A Security Strategy Management System With Inbuilt Ticket System

<h6 style=”text-align: center;”>Safein Security Strategy Management System (TCM), with its inbuilt ticket system, provides solutions for the configuration change process. It supports both domestic and international mainstream network security devices and is able to conduct policy analysis, performance monitoring, strategy optimization, security reinforcement, configuration change and topological display on routers, switches as well as firewall equipment.</h6>

Product Features

Adopts simulation verification technology to effectively reduce risks caused by a change.
Provides full-process automation tools to effectively curb administrative costs.
Supports unified strategy management for multiple vendors and cross-brand debugging.
Provides second-level response to changes and 100 percent full roll back.
Provides well-resourced rule bank and knowledge base to strongly support management.
Has the ability to record and trace management changes based on ISO20000/ITSS ticket system.

Product Functions

Equipment DetectionAuto-discover network equipment in normal operation according to SNMP community strings and specified network information.
Detectable BrandsSupport Cisco series, Huawei series and H3C full network equipment system, and will fit domestic and more mainstream networks and safety equipment in the future
Detection ResultIssue statistical, detailed and/or asset reports on information statistics and test result analysis.
Safety FunctionsIdentify and tackle failures, user login timeout lock or logout, supporting encrypted data storage under des and safe data transmission under https.
Equipment Configuration AnalysisConduct in-depth and comprehensive examinations to network and configuration files of security devices, including user account, configurations of security protection, password, advanced management, routing, switching and log according to a massive amount of safety codes and standards, and data in the processing engine.

User Benefits

  • To regularly tease out and manage invalid, redundant and conflict strategies and improve the network performance
  • To safely transfer cross-brand rules during equipment upgrade
  • To narrow attack surface and alleviate network threats
  • To effectively implement security management strategy for enterprises and organizations
  • To improve business continuity by minimizing network and application downtime
  • To reduce input and costs of compliance audit, operation and maintenance personnel
  • To enjoy tools that enable quick response to security incidents
  • To use auxiliary tools for troubleshooting
  • To overlay traffic topologically, with transparent and visual safety state of the entire network
Technical Advisory
Contact Sales