• 国内电信产品
  • 香港电信产品
system integration 

Stable, secure, elastic and high-performance cloud computing services to meet your diverse business needs in real time

当前位置:系统集成
Network security solution

Cisco network security solutions for small and medium sized enterprises
 

“"Security protection of technology and management established and adopted for data processing system, and protection of computer hardware, software and data from accidental and malicious damage, alteration and leakage".

                                                                                                                                                                                          ----International Organization for Standardization (ISO)

From "information superhighway" to "Digital Earth", the wave of information swept the world. The rapid development of Internet not only drives the rapid growth of information industry and national economy, but also brings vitality to the development of enterprises.

The development of information technology represented by Internet not only directly affects the technological innovation and productivity improvement of enterprises, but also gradually becomes an important force to improve the competitiveness of enterprises.

Enterprises can share the resources all over the world through the Internet, but because of its openness, the information transmitted on the Internet will inevitably face many risks in terms of security. When more and more enterprises put their business activities on the network, all kinds of illegal intrusion, virus and other activities against the network system also increase.

The solution of these information security problems we are faced with mainly depends on modern information theory and technical means, on security architecture and network security communication protocol and other technologies, and on all kinds of hardware or software security products. In this way, these security products will become a realistic choice for us to solve security problems.

Analysis on the demand of network security in China

Analysis of network status

China's domestic enterprises and government agencies want to be competitive and improve production efficiency, which must respond to the market demand in a timely and effective manner, thus triggering the trend of relying on the Internet to obtain and share information, so as to further improve production efficiency and promote future growth.

However, where there are networks, there are security problems. In the past, the network was mostly closed, so it was easier to ensure its security. Simple security equipment was enough to undertake its task. However, today's network has changed, ensuring network security and availability has become a more complex and necessary task. Every time users connect to the network, the original security situation will change. Many enterprises have become victims of cyber crime frequently. Because of the complexity of today's network business, relying on the early simple security equipment has been unable to solve these security problems.

Main network security problems and their harms

----Network attacks are increasing rapidly.

  Network attacks usually take advantage of some inherent characteristics of the network, such as unauthorized access, password theft, denial of service and so on.

Considering the loss of business and the decline of production efficiency, as well as the additional expenses caused by troubleshooting and repairing damaged equipment, the damage to network security can be devastating. In addition, serious network security problems may also lead to the destruction of the public image of enterprises, legal responsibility and even the loss of customer confidence, and the resulting cost loss will be incalculable.

----The impact of virus mail attack is increasingly fierce

  Viruses, worms and a large number of unnecessary e-mail use Internet communication resources to spread, causing transmission interruption in the network environment. According to the survey, more than 87% of the virus entered the enterprise through e-mail! The loss of confidential data and trade secrets and the improper use of e-mail system by employees have made many companies bear legal liability and damaged their reputation.

Today, more and more companies are looking for an active solution to reduce the interruption time of information service and avoid business loss during virus invasion.

----Unreasonable use of network resources

Open access also allows unlimited access to a large number of malicious, offensive and controversial content, as well as non work related materials. According to IDC statistics, 30% ~ 40% of Internet visits are unrelated to work, and some even visit pornographic sites. The average person spends two to three hours a day working to send and receive personal e-mails, browse entertainment websites and spend time in chat rooms.

Therefore, many organizations must determine how to allow employees unimpeded access to a large amount of useful information on the Internet while limiting access to inappropriate content.

Customer analysis of small and medium enterprises in China

Due to the limitation of manpower and capital, small and medium-sized enterprises in China need not only simple installation of network security products, but also integrated solutions for complex network applications, such as network security, virus detection, website filtering, etc. Its focus lies in: products of leading manufacturers at home and abroad; the ability to deal with emergencies; real-time monitoring and easy management; customized security policy configuration; users can easily improve their own security system.

Cisco Security blueprint (SAFE)

Safe is the blueprint of Cisco's security solution, which is mainly aimed at the functions of enterprise network, and can provide end-to-end security strategy for the design, implementation and maintenance of customer's security network.

The blueprint can modularize the design and deployment of network security solutions, and provide users with integrated and comprehensive solutions combined with Cisco partner products. In this way, market leading security products, mature and reliable security policies and single platform management can be combined with customers' existing network infrastructure to provide comprehensive network protection

Provide efficient investment protection without discarding existing network devices

Modular deployment can gradually realize deep layered defense

Good interoperability with partners

24x7 global technical support

Security market leader

Easy to manage
Cisco network security solutions for small and medium sized enterprises

In view of the actual situation of Chinese small and medium-sized enterprise customers, combined with Cisco's advanced safe blueprint design concept, Cisco has specially launched the "network health application health mental health" network security solution for small and medium-sized enterprises

Compact version:CiscoSecurePIX501

Standard Version:CiscoSecurePIX501+TrendMicro25用户+Websense25用户

Luxury version:CiscoSecurePIX506E+TrendMicro50用户+Websense50用户
The above three solutions are integrated and effective solutions proposed by Cisco for the most common network security, virus detection, website filtering and other security problems. Through the close combination with partners, they provide customers with a set of modular bundled products to effectively solve the actual needs of existing small and medium-sized enterprise users.

