Solution
·
Zero Trust Network Access

Build Secure Access Anytime & Anywhere

With IAM system and always Verification philosophy, builds capabilities including attack surface reduction, identity verification, device security detection, dynamic permission control and data security hardening, creating an end-to-end Zero Trust secure access control system for enterprises.

Key Identity Pain Points

01.

Expanded Attack Surface

To meet office needs such as employee remote work and supplier/third-party access, enterprise application attack surfaces are expanding, making them highly vulnerable to internal and external security attacks.

02.

Inadequate Identity Verification

Some applications only verify identities via traditional usernames and passwords, lacking strong authentication such as MFA, leading to security issues like identity theft and spoofing.

03.

Insufficient Terminal Trust

Traditional security defaults to trusting internal network terminals; once compromised, they become attack springboards, threatening the security of core assets.

04.

Inadequate Permission Control

Rigid access permission control remains valid long after being granted, failing to adapt to personnel role changes or environmental risks, resulting in permission abuse and over-exposure.

Solution Highlights

Identity-Driven Security

Shifting from traditional network perimeters to identity-centric security, every access request is verified against user identity, roles, device status, behavioral patterns and access environment, enabling dynamic access authorization based on identity.

Application Stealth

Applications are completely hidden from unsecure networks; accessors can only connect for authorized access via trusted proxies (single-packet authentication technology), avoiding network scanning and direct attacks.

Continuous Trust Assessment

Access trust is not established once and for all, but information such as terminal security environment and user behavior is continuously evaluated in each session, with access permissions adjusted dynamically to achieve real-time risk response.

Dynamic Access Control

Access permissions are no longer static; they are dynamically adjusted based on real-time trust levels, environmental risks and resource sensitivity, realizing precise "on-demand, minimal" authorization.

Supporting Products

Value Matrix

Safty

Eliminating attack surfaces and enabling continuous verification extends protection beyond network perimeters to users and data, mitigating risk external attack and internal lateral movement.

Efficiency

Terminal All-In-One integrates multiple security products (e.g., VPN, EDR), reducing IT O&M complexity and hardware investment, realizing the intensification and cost reduction of security architecture.

Experience

Users can directly and securely access required applications from any location, eliminating dial-up waiting and performance bottlenecks of traditional VPN, and enjoying a smooth and consistent office experience.

Empowerment

Eliminate trust in network locations, take user and application identities as to build a cloud-native security plane independent of physical perimeters, realizing smooth migration to a Zero Trust security architecture.

Competitive Edge

Success Stories

Energy & Chemical Industry

Zero Trust Access Control Platform for Sinopec
Energy & Chemical Industry

Build a Zero Trust access control system with data security gateways, policy management and trust assessment subsystems to address cybersecurity challenges and meet business development needs. Realize dynamic access control and trust assessment for application access, enhance defense capabilities, business security and user experience. Add national cryptographic encryption and watermark protection for application data access to safeguard core business data security.

Government Sector

Secure Remote Access to Core Data for Chengdu Audit Bureau
Government Sector

Connect the municipal audit big data platform to the government intranet and enable communication between district/county terminals and the platform. Build a secure remote data access platform to ensure access process security, and add refined watermark protection to access pages to prevent sensitive data leakage.

Infrastructure & Energy Industry

Zero Trust Access Platform for PowerChina
Infrastructure & Energy Industry

A dynamic security defense system was reshaped for PowerChina based on digital identity, realizing trusted protection for access terminals, access environments, business traffic and applications, and reducing the attack surface of core businesses, in order to form a efficient and stable large-scale dynamic defense infrastructure. Meanwhile, the Zero Trust high-availability cluster guarantees PowerChina's wide area network services, and the identity security system supports secure and convenient remote work and O&M.

Cultural Communication

Zero Trust + Privileged O&M Secure Access for CCTV
Cultural Communication

This solution adopts the Zero Trust single-packet authentication mechanism to protect the security of CCTV's core privileged O&M resources, realizes face login through mutual recognition with password-free authentication systems; detects the security baseline of privileged O&M terminals via EDR clients, only allowing qualified terminals to access; and ensures data transmission security through QUIC encrypted tunnels.

Energy & Chemical Industry

Zero Trust Access Control Platform for Sinopec
Energy & Chemical Industry

Build a Zero Trust access control system with data security gateways, policy management and trust assessment subsystems to address cybersecurity challenges and meet business development needs. Realize dynamic access control and trust assessment for application access, enhance defense capabilities, business security and user experience. Add national cryptographic encryption and watermark protection for application data access to safeguard core business data security.

Government Sector

Secure Remote Access to Core Data for Chengdu Audit Bureau
Government Sector

Connect the municipal audit big data platform to the government intranet and enable communication between district/county terminals and the platform. Build a secure remote data access platform to ensure access process security, and add refined watermark protection to access pages to prevent sensitive data leakage.

Infrastructure & Energy Industry

Zero Trust Access Platform for PowerChina
Infrastructure & Energy Industry

A dynamic security defense system was reshaped for PowerChina based on digital identity, realizing trusted protection for access terminals, access environments, business traffic and applications, and reducing the attack surface of core businesses, in order to form a efficient and stable large-scale dynamic defense infrastructure. Meanwhile, the Zero Trust high-availability cluster guarantees PowerChina's wide area network services, and the identity security system supports secure and convenient remote work and O&M.

Cultural Communication

Zero Trust + Privileged O&M Secure Access for CCTV
Cultural Communication

This solution adopts the Zero Trust single-packet authentication mechanism to protect the security of CCTV's core privileged O&M resources, realizes face login through mutual recognition with password-free authentication systems; detects the security baseline of privileged O&M terminals via EDR clients, only allowing qualified terminals to access; and ensures data transmission security through QUIC encrypted tunnels.

相关资源