requirement analysis
Network security has become a highly concerned issue for enterprises, but current security solutions focus on backend and defense, such as firewalls, IDS, IPS, etc., lacking a perspective on the security of front-end access endpoints, unable to actively protect the network, resulting in arbitrary access of terminal devices and easy penetration of boundary devices. VPN and other transmission security solutions only ensure the transmission security between devices, and the devices are fully open afterwards, so there are hidden dangers in the transmission system. Enterprises need to establish a strict, standardized, and non counterfeit access behavior security management mechanism.
Solution
The communication network access control solution adopts comprehensive and highly hybrid access control technology, uses device to device communication encryption mechanisms, and highly flexible deployment methods to achieve multi-level and multimodal access security management, achieving the goal of purifying the internal network environment, regulating network behavior, and ensuring network communication security.
Plan composition
★ Endpoint security network card
Complete encryption and authentication of endpoint device network cards, and achieve communication encryption of controlled terminals; When the terminal is turned on and started, it will enter the security network card authentication interface;
★ Authentication server
Complete authentication and configuration management of secure network cards; After authentication, the terminal will be allowed to enter the operating system and network; Authentication failure, the terminal cannot access the operating system and enterprise network;
★ Security switch
Complete data exchange and communication encryption for endpoints;
★ Communication process between terminals
After the authentication is passed, all terminals perform communication encryption, and the security network card completes communication encryption and decryption of all data.
Application Fields and Patterns
★ Point to point encrypted communication
★ Point to network encrypted communication
★ Network to network encrypted communication
★ Mixed encryption