and the network to ensure that only one hard disk and one network are working at the same time. State, while the other hard disk and the other network are completely physically isolated or non-working, the two networks and the hard disk cannot work at the same time, cannot access each other, and are physically isolated from each other, thus ensuring the maximum internal core network and data. safety.
For network environments where users are single-wired, Weiss offers a network security isolated hub solution.
The network isolation hub is a multi-switching switching device. When used in conjunction with a network security isolation card, it can transfer the switch between the internal and external networks originally completed on the isolation card to the remote device for switching. In this way, the network workstation computer uses only one network. The cable can physically isolate the internal and external networks and connect the internal and external networks in a time-sharing manner.
At present, Wei Si series of physical isolation products have been widely used in government, finance, scientific research, telecommunications, scientific research and military and other units, the number of users has more than 10,000.
Features of the product 1. Comply with the requirements of Article 6 of the State Council on Confidentiality, "The Regulations for the Computer Network's International Networking and Security Management of Confidentialities'" that the computer's internal network and external network must be physically separated."
2, pure hardware design, truly physical isolation. Effectively prevent network viruses and network hackers from attacking the internal network through the external network, so that the internal network operates in a very secure environment.
3, support for fast switching, switching time between internal and external network systems as short as 10 seconds.
4, good compatibility, applicable to the market of various mainstream models, mainstream hard drives, support for small chassis design, hard disk interface direction can be customized.
5. The isolated card is inserted into the PCI slot of the computer to isolate the network cable on the card and connect the internal and external networks respectively. The isolation card controls the connection and disconnection of the internal and external network's hard disk and the corresponding network.
6. Network and hard disk control use the same chip channel control to ensure network and hard disk switch synchronization.
7. Both internal and external networks can be switched freely.
8. Switching is convenient, switching between internal and external networks does not require hard switching, just click the icon on the screen to switch quickly.
9, with CMOS, BIOS rewrite warning function, switch password can be set when switching, to strengthen confidentiality.
10, with a floppy disk, optical drive, CD-ROM, USB flash drive and other detection tips and internal and external network shielding function 11, can be freely customized by the user to install the boot menu, you can customize the boot menu style.
12. It has the function of user-selectable setting switching mode. The user will move the cursor to the network status icon and right-click to perform the setting of switching mode such as shutdown and restart.
13, does not occupy the internal resources of the computer, will not cause any effect on the PC's performance and network.
14, support for plug and play, simple installation, user-friendly interface, easy to use, maintenance-free.
15, support IDE, SATA hard disk interface.
16, support DOS, WINDOWS9. X/ME/NT/2000/XP/Vista/Win7, LINUX and other operating systems.
- Material: Iron. Surface treatment: polishing.
- Size: 55*25*10mm. Weight: 30g.
- For the torque value to be set correctly in the concrete, the anchoring torque must be between 50-60 ft. / lbs.
- The smooth black powder coated surface looks great on the pouch and holds the jacket in place.
- Belt clip, snap clip, manual waist bag accessory, belt clip accessory, double rivet / screw hole make installation easy. (including rivet / screw).
For materials there are 65MN and STAINLESS STEEL selectable.
Size for stainless steel bet clip is 43.5mm*24.5mm*8mm, MOQ is 1,000pcs.
Size for stainless steel bet clip is 43.5mm*24.5mm*8mm, MOQ is 1,000pcs.
Except standard sizes which be mentioned above, other sizes can be customized as per your artwork, and MOQ is 5,000pcs.
Steel Belt Clip Accessories,Stainless Steel Clip,Accessories Belt Clip
Wintape Measuring Tape Company , https://www.wintapetape.com