Enterprise network security management method, device, system and security gateway

A security gateway and enterprise network technology, applied in the fields of systems and security gateways, devices, and enterprise network security management methods, can solve problems such as easy loss and hidden dangers of enterprise data security, and achieve the effect of improving accuracy

Active Publication Date: 2019-05-10
三六零数字安全科技集团有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Compared with the traditional informatization model, there are three major security risks in the BYOD environment: first, it is connected through a mobile network link, which is naturally in an open network, while traditional important information systems are connected through the enterprise intranet. secondly, the usage environment is different from the traditional informatization model, most of the traditional time is in a fixed office, and the possibility of device loss is very small, while BYOD usually uses mobile terminals, which are more likely to be lost; thirdly, BYOD uses Many personal APPs are often installed on personal devices at the same time, and there are a lot of malware in the personal APP market, which puts corporate data at risk of security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enterprise network security management method, device, system and security gateway
  • Enterprise network security management method, device, system and security gateway
  • Enterprise network security management method, device, system and security gateway

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0078] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0079] figure 1 A flowchart showing a method for enterprise network security management according to an embodiment of the present invention, as shown in figure 1 As shown, the method includes:

[0080] Step S110, the security gateway of the enterprise network receives the network connection request from the corresponding application on the mobile terminal; wherein, the enterprise network has one or more security gateways, and each...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an enterprise network security management method, device and system and a security gateway. The method comprises the steps that the security gateway of an enterprise network receives a network connection request of a corresponding application from a mobile terminal, wherein the enterprise network comprises one or more security gateways, and each security gateway corresponds to one or more applications; the security gateway judges the received network connection request according to a preset rule; when judging that the network connection request is passed, the network connection request is released; and when judging that the network connection request is not passed, the network connection request is interrupted. The method in the technical scheme can be used for effectively controlling the application on the mobile terminal to access the enterprise network and specifically judging the network connection request sent by the application, so the accuracy is improved; and moreover, under the condition that each application corresponds to different gateways, the flow generated by each application can be monitored very conveniently.

Description

technical field [0001] The invention relates to the field of information security, in particular to an enterprise network security management method, device, system and security gateway. Background technique [0002] With the maturity and popularization of mobile terminals, personal mobile terminals represented by mobile phones and tablet computers have gradually entered the enterprise field. This phenomenon is called Bring Your Own Device (BYOD). Compared with the traditional informatization model, there are three major security risks in the BYOD environment: first, it is connected through a mobile network link, which is naturally in an open network, while traditional important information systems are connected through the enterprise intranet. secondly, the usage environment is different from the traditional informatization model, most of the traditional time is in a fixed office, and the possibility of device loss is very small, while BYOD usually uses mobile terminals, wh...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/10H04L63/101
Inventor 刘伟张豪
Owner 三六零数字安全科技集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products