上网行为管理产品详情页面的banner
ACG (Application Control Gateway)
Sunyainfo ACG aims to improve work efficiency and ensure safe and compliant internet access. It integrates application control, bandwidth management, internet behavior audit, keyword filtering, user behavior analysis, security protection, and other functions to help users comprehensively understand network application models and traffic trends of all applications, optimize their bandwidth resources, ensure the normal operation of key businesses, improve bandwidth resource utilization, and provide strong support for ensuring data security, core business bandwidth, and avoiding legal risks.
Product Advantages
High performance and reliable architecture
Based on the independently developed secure operating system SunyaOS, a software architecture that separates control and business is adopted to maximize the processing capacity of each CPU core on a multi-core processing architecture. SunyaOS not only supports general-purpose X86 and ARM, but also supports domestic platforms such as Loongson, Feiteng, and Haiguang, as well as various virtualization platforms.
Effective application management
Adopting DPI/DFI fusion recognition technology, it supports over 5000 domestic and international applications and custom application functions. Through comprehensive analysis of user traffic, it deeply identifies the built-in actions of applications, and combines multi-channel queue priority mechanism to achieve blocking, speed limiting, and ensuring application traffic.
Refined behavior control
URL access control, keyword outbound control, file upload and download control, email outbound control, instant messaging control, Weibo access control, forum access control, etc. can be implemented based on dimensions such as IP, address, user, and time.
Full scenario traceability audit
By conducting correlation analysis on multidimensional information such as user identity, application traffic, web browsing, behavior actions, and access time, the user's online behavior trajectory can be presented clearly and intuitively, which helps management personnel to develop more targeted and accurate analysis, and achieve full path and full scenario traceability of network access behavior.
Digital asset security management
Support one click asset discovery, using various methods such as traffic learning, scanning and detection, terminal linkage, and manual input to help users quickly discover and manage digital assets. Assist users in conducting a unified asset security review based on their department, business system, importance, and other attributes.
Diversified identity authentication
Support multiple identity management methods such as local authentication, Radius authentication, WeChat authentication, visitor audit authentication, etc. Whether accessed remotely through the external network or local users, identity based resource permission control can be implemented to quickly build lightweight zero trust boundary solutions.
Meet compliance requirements
In the form of data statistics with pictures and texts, multi-dimensional audit keeps real name audit logs, and at the same time meets the requirements of relevant laws and regulations such as the Network Security Law, the Regulations on Internet Security Supervision and Inspection of Public Security Organs (Order No. 151 of the Ministry of Public Security), and "Equal Protection 2.0", so as to retain the data that customers care about.
Comprehensive security capabilities
In addition to effectively controlling user online behavior, it can also provide functions such as network access, intelligent routing, load balancing, intrusion prevention, virus protection, etc., forming boundary security protection and effectively safeguarding basic network security.
User Value
Behavioral control to improve work efficiency
Standardize internet regulations, implement humane control over non work related online behavior, and improve work efficiency;
Refine access permissions based on business content and organizational structure;
Ensure bandwidth based on critical business to improve efficiency.
Real name authentication to standardize access behavior
Users use their real names to access the internet and avoid the risk of anonymous users engaging in illegal activities;
Implementing domain control single sign on for enterprise employees and simplifying the admission process;
Provide universal and easy to use Internet authentication mechanism for guests and visitors to reduce access difficulty.
One machine with multiple functions, reducing investment costs
Fully meet the needs of scenario based construction and reduce enterprise construction costs;
Construction of Internet export gateway to provide network services for users;
Intelligent routing of multiple Internet exports to ensure stable business operation.
Application Scenarios
  • Enterprise network audit, policy compliance
    Monitor and audit web access, forum posting, email sending, and other content to avoid accessing illegal content, sensitive information leakage, and illegal speech dissemination. Audit and retain user online logs for traceability analysis of access behavior, in compliance with national cybersecurity laws.
  • Terminal access control and secure admission
    By combining network and business scenario requirements, local authentication, WeChat authentication, SMS authentication, QR code authentication, and other methods are used to establish the association of users' true identities, achieving secure access to all network terminals and ensuring trustworthy identity. Based on identity information, access policies are refined, business boundaries are converged, and unauthorized access is avoided.
  • Apply intelligent control to improve efficiency
    Personalized control is implemented for non work related online behaviors such as playing games, watching movies, downloading software, shopping and stock trading by enterprise employees to improve work efficiency. At the same time, combined with traffic analysis technology, P2P downloads, online videos and other applications are effectively restricted to ensure the bandwidth resources of customs clearance business, avoid network congestion and bandwidth resource waste.

WeChat

© 2024 Sunyainfo Technology Co., Ltd.