Cisco securepix500 series firewall is a special hardware product that implements internal network infrastructure to strengthen user security policy and limit access to network resources. Its function is to check the packet and session process, and analyze and control the incoming or outgoing packets according to the specific parameters set for different applications, addresses or user types. Through the deployment of pix, users' public Internet servers can be protected, the data flow from external network to internal network can be limited, and various functions such as network address translation (NAT) can be provided for internal users, so as to provide users with network-based attack protection, and prevent and eliminate the distributed denial of service attack (DDoS) which causes bandwidth congestion.

The product developed by trendmicro is a policy based high-performance anti-virus and content security solution for SMTP gateway. It integrates virus protected content filtering function, which means that with this product, you can manage e-mail content filtering and provide control, and prevent viruses and other malicious code in e-mail from affecting. Protect the enterprise information processing system from the damage of e-mail virus from the Internet, and prevent replication or non business content transmission.

Websense enterprise developed by Websense company is an employee Internet management system, which can provide integrated Internet filtering for Cisco PIX Firewall and help network administrators effectively monitor, manage and report the network traffic from intranet to Internet. Network administrators can specify policies that restrict Internet use within an organization. Websense enterprise then filters network activity, monitors and reports information about the activity based on predefined policies. When Websense main URL database is shared with Cisco PIX Firewall, flexible and high-performance content filtering strategy can be created. The Internet request is sent to the Cisco PIX Firewall, followed by a query from the firewall's Websense to determine whether the request should be allowed or blocked. At the same time, Cisco PIX Firewall sends the original request to the Internet. Because the request is sent to the Internet before receiving the confirmation from Websense, the Cisco PIX Firewall will not slow down the access of authorized enterprises. Websense confirmation is required before returning the site to the requesting user, which can prevent unauthorized access


Firewall solution for NetScreen small and medium sized enterprises
 

1) Definition of small and medium enterprises

Small and medium-sized enterprises are defined as regional offices, branch offices, headquarters of medium-sized enterprises, etc.

2) The current situation of small and medium enterprises network


The network status of medium-sized enterprises is as follows: the number of network information points is 50-500; the network construction has a certain scale, with large-scale network equipment, such as routing switches

Router, etc.; Internet connection through dedicated line; mobile users need to access the enterprise network; independent information publishing system, such as web and mail server.

 
3) Problems of network security in medium sized enterprises

Through the analysis of the above network status, combined with the actual situation of medium-sized enterprises, we believe that the network security of medium-sized enterprises mainly faces the following problems:

a: After the network is connected to the Internet, the gateway needs to be protected to prevent hackers and viruses from attacking the network;

b: Mobile users access the enterprise network without any encryption through the Internet, which may cause the theft of important data of the enterprise;

c: Network virus is the biggest threat to enterprise network security, which may cause serious consequences such as operating system crash, data loss and network paralysis

d: Due to the independent information publishing system, such as web and mail server, centralized security protection is needed to ensure the normal operation of these systems

The operation of the system

e: Due to the large number of computers in the enterprise network, the operating system patching, application software distribution, computer asset management, computer operation monitoring and other repeatability

Work, a serious impact on the efficiency of the network management department, so that the cost of enterprise maintenance is greatly improved.

4) Network security solutions for medium sized enterprises

In view of the above medium-sized enterprise network problems, we propose the following network security solutions: configuration of a firewall, gateway protection, prevent hackers, disease

In order to attack the internal network and access mobile users through VPN function of firewall, the firewall model can be selected according to the following corresponding relationship;

Number of users firewall model VPN channel


50-100 Netscreen-25/25B 50 
100-200 Netscreen-25/50B 125 
200-300 Netscreen-50/204B 500 
300-500 Netscreen-204/208 1000 

Configure a set of kill security armour network anti-virus system to prevent the operating system from infecting virus and prevent the spread of network virus; configure a kill Filtering Gateway: KSG

500, the gateway anti-virus, and security protection of information publishing system; configuration of a kill terminal security management system, can effectively control the enterprise network

There are computers for asset management, system patch distribution, application software distribution, computer operation status management, so as to greatly improve the work efficiency of network management department

To improve the efficiency and reduce the cost of enterprise network operation.  

The network structure is as follows:

 
5) Advantages of the scheme

The above network security solutions for small and medium-sized enterprises have the following advantages:

a: "Juniper NetScreen is the largest firewall / VPN equipment manufacturer in the world. Its products have excellent success cases in various industries, and its strong technical support is very important

Technical advantages and our excellent after-sales service ability will eliminate worries for users;

b: "Firewall and VPN are integrated in the same device, which simplifies the network structure, reduces the equipment investment, and reduces the difficulty of gateway equipment maintenance;" kill security

Armour network anti-virus system is an anti-virus system certified by the Ministry of public security. It has powerful functions, can check and kill all viruses, and can automatically update all users

, automatic upgrade.

c: "Through the double authentication of the Ministry of public security, the filtering gateway can filter viruses, worms, spam and sensitive content, so as to improve the overall security level of the network

A new step has been taken;

d: "The terminal security management system provides a comprehensive technical support for the end point lifecycle management (ELM) strategy, including

Cover asset management, terminal protection, application supervision, audit analysis, etc., and combine terminal security, management and maintenance with its business objectives to ensure the continuous development of computer terminals

Effective operation. Due to independent research and development and focusing on the needs of domestic users, it is closer to the actual use situation of domestic users, and can be customized according to new needs

development.