Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

A comprehensive automation project of a mining and mineral mine

According to the requirements of the security expansion of the industrial control system, at the industrial control system network boundary and important network nodes in some industrial control safety monitoring and auditing systems, through deep self -study, business -based behavioral audit rules, and in -depth analysis of industrial protocols, the business in the production area can be The rules are sorted out, restored operational behavior, and realized operation behavior audit and restore. Combined with the flow analysis engine, the flow base line is established to monitor the dynamics of each station in real time. At the same time, in order to establish an asset model for regional assets, the asset information is deviated from the state of asset information, audited the asset information of the approach, ensured the safety of the production of mining and mines, enhanced the audit of network security, and simplified operation and maintenance management.

Background

At present, the customer has built a basic security protection system in the office network and passed the level 2 of equal protection, However, most of the user's core production environment is an industrial control system, which currently does not have any security protection, the network connection is through the leased operator's broadband, and the geographical location of each mining area is relatively scattered, and the security incident response and operation and maintenance are difficult, In order to strengthen its production area behavior audit and event traceability capabilities, and meet the security expansion requirements of the graded protection 2.0 industrial control system, customers put forward higher security requirements for behavior audit, traffic audit, and event traceability.

Activity & Announcement
Solution architecture

According to the requirements of the security expansion of the industrial control system, at the industrial control system network boundary and important network nodes in some industrial control safety monitoring and auditing systems, through deep self -study, business -based behavioral audit rules, and in -depth analysis of industrial protocols, the business in the production area can be The rules are sorted out, restored operational behavior, and realized operation behavior audit and restore. Combined with the flow analysis engine, the flow base line is established to monitor the dynamics of each station in real time. At the same time, in order to establish an asset model for regional assets, the asset information is deviated from the state of asset information, audited the asset information of the approach, ensured the safety of the production of mining and mines, enhanced the audit of network security, and simplified operation and maintenance management.

Value to Customers
Monitor anomalous behavior in real time

Based on the behavior baseline model, it effectively improves the ability to detect abnormal behaviors in key production areas and helps users monitor abnormal behaviors in real time.

Reduce the workload of information O&M personnel

Based on the self-learning function, the business rules of the export boundary of the production area are deeply learned to realize the rapid online application of equipment and reduce the workload of information operation and maintenance personnel.

Quickly locate assets

For industrial environments with many and complex assets, it realizes rapid asset positioning, helps users sort out asset information, and refines asset management measures.

Multi-event handling mechanism

Provides multiple event handling mechanisms such as traffic, behavior, asset alarm logs, and event recording, providing strong evidence for security event traceability.