With the expansion in enterprise and organization networks, multiple access points such as branches, mobile users, and guests are being increasingly added. With each new layer, the vulnerability of the network greatly increases. Professional interest-driven hackers attack the terminals of enterprise and access key resources to infiltrate the system’s core services. In this way, data gets intercepted or damaged, core services interrupted, and malicious codes spread – greatly compromising an enterprise’s services and reputation.
Based on a comprehensive security evaluation of terminals and unified terminal configurations, Huawei Secospace’s terminal security management (TSM) system actively evaluates a terminal’s security status before accessing the network, constructs a role-based network access mechanism, and repairs the system vulnerabilities of insecure terminals. In this way, viruses are blocked and a complete, simple, easy-to-manage terminal security environment is constructed for the enterprise or organization.
In-depth defense: By combining the terminal, network, and application layers an in-depth defense system is formed, and a complete security defense line constructed for the enterprise or organization. More specifically, the TSM actively evaluates terminal statuses at the terminal layer, cooperates with the security access control devices at the network layer to implement role-based access control, and implements patch and asset management at the application layer to block threats, thereby effectively improving the defensive capability.
Unified deployment: To defend against increasingly complex security attacks, enterprises must deploy multiple types of terminal management products. However, as these products are unrelated to each other, deploying in a centralized manner on a network is difficult – procurement costs are high, and the network architecture complex and difficult to maintain. To meet the demand for simpler IT solutions, the TSM provides enterprises with an integrated terminal security management solution that combines network access control, security policy management, staff behavior management, patch management, asset management, and software distribution. It reduces the total cost of ownership (TCO) for terminals as well as deployment complexity.
Comprehensive protection: Internal information security management is a systematic project that takes security regulations, technologies, process, and management into consideration. The TSM focuses on security policy and enhances the continuous PDCA defense process of checking, quarantining, monitoring, and remediation. It offers a comprehensive security management and protection solution for intranet terminals and continually increases an organizations information security level.
Major functions of the Secospace TSM:
· The TSM provides the network security access control function – it does this by detecting and controlling access of internal staff, guests, and partners, thereby preventing unauthorized users and insecure terminals from accessing the intranet. In addition, it authorizes users to access intranet resources according to users' identities.
· The TSM provides the terminal security baseline management function – it does this by configuring the security baseline of terminals in a centralized manner, comprehensively evaluating the terminal statuses, and isolating and repairing insure terminals to increase the terminal’s security protection level, thereby enhancing overall enterprise network security.
· The TSM provides user behavior management – it does this by auditing and controlling terminal user behaviors that violate the enterprise management system such as illegitimate external connections, computer peripherals, and network access behaviors, thereby avoiding malicious attacks to the network, regulating the use of IT resources, and improving network efficiency.
· The TSM provides an intelligent, efficient patch and software distribution function, detecting system vulnerabilities, reducing bandwidth usage to the maximum extent, helping terminals to update patches in time, and repairing system vulnerabilities.
· The TSM provides enterprises with an asset security auditing function – it does this by dynamically collecting s an enterprise’s software and hardware asset information, tracing asset changes, and helping administrators comprehensively understand the asset status, thereby improving an enterprise’s IT management capability.