Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

Network Security Level Protection Project of A Certain Hospital

Based on the important content of the overall strategic objectives of the health informationization plan, in order to strengthen network security construction, meet the requirements of the third level of equal protection, adapt to the constantly developing and changing new demands of informationization business, and comprehensively improve the level of network security management and control capabilities, this project is specially constructed.

Background

To strengthen the network security protection capability of a certain hospital and ensure the stable operation of medical core business, this project fully relies on the existing security measures of the hospital, supplements and improves the protection shortcomings, and constructs a scientific and standardized network security system. Implement regional isolation and graded protection. The project deploys multiple security products such as intrusion detection systems, focusing on strengthening the security of medical core business systems and comprehensively resisting various network threats. Meet the requirements of cybersecurity, comprehensively enhance the level of network security management and risk control capabilities, and provide support for various work such as hospital diagnosis and treatment, data management, etc.

Activity & Announcement
Requirement Analysis
01

Full traffic detection of network intrusion threats effectively protects business security.

02

can accurately detect network intrusion behavior, achieve real-time alarm and log retention, and support security traceability.

03

Integrate with the existing security system and strengthen the security protection of medical core business.

Solution Architecture

The network security level protection project of a hospital, combined with the status quo of the interconnection of multi hospital areas and multi business systems in the hospital, identified the core construction requirements for the security risks of Internet access, third-party docking and diagnosis and treatment business flow. The hierarchical and zoning protection system is adopted to divide the Internet access area, third-party access area, core exchange area, outpatient, inpatient building and security service area. Deploy WAF, database audit, and intrusion detection linkage situational awareness system in the security service area, build closed-loop protection, and comprehensively enhance the level of network security management and risk control capabilities.

Value to Customers
Attack Monitoring, Comprehensive Grasp of Threats

Covering 2-7 layers of various intrusion attack detection, providing strong information support for comprehensive threat control by constructing clear and intuitive network traffic abnormal changes, application composition, and existing attacks and violations.

Attack Evidence Collection, Easy Event Tracing

Provide detailed log storage and report display functions, which can collect evidence of attack messages, zombie hosts, malicious program samples, and threat intelligence samples, providing strong evidence for further legal action against intruders.

Compliance with Regulations, Effective Compliance Response

Providing comprehensive intrusion detection solutions helps meet the requirements of level protection and relevant policies and regulations, enhancing compliance capabilities.