In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-04-11 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/03 Report--
Generally speaking, there are three security domain networks within the bank, namely, office network, production network and test network. The purpose of network isolation is to prevent data leakage. With the continuous expansion and development of business, the secure exchange and transmission of data between the three networks has become an important link in its business chain. The main data exchange situations and requirements include:
1. Realize the data exchange from production to test.
The production environment extracts data to the test environment for the construction of a new UAT environment or for year-end final accounts testing. The test environment transfers data to the production environment, and some scripts in the test are uploaded to the production data lab environment after the test is completed. After the data exchange platform is deployed between the two networks, the status quo of network isolation from production to testing will not be broken.
2. Realize the data exchange from production to office
The data exchange platform is connected to the production network segment and the desktop office network segment of the staff respectively. Data center personnel can obtain troubleshooting logs and inspection reports from production, and can also upload installation media, software toolkits, vulnerability scanning IP lists, etc., from the office environment to the production environment. After all operations have been approved, the cross-network data exchange is completed.
3. Automatic data exchange across networks
Regular standardized exchange process, automatic data exchange process can be configured, and data exchange can be carried out many times within a valid period after one approval.
Is there a platform that can not only meet these needs of cross-network data exchange among banks, but also ensure the security of data? Of course there is. Here is an introduction to the Ftrans cross-network file exchange system, which can solve all the above problems.
1. Good compatibility does not affect the original network isolation state.
Support a variety of network isolation schemes, such as network gates, firewalls, DMZ, etc., without changing the existing network equipment architecture of users. After the examination and approval of the exchange file is passed, the data extractor uploads the file and desensitizes it, filters the sensitive information of the data exchange platform, checks and disinfects the virus, and transmits between the production network area and the test network area.
2. Examination and approval strategy provides flexible log audit and query
Flexible setting of approval policies to support the definition of different user permissions and data access rights management. Support data antivirus desensitization, file feature check and filtering. Provide log audit and query. After virus checking and killing in the direction from office to production, employees in the data center can share it; from production to office, after filtering sensitive information and killing virus, the data center can share it out of the data center to the software development center.
3. Automatic data exchange keeps audit log.
Support cycle and real-time file synchronization, automatically call virus detection engine, provide task transfer notification strategy, support task priority setting management, support multi-task parallel transfer management, and retain audit logs.
4. File transfer encryption to ensure transmission security
Provide secure exchange, encrypted transmission and storage of files. Access using private file transfer protocol and SSL security protocol. Provide file access password and validity control. Automatic cleanup and destruction is supported.
The Flying Transmission Ftrans cross-network file security exchange system provides a "manageable, controllable and reviewable" data exchange process to build a secure exchange and transmission with controllable data flow between networks.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.