Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

Digital China Summit

The BRICS conference system is deployed in the cloud data center of the customer. The physical network environment is well protected by comprehensive security mechanisms. However, security risks in the cloud environment cannot be detected quickly due to the lack of a security system in the cloud data center. This severely threatens security of the conference system. Therefore, the customer is in an urgent need for a comprehensive cloud security system to ensure stable operation of the conference system.

Background

The Digital China Summit is co-hosted by Cyberspace Administration of China and other three departments to provide a platform for exchange of theories and practices for the Digital China program. Key application systems for the summit include: 3D scene system, summit app, facial recognition system, and exhibition management system. All these systems are deployed on the cloud platform. Secure communication between the application systems, micro-isolation between VMs, dynamic threat protection and security situation display on the cloud platform are key to the success of the summit.

Activity & Announcement
Solution architecture

The customer purchased nearly a hundred sets of Topsec Virtualized Firewall System and deployed them on the cloud platform to provide micro-isolation, advanced threat protection, and cloud risk perspective features. The customer can obtain real-time security situation in the cloud environment and adjust security policies accordingly. Topsec Virtualized Firewall System has protected more than 400 VMs on the cloud platform, ensuring a success of the summit.

Value to the customer
Cloud threat protection

With strong micro-isolation and advanced threat prevention capabilities, the system controls all traffic in the cloud environment, identifies sources of access requests, and protects the cloud platform from overflow attacks, RPC attacks, Web CGI attacks, Trojan viruses, worm viruses, and other threats.

Cloud risk perspective

The system monitors and analyzes paths of intrusions and malicious code transmission in the cloud environment, and determines the targets of attacks. Then, it creates a threat grid to assist in threat source tracing for the cloud environment.

Communication analysis

The system monitors real-time traffic and analyzes in depth the communication between VMs in the cloud environment to provide data evidence for setting cloud computing security policies. This cannot be implemented by traditional security products.