Background

To strengthen the construction of cloud computing service platforms and build a new generation of information infrastructure, governments at all levels are effectively promoting information sharing and business collaboration among various departments through the construction of government cloud platforms. Government cloud services have significantly improved urban management, business, production, and daily life. In the Government Cloud 1.0 phase, the focus was on the integration and sharing of infrastructure resources, while the defining characteristic of Government Cloud 2.0 is centered around data. In phase 2.0, there is an increased demand for the secure sharing of big data to prevent the creation of "information silos" and to ensure the safety and reliability of data.


Security Issues

1.Prevent external hackers from stealing data through attack behaviors.
2.Prevent data destruction and leakage by internal personnel and outsourced operators during operation and maintenance.
3.Provide securely available data for development, testing, and data analysis.
4.Conduct security monitoring of data transfer and invocation.
5.Meet policy requirements.

■ Industry Needs

■ Solution

• Utilize database auditing to regulate the transfer and invocation of data, promptly discover abnormal activities and risks associated with data, generate alerts, and facilitate post-incident forensics.
• Employ dynamic data masking and database firewalls to prevent unauthorized access to sensitive data by internal operators, preventing malicious and accidental operations.
• Use database firewalls to guard against data theft by external hackers through attack behaviors.
• Apply static data masking to provide offline data for development, testing, and analysis areas.

■ Customer Value

Comprised of a multi-layered defense system for database security, including database firewalls, data masking, database encryption, and database auditing, effectively preventing data leaks.

Depth Defense

Security measures are integrated throughout the entire data lifecycle, focusing on key aspects of data transfer, balancing business availability with data security.

Dynamic Protection

Supports both structured (databases, big data platforms) and unstructured (documents, files) data security solutions.

Comprehensive Protection