Be Asked
How do you control the operations and protect your data on servers?
The Real Challenge
Before you offer some solutions, you should know the real challenge of the risks?
How to avoid the server interfaces not to be exposed to irrelavant people?
How to avoid the weak accounts, plain password and shared accounts?
How to protect data, avoid the abuse, illegal operations and operations prone to error?
Our Patented Solution
We build a great server wall to act the same behavior of your real servers for your users, but have the policy to enchance the security.
Main Features
With 7 years customer trust and authoritative quality assurance, we offer you a mature solution.
The interfaces on the server wall have the security policy. The real interfaces behind the server wall are unvisible to users. The interfaces on the server wall can also connect the isolated networks.
The accounts on the server wall have the security policy. The accounts for users are mapping to the real accounts. The real accounts behind the server wall are unvisible to users.
Every operation can be masked, recorded and audited by the security policy, and every operation can be evaluated realtime by the security policy without impose threaten on the real server.
No coding, No network configuration, No third party component, No client installation, deploying will be just in minutes.
Users still use their old way to access the data. With our special thread pool, no speed loses.
You can group your users and deploy different server wall to different group, which can map to the same real server.
Supported Protocols
Almost all protocols in your company are supported. New protocol will be added by our talent developers. Protocol Request is welcome.
Application Protocols
HTTP/HTTPS/Jul 2011
FTP/SFTP/Apr 2012
SOAP/RESTFul/Aug 2013
SAP/May 2014
TUXEDO/Jul 2014
SVN/Jan 2013
TFS/Apr 2013
POP3/SMTP/Jan 2009
Database Protocols
Oracle/Oct 2008
Sybase/Sybase IQ/Oct 2009
MSSQLServer/Nov 2009
DB2/Apr 2010
Informix/Jun 2010
Teradata/Jul 2011
MySQL/Jan 2012
Postgresql/Feb 2012
Host Protocols
SSH/Sep 2011
Telnet/Mar 2012
RDP/Aug 2012
Citrix ICA/Mar 2015
Rlogin/Dec 2011
VNC/Jan 2015