SD- Security

We provide users with high-performance, high-protection firewall services. Leveraging precise big data analytics, we enable automated attack tracing, attack protection, virus filtering, and behavior control—while delivering one-stop SASE (Secure Access Service Edge) solutions to customers.

SD-WAN

SD- Security

We provide users with high-performance, high-protection firewall services. Leveraging precise big data analytics, we enable automated attack tracing, attack protection, virus filtering, and behavior control—while delivering one-stop SASE (Secure Access Service Edge) solutions to customers.

SASE security protection implementation

Cloud data analysis platform: A team of professional security personnel continuously tracks security vulnerabilities, viruses and Trojans and other security risk factors, and monitors their features and enters them into the cloud security database;

The cloud data analysis platform triggers updates to the feature database for all SD-WAN CPEs (SD-WAN Edges) that have subscribed to SASE services;

Each SD-WAN CPE(Customer Premise Equipment‌ ) compares all traffic flowing through the device to the feature database and intercepts it if a feature match occurs.

SASE security function introduction

Virus blocking function

When a virus file signature is detected, CPE will immediately download the link to the terminal and save relevant records on the control platform, which can be traced. The system can automatically generate reports.

Network attack monitoring and blocking function

When a network attack is detected, CPE will automatically block the attack traffic, save relevant records on the control platform and issue an alarm, and the attack records can be traced. The system can automatically generate reports.

File filtering function

Some files and contents can be filtered accordingly. The system can automatically generate reports.

Strong security features Visibility and defensive controls Applications
Domains
URL
Users, devices, and locations
Seven layers of defense and content security SSL decryption
Application/URL/file filtering
Antivirus
IDS/IPS
DNS
Four layers of defense Dos protection(ICMP,UDP,TCP flood)
Rate limiting
Three layers of defense ARP,IP ICMP
IPspoofing
Strict routing resource monitoring
Fragmentation stacking