Safety protection system, method and equipment and storage medium

A security protection and safety technology, applied in the transmission system, electrical components, etc., can solve the problem that network security equipment cannot be effectively protected

Active Publication Date: 2019-07-09
SANGFOR TECH INC
View PDF14 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

A single network security device cannot provide effective protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety protection system, method and equipment and storage medium
  • Safety protection system, method and equipment and storage medium
  • Safety protection system, method and equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to enable those skilled in the art to better understand the solution of the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0041] see figure 1 As shown, it is a schematic structural diagram of a security protection system provided by an embodiment of the present invention. The security protection system may include a micro-isolation management device 120, a security resource pool 130, and a micro-isolation terminal agent 110 installed on a host of a business system. , the security resource pool 130 includes at least one network s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security protection system. The system comprises a micro-isolation management device, a security resource pool and a micro-isolation terminal agent installed on a host of a service system. The micro-isolation terminal agent monitors the risk state of the host, obtains risk monitoring information and reports the risk monitoring information to the micro-isolation managementequipment; the micro-isolation management device reads the heartbeat information of the micro-isolation terminal agent, determines change information according to the risk monitoring information andthe heartbeat information, and reports the change information to the security resource pool; and the security resource pool adjusts a security protection strategy according to the change information and issues the security protection strategy to corresponding network security equipment. By applying the technical scheme provided by the embodiment of the invention, the network security device and the micro-isolation terminal in the host work cooperatively, and security protection can be effectively carried out on the host. The invention further discloses a safety protection method, micro-isolation management equipment and a computer readable storage medium which have corresponding technical effects.

Description

technical field [0001] The present invention relates to the field of computer application technology, in particular to a safety protection system, method, equipment and storage medium. Background technique [0002] With the rapid development of Internet technology, the business systems of various enterprises and institutions use the Internet more and more frequently, and face more and more various network attacks, such as violent database, ransomware, 0-day, etc. The business systems under attack are mainly due to weak security protection capabilities, or security loopholes in their operating systems or applications themselves, giving attackers an opportunity. [0003] At present, there are two main means of security protection: one is protection through hardware firewalls, and the other is protection through network security equipment. [0004] Among them, the hardware firewall protection is to deploy the hardware firewall at the exit of the physical network to clean the i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/0272H04L63/1408H04L63/20
Inventor 邓胜利
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products