Security SD-WAN
Sunyainfo SD-WAN is designed based on the characteristics of SDN, integrating network orchestration with native security to solve the problems faced by users in traditional wide area networks, such as long business opening cycles, high operating costs, lack of guaranteed business experience, security compliance, and difficult network operation and maintenance. It provides users with a wide area network security interconnection solution that is flexible, convenient, secure, reliable, and secure for on-demand selection between data centers, headquarters, branches, and clouds, meeting the digital security protection and security operation needs of users in cloud, network, edge, and end scenarios.
Product Advantages
Full scene, unlimited connectivity
Supporting various hybrid WAN link access such as the Internet, dedicated lines, 4G/5G, etc., supporting networking models such as Hub spoke and Full mesh, providing hardware and virtualization deployment methods, and providing flexible access capabilities for various distributed users and locations anytime, anywhere.
Intelligent optimization to enhance user experience
Support precise application identification and link quality detection, achieve minimum bandwidth guarantee and optimal path selection based on applications, ensure application SLA, achieve optimal path transmission for business, seamless fault switching, improve access experience in packet loss environments, and guarantee access experience for core applications.
Integrated security, comprehensive protection
Fully integrating native security with SD-WAN, supporting advanced protection capabilities such as risk scanning, intrusion prevention, web protection, virus protection, behavior control, threat intelligence, and industrial control security, forming a comprehensive security defense system to provide customers with comprehensive closed-loop security protection.
Simple operation and maintenance, visible and controllable
Zero Touch Configuration (ZTP), plug and play, enables device deployment and maintenance without leaving home. Through the platform, it enables fast networking, unified strategy orchestration, status monitoring, situation analysis and other service capabilities, improving operational experience and work efficiency, and reducing operation and maintenance costs.
Assisting in innovation and entrepreneurship, independent and controllable
Adapt to domestically produced CPUs and operating systems such as Feiteng, Haiguang, Loongson, and Zhaoxin, and pass the commercial password product certification of the National Cryptography Bureau, providing users with secure, reliable, and independently controllable end-to-end data transmission and secure access, and providing customers with information and innovation security interconnection solutions.
User Value
Reduce networking costs
Supporting multiple forms of Internet access, significantly reducing the cost of dedicated lines
Zero configuration online, branch setup completed in minutes, reducing labor cost investment
Multiple high-performance hardware forms, excellent network and security processing capabilities, better device cost-effectiveness
01
03
Improve business experience
Based on business or application service reliability requirements (SLA), traffic scheduling is achieved dynamically, automatically, and efficiently on different wide area network links
Equipped with automatic and manual intelligent routing strategies to ensure critical business availability
Equipped with over 5000 global application feature libraries, updated and maintained by a professional team, supporting self-learning and self-configuration of applications
Enhance network security
Professional next-generation firewall, including intrusion prevention, virus protection, threat intelligence and other security detection and defense capabilities, to protect the network from vulnerability exploitation, virus propagation, and advanced threats
Provide boundary isolation and control capabilities for different regions, departments, and business networks, and control permissions based on IP, applications, users, and other methods
Provide identity management for remote office personnel to ensure access compliance and security
02
04
Improve operational efficiency
The platform provides global network and security visibility and configuration management
Zero contact deployment, automated networking, and centralized distribution of platform security configuration
The platform provides network status analysis, security situation, and business operation analysis capabilities
Automated generation of reports on the platform, customization of report content and format
Application Scenarios
  • Multi branch secure networking
    SD-WAN security gateways are deployed at the headquarters and various branches, using locally built or meta-SaaS matrix platforms to quickly deploy ZTP and template orchestration of devices across the entire network, quickly building a secure overlay network between the headquarters and branches, and providing comprehensive data security and boundary security capabilities to enhance WAN network security.
  • Cloud network integration business interoperability
    Establish secure access channels between the enterprise headquarters, branches, and cloud-based businesses to achieve reliable business access. Hardware security gateways can be deployed at the headquarters and branches, while virtualization gateways can be deployed on the cloud. Unified and fast networking, centralized monitoring, and remote operation and maintenance management can be achieved through the headquarters' private cloud or SaaS model matrix platform.
  • IoT/Regulatory Data Feedback
    Industrial control, video surveillance, IoT information, etc. require real-time data transmission back to a unified monitoring or analysis platform, but often have poor geographical location or operation and maintenance capabilities. By leveraging the plug and play and 4G/5G access features of the Sunyainfo SD-WAN security gateway and SD-WAN matrix platform, rapid online deployment can be achieved. Data transmission security is guaranteed through encrypted tunnels, and network status monitoring, link orchestration optimization, centralized operation management, and other functions can be achieved through the matrix platform.

WeChat

© 2024 Sunyainfo Technology Co., Ltd.