In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-02-03 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > IT Information >
Share
Shulou(Shulou.com)11/24 Report--
Beijing, October 23, 2023-Check Point ®Software Technology Co., Ltd. (Nasdaq: CHKP), a leading global provider of network security solutions, announced that it has successfully completed the deployment of terminal security solutions for Guoxuan Hi-Tech Co., Ltd. This security measure uses CheckPointHarmonyEndpoint endpoint security solution to protect users from network threats from all attack vectors, including phishing and zero-day extortion, thus helping Guoxuan Tech to expand its core business more securely.
Guoxuan Hi-Tech Co., Ltd. was founded in 2006, headquartered in Hefei, is a technology company specializing in energy storage and application, its main products are lithium iron phosphate materials and batteries, ternary batteries, power battery packs, battery management systems and energy storage battery packs, which are used in new energy vehicles and energy storage fields such as pure electric commercial vehicles, passenger vehicles, special-purpose vehicles and hybrid vehicles. It has 14 largest production bases in the world and is a leading enterprise in the domestic new energy industry. At the same time, Guoxuan Hi-Tech has a number of R & D platforms around the world and is committed to speeding up the pace of globalization.
With the continuous expansion of enterprise scale, the rapid development of business and the accelerated landing of digital transformation, the network environment of Guoxuan Hi-Tech has become increasingly diverse and complex. " Due to the increase in the number and frequency of attacks, the risk faced by the company has increased, "said Gary Li, vice president of Guoxuan Institute of Information Engineering." with the digital transformation and the normalization of telecommuting, the company's network security situation is becoming more and more serious. Because in the mixed office state, some of the company's devices will inevitably be connected to the external network, employees' personal office devices are extremely vulnerable to threats and attacks outside the enterprise, we do not want them to introduce vulnerabilities in networks that may have servers. Capturing, diagnosing, and repairing threats in remote and virtual desktop environments also significantly increases the burden on our team. We need better network protection strategies to fully understand the threats to our environment. "
In response to the increasingly complex network environment, Guoxuan Tech uses many different security solutions from a number of suppliers, all based on specific network management or network security requirements. However, with the change of the external network environment and the digital transformation of enterprises, as well as the needs of external business development, Guoxuan Hi-Tech urgently needs an efficient endpoint security management scheme to deal with the complex office environment and network security environment.
After full communication and POC testing, Check Point engineers deployed HarmonyEndpoint solutions for its terminal security architecture according to the actual situation of Guoxuan Hi-Tech. For OA Internet access devices, the scheme can be centrally managed through the cloud platform, and the virus signature library can be updated by the CheckPointThreatCloudAI threat intelligence cloud. At the same time, the user's local offline server can centrally manage and obtain the virus signature library through the local management server. After deployment, security managers of Guoxuan Tech can configure user identity-based security policies through the management console, and then protect host security through anti-virus, anti-extortion software, anti-vulnerability exploitation and other functions. At the same time, benefiting from Harmony Endpoint's powerful forensics function and automatic monitoring and recording of terminal events, users can view and record any of Guoxuan Hi-Tech's 2000 endpoints, and if security risks and threats arise, managers can respond quickly to high-risk accounts, saving labor while ensuring the network security of the entire company.
Sharing the solution experience, Mr. GaryLi said, "before choosing the Check PointHarmony Endpoint solution, we conducted a detailed survey and comparison of the products and solutions of a number of companies. As a technical control department, we are most concerned about whether its solution can help us solve the current problems quickly and efficiently, and technically compare which product and which solution can intercept phishing email and malicious email more efficiently; which product is more efficient to solve our current network security risks. As it turns out, Check Point did it. With Harmony Endpoint, we protect all endpoints involved in our employees' daily work, completely prevent the use of phishing sites, prevent credential theft, protect all terminals in real time, and protect against blackmail, malware, and no-file attacks. For example, Anti-Ransomware defense extortion software, Behavioral Guard defense against Fileless attacks, especially Threat-Emulation can defend against unknown malicious threats and can remove threats before they cause damage. " At the same time, all CheckPoint security solutions are supported by its industry-leading threat intelligence system, ThreatCloudAI. This enables security managers of Guoxuan Tech to protect core data and deploy endpoint solutions individually according to business needs. Mr. GaryLi said: "not many foreign security manufacturers have landed the threat intelligence database in China. This message gives us the impression that we not only buy Check Point terminal security products, but also enjoy Check Point professional security information and professional services.
He Weiguo, Regional Director for Greater China of CheckPoint, said: "CheckPoint is very grateful to Guoxuan Hi-Tech Co., Ltd for its trust. As an important strategic market for the company, we have been committed to providing Chinese users with security solutions that better meet the needs of localization, which is the original intention of CheckPoint to land the industry-leading threat intelligence system ThreatCloudAI in China. Adhering to the "prevention first" security concept, CheckPoint hopes to help users take the initiative to defend themselves before a danger occurs, thereby minimizing losses. As a leading enterprise in the field of new energy, Guoxuan Hi-Tech is not only based on the domestic, but also focuses on the global market. As a key factor of production and an important strategic asset, data has attracted the attention and attention of governments, and various countries have generally strengthened their regulation in the field of data security and privacy compliance for various considerations. CheckPoint is confident that through leading security solutions, Guoxuan Tech can more safely enhance its innovation capabilities and core competencies, thereby successfully realizing its business vision of expanding the global market. "
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.