Introduction to DeepTech DAC Series Products

Introduction to DeepTech DAC Series Products

With the rapid development of the Internet of Things and the IPization of infrastructure communication systems, it will become a trend for massive devices to be connected through the network. In the public security, traffic police, electric power and other industries, a large number of IP cameras, snappers, RFID and other front-end devices have been deployed on a large scale in every corner of the city. Today's society has gradually entered the era of the Internet of Things. Compared with the traditional Internet, the number of IoT front-end devices is huge and the physical deployment range is wider. In addition to human-machine interconnection, it also includes a large number of device interconnections. How to ensure the full control and full-time availability of the Internet of Things is a new problem facing the industry. A large number of IoT front-end devices are scattered in an unattended environment, which is very easy to be exploited by hackers and then infiltrated into the entire network, resulting in the inability of the core business system to operate normally and a large amount of confidential information being stolen. Therefore, establishing a complete device security access and device application control mechanism is an important part of the construction of the IoT security system.

Deepin Technology focuses on the research of IoT terminal access authentication technology, IoT application whitelist control technology and other key technologies, and has developed a set of IoT application security control system DAC (Device Application Controller). The system can accurately control the entire IoT front-end IP devices and transmitted traffic. Only authenticated devices are allowed to access, and only legal applications are allowed to be transmitted in the network, thereby preventing illegal private connections, device counterfeiting, illegal scanning, DDoS attacks and other problems.

DAC devices are specifically designed for IoT application scenarios and can be widely used in industries such as safe cities, smart transportation, electricity, energy, medical care, and production automation. Especially for video surveillance application scenarios, DAC devices can solve the access authentication and security management issues of massive IP cameras and other front-end IP devices, helping users build a secure and controllable IoT.

■Double protection of device authentication and application control

DAC devices can control network access devices through device authentication methods such as MAC address, IP address, and feature code. Only authenticated devices are allowed to access the network, preventing illegal replacement and access of front-end devices.

At the same time, DAC devices support identification based on protocol features, and can perform application-level control on transmitted data, allowing only legitimate application data to pass, and blocking all other illegal data, effectively blocking illegal scanning, DDoS attacks, etc. This function can be enabled at the same time as the device authentication function, to precisely control the entire network access device and transmission traffic, achieving the effect of dedicated network for dedicated use.

■ Block illegal private connections and counterfeiting in real time

DAC devices can conduct comprehensive detection of the source address, destination address and application layer protocol of the data in real time, and block illegal traffic in real time once it is found; and DAC devices can accurately locate the IP address, MAC address, access port, geographic location, intrusion behavior and other information of the intrusion source, helping users to respond quickly to security incidents.

■Visual operation and management

DAC devices can monitor the transmission status of users' existing network services in real time, and dynamically analyze and display video, voice, image and other services based on protocol characteristics; at the same time, DAC devices can monitor the operating status of access devices in real time, including IP address, MAC address, online and offline time, geographic location, manufacturer and other information, and can analyze online rate, traffic share, etc., allowing users to control network status from a global perspective.

■Seamless integration of business systems

DAC devices support online deployment and side-by-side deployment, and can be seamlessly integrated into the user's network. For new networks, online deployment can be performed to monitor and control access devices and transmission data in the network in real time; for existing networks, side-by-side deployment can be performed to achieve control and monitoring through diversion, mirroring, and other methods.

The DAC device is based on the industry-leading APP-X high-performance hardware platform. The service processing delay is less than 20us, which is far better than the industry standard of 50ms. After the device is deployed, it has "zero impact" on the real-time services of the existing network.

DAC equipment supports linkage with equipment from mainstream security manufacturers to achieve deep coupling of networks and services.

■Full life cycle safety services

Deepin Technology can provide a full range of security services, including security risk assessment services, security planning and design services, security operation and maintenance services, and security training services, covering the entire stage of the information system life cycle, helping users to achieve comprehensive, continuous, and focused security protection throughout the process.

<<:  Gigabit broadband: speed for speed’s sake?

>>:  ADX application delivery ensures your business continuity and improves your access experience

Recommend

This article teaches you how to use C code to parse a network data packet?

[[416402]] The purpose of this article is to rand...

Here are 24 C++ pitfalls to avoid.

[[396092]] This article is reprinted from the WeC...

Industry Events in October 2019

October 2019 is coming to an end. What major even...

China Mobile and Huawei jointly complete 5G voice full function testing

Recently, China Mobile and Huawei jointly complet...

The difference between continuous delivery and continuous deployment

Continuous delivery does not mean that every chan...

5G changes everything. 5G will have a huge impact on many areas of life

From low-latency, ultra-high-speed bandwidth to i...

Uncovering the secrets of CDN user-driven product changes

Preface : OTT-TV and IPTV have become popular due...

AlienVPS: $5/month KVM-2GB/50GB/1Gbps unlimited traffic/Los Angeles data center

I searched AlienVPS in the blog and found that it...

Linux will support new network technology based on Li-Fi

According to phoronix, Li-Fi technology supplier ...