Enterprise security management method, device and security management server

An enterprise security management and security management technology, applied in the field of enterprise security management methods, devices and security management servers, can solve the problem of low efficiency of security application system construction methods and achieve the effect of efficient construction

Active Publication Date: 2022-06-21
SIMPLECREDIT MICRO LENDING CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The current enterprise security system requires manual construction. First, check whether the enterprise has established corresponding security application systems (such as security scanning tools, security log collection systems, host-based intrusion detection systems (Host-based Intrusion Detection System, HIDS), etc.). If the safety application system to be built is not built, the safety application system will be downloaded, compiled, installed and configured manually until the complete safety application system is built. However, the construction method of the safety application system is not efficient.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enterprise security management method, device and security management server
  • Enterprise security management method, device and security management server
  • Enterprise security management method, device and security management server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0057] see figure 1, which is a schematic structural diagram of an enterprise security management provided by an embodiment of the present invention. In the enterprise security management architecture described in this embodiment, the security system information of the enterprise may be scanned first to obtain the security construction tools (such as security scanning tools, security log collection systems, HIDS, etc.) currently deplo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the present invention provides an enterprise security management method, device, and security management server, wherein the method includes: scanning the application system of the enterprise to obtain the first security application system deployed by the enterprise, according to the first security application system and the security The application system list determines the second security application system not deployed by the enterprise, wherein the security application system list indicates the security application system that the enterprise should deploy, and then obtains the second security application system from the application server, and Deploy the second security application system. Through the embodiment of the present invention, the construction of the enterprise security application system can be completed automatically and efficiently.

Description

technical field [0001] The present invention relates to the technical field of network security, in particular to an enterprise security management method, device and security management server. Background technique [0002] The current enterprise security system needs manual construction. First, check whether the enterprise has established corresponding security application systems (such as security scanning tools, security log collection systems, host-based intrusion detection systems (HIDS), etc.). If the security application system to be built is not built, the download, compilation, installation and configuration of the security application system will be performed manually until the construction of the complete security application system is completed, but the construction method of this security application system is not efficient. SUMMARY OF THE INVENTION [0003] The embodiments of the present invention provide an enterprise security management method, a device an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L41/0894H04L67/02H04L67/00
CPCH04L63/20H04L41/0893H04L67/02H04L67/34
Inventor 张登超
Owner SIMPLECREDIT MICRO LENDING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products