Current Location: 首页 > Industrial control safety > Product system > End series product
  • The host security hardening system
  • Industrial network security terminal gateway
UHC Security Audit protection system
Haotian UHC security Audit protection system is a kind of protection equipment for protecting USB interface of target host,It is a bridge for secure interaction between computers and USB external devices,Innovative use of trusted technology, encryption technology, etc,Identity authentication is performed on connected USB devices (such as mouse and keyboard). Data is encrypted,Conduct a comprehensive audit of the post-access operations of mobile devices。
Special-shaped interface
Rule configuration
Encryption chip
Process audit
Functional characteristics
Highly reliable design
The hardware design of UHC safety protector is adapted to the industrial environment.No fan natural heat dissipation, to meet the long-term working requirements of the desktop;Protection level IP40, meet the requirements of industrial network application environment;USB power supply, built-in lithium battery and external 5V DC power supply triple redundancy to ensure uninterrupted protection。
Multiple security protection
USB is protected by physical, encryption, and software methods, including: USB self-locking plug, special-shaped USB slot, special encrypted USB flash drive, USB port device access whitelist, dedicated USB flash drive authentication, USB flash drive file encryption, and file access audit log。
Easy to use and manage
The UHC security guard provides management network ports and web-based management functions.Provide USB security management center for unified management of multiple UHC;USB Security Management Center supports group permission management for UHC and dedicated U disks。
The host security hardening system
The host security protection system is a host security protection software product specifically designed for industrial environments,Efficient, stable, compatible and easy to set up whitelist security protection technology,Only the service applications and software in the whitelist can be loaded and run,All processes outside the whitelist are prohibited from loading and running,Build a trusted environment for host computing,It fundamentally defends the possibility of malware installation and operation,At the same time, there is no need to update the sample library,Well adapted to relatively fixed business models in industrial environments,Protect the host from malware。The host security protection system can monitor the USB peripheral ports of the host, identify the types of USB access devices, strictly control the mobile storage media, and cut off the path of virus intrusion。
Process control
Host hardening
Peripheral control
Network protection
Functional characteristics
Threat intelligence driven
Machine learning and automated data processing technologies standardize multiple attack characteristics and generate machine-readable threat intelligence terminals to detect and respond to threats in a timely manner。
Trusted application whitelist protection
Any program or script must be checked before loading. Only the program or script whose feature value is in the whitelist can be executed。
Attack protection of industrial control environment
The use of unique protection methods, can effectively prevent Stuxnet, Havex, sandworm and other industrial control viruses and their variants, the use of mobile storage media on the industrial control host attack can also be prevented。
Good system compatibility
The use of lightweight kernel access control technology, low system resource occupancy, good software compatibility, maximize the availability of industrial host first security control objectives。
Intelligent patch and software update support
The intelligent system patch update and application software update tracking technology can automatically update the whitelist in the background without compromising security, greatly reducing the pressure on O&M management。
USB device whitelist protection
Limit the use of unauthorized USB peripherals and only allow connections to authorized, trusted USB devices。
Industrial network terminal security gateway
Haotian industrial network terminal security gateway is for industrial application scenarios, based on a solid SoC system platform and perfect software core construction, to achieve industrial site data acquisition, transmission, conversion, backtransmission, control and security protection functions。
Encrypted transmission
Trust mechanism
Edge computing
Protocol conversion
Functional characteristics
Advanced architecture
Based on highly reliable hardware architecture, it supports flexible access, transparent transmission and calculation processing of various industrial control protocol data, and realizes highly integrated field data edge computing architecture。
A variety of industrial control protocol support
Support a variety of field interconnection protocol libraries (Modbus/TCP, BACnet, DLT645, MQTT, PPI, etc.) to ensure interoperability and compatibility of existing systems。
Secure encrypted transmission
Supports the access and data output of various semaphore sensors, and the built-in encryption engine provides data encryption transmission to ensure data integrity and confidentiality。
Whitelist mechanism
Using the whitelist policy, the device blocks all untrusted data and protocols to protect against unknown threats。
High reliability
Industrial reliability design with fanless, wide temperature range to meet harsh environment deployment and stringent requirements in EMC, IP and other protection areas。

Shandong Yuntian Safety Technology Co., LTD. All rights reserved Lu ICP No. 17007379-1

Lu public network Anbei 37010202002190

" class="hidden">湖北美术学院