Product Center
Deepen the field of data security and build a comprehensive data security protection system
-
Big data security Secsmart BDS -
Cloud data security Secsmart CDS -
Application data security Secsmart ADS -
Data leakage prevention Secsmart DLP -
Basic data security Secsmart Foundation -
Data security governance Secsmart Governance -
Industrial Internet security Secsmart ICS
-
Big data security gateway It integrates the protection capability of the whole life cycle of data, and achieves unified user authentication, unified policy configuration, and unified asset management. -
Big data audit Big data in-depth analysis technology and high-performance data analysis and processing engine are used to monitor the risk, operation and performance of big data in real time. -
Big data encryption It is a security protection component for encrypted storage of big data platform, which encrypts and stores semi-structured and unstructured data of big data platform. -
Big data desensitization It is a security component for identifying sensitive data of big data platform, which can automatically discover sensitive data existing in data and desensitize in real time.
-
Cloud data security gateway With sensitive data protection as the core, it provides all-round data security protection capabilities to comprehensively guarantee the security of data assets on the cloud. -
Cloud data audit Through accurate risk intelligent identification technology, the database security protection and early warning capabilities are comprehensively improved, while providing security event tracking and traceability services. -
Cloud data encryption The encryption and protection of sensitive data can be realized by high-intensity encryption and storage of sensitive data on the cloud and authorization management. -
Cloud data desensitization The use of rich, rigorous and efficient desensitization technology can help customers transform sensitive data and output real "false data".
-
Application (API) data security gateway It can be linked with the data middle office to provide the application interface (API) with comprehensive data security protection capabilities to meet the application security compliance requirements. -
Application (API) data security audit It is a data security product on the web application side, which is used to help users sort out complex applications and interfaces and monitor the flow risk of sensitive data. -
Application (API) data desensitization It is a product for sensitive data protection in the application system/API service, which desensitizes the access behavior of sensitive data of low privilege users.
-
Network leakage prevention Through the traffic traction technology, the outgoing traffic within the controlled area is analyzed in depth, content recovery and sensitivity scanning. -
Email leakage prevention The standard mail transfer protocol is adopted to receive the e-mail forwarded by the mail server, and the security check is carried out for the sending information of the e-mail. -
Terminal leakage prevention Through the underlying technology and docking mechanism of the operating system, the leakage risk on the terminal computer is monitored in real time. -
Storage leak proof Data acquisition protocol is used to scan the organization's file server, database, application system and other equipment or environment with data.
-
Database encryption Model, form, specification, quotation SDE-SX-5500-GW-QA3 all-in-one machine localization hardware server complete machine: 2U rack type, redundant power supply, Hygon 5380 2.5G 16C 135W CPU * 2, 32GB Memory, 8T * 1 HDD, 2 * GE interface; Galaxy Kirin v -
data encryption It is a data security product for encrypted storage and authorized access of database sensitive data. -
Data desensitization It is a data security product that deforms sensitive data through desensitization rules to ensure that business sensitive data will not be disclosed. -
Data watermark It is a product that embeds the watermark mark into the original data and can trace the leaked data after the data is distributed. -
Database firewall It is a data security product based on database protocol analysis and control of data access behavior. -
Database audit It is a data security product that monitors the whole process of database access behavior, real-time alarms of high-risk operations, and audit traceability of security events. -
Data backup and recovery It is a disaster recovery backup system with comprehensive functions and strong compatibility, which can provide comprehensive and stable disaster recovery solutions for customers' data. -
Xinhu Storage It is a product that provides block, file and object data services to meet the storage requirements of the upper business system for structured and unstructured data. -
Data blackmail prevention It is a data security product that uses the underlying monitoring technology to monitor all programs on the terminal and server in real time and block various illegal programs. -
Database operation and maintenance management It is a data security product for the safety control of database operation and maintenance personnel.
-
Data asset security management platform It is a comprehensive management platform to comprehensively count data assets, dynamically track data, classify data by levels, and ensure data security and compliance. -
Data security threat awareness platform It is a platform focusing on the analysis, discovery, assessment and response of data security risks. -
Data Security Center The new generation of data security platform of Shanjie can comprehensively and accurately master the data security status and form a closed loop of data security monitoring.
-
Industrial safety intelligent supervision platform It is an integrated product for centralized management and control of safety products and safety events in industrial networks. -
Industrial safety monitoring audit It is an integrated industrial security product that focuses on industrial assets and provides core capabilities such as industrial threat monitoring and security event traceability. -
Industrial security firewall It provides network layer control and status monitoring capabilities of traditional firewalls, and effectively resists various network attacks and malicious damage against industrial control systems. -
Industrial real-time database audit It is an industrial data security product specially designed for industrial real-time databases and relational databases, which can discover and identify database security threats in real time. -
Industrial security threat perception It is a product for overall security monitoring and situation analysis of enterprise industrial control network, and can timely perceive network security threats, risks and hidden dangers. -
Industrial safety host guard It is an industrial control host safety protection product for monitoring host, operation station and data server in industrial control system.
Solution
News
Pay attention to industry trends and new flash news
-
2024-03-25 | Industry information| The 2023 Annual Meeting of the Project of "Research and Application of Key Technologies of Data Service Platform for Complex Scenarios", a key research and development plan of Zhejiang Province -
2024-03-20 | Enterprise News| Huawei Cloud joined hands with Flash Information to build an integrated data security operation system -
2024-03-20 | News| Authoritative recognition | Flash Information won the annual "IPv6 Pioneer Enterprise" award! -
2024-01-29 | Industry information| Data security blocks the way for "Snow City" to be listed? The way to break the situation with flash information -
2024-01-18 | Industry information| From the conflict between Palestine and Israel to see the way of attack and defense in the future data security battlefield -
2024-01-10 | Enterprise News| Flash information was selected into the 2023 Chinese Digital Security Capability Map -
2024-01-09 | Enterprise News| Flash information strength was selected into the Data Element Industry Map 1.0 of ICT Institute -
2024-01-04 | Enterprise News| Good start | Shanjie Information was recognized as the first unicorn enterprise approved by Yuhang District, Hangzhou City -
2023-12-22 | Enterprise News| Shining Milky Way | Shanjie Information Data Classification and Classification was rated as the excellent case of 2023 big data security of ICT Academy -
2023-12-14 | Enterprise News| Flash Information was selected as one of the top 100 digital enterprises in the Yangtze River Delta in 2022-2023