Be Asked

How do you control the operations and protect your data on servers?



The Real Challenge

Before you offer some solutions, you should know the real challenge of the risks?

Interface Security

How to avoid the server interfaces not to be exposed to irrelavant people?

Account Security

How to avoid the weak accounts, plain password and shared accounts?

Operation Security

How to protect data, avoid the abuse,  illegal operations and operations prone to error?

Our Patented Solution

We build a great server wall to act the same behavior of your real servers for your users, but have the policy to enchance the security.


Main Features

With 7 years customer trust and authoritative quality assurance, we offer you a mature solution.

Secure Interface

The interfaces on the server wall have the security policy. The real interfaces behind the server wall are unvisible to users. The interfaces on the server wall can also connect the isolated networks.

Secure Account

The accounts on the server wall have the security policy. The accounts for users are mapping to the real accounts. The real accounts behind the server wall are unvisible to users.

Secure Operation

Every operation can be masked, recorded and audited by the security policy, and every operation can be evaluated realtime by the security policy without impose threaten on the real server.

Out-Of-Box

No coding, No network configuration, No third party component, No client installation, deploying will be just in minutes.

Transparent and speedy

Users still use their old way to access the data. With our special thread pool, no speed loses.

Grouping

You can group your users and deploy different server wall to different group, which can map to the same real server.

Supported Protocols

Almost all protocols in your company are supported. New protocol will be added by our talent developers. Protocol Request is welcome.

Application Protocols


HTTP/HTTPS/Jul 2011

FTP/SFTP/Apr 2012

SOAP/RESTFul/Aug 2013

SAP/May 2014

TUXEDO/Jul 2014

SVN/Jan 2013

TFS/Apr 2013

POP3/SMTP/Jan 2009


Database Protocols


Oracle/Oct 2008

Sybase/Sybase IQ/Oct 2009

MSSQLServer/Nov 2009

DB2/Apr 2010

Informix/Jun 2010

Teradata/Jul 2011

MySQL/Jan 2012

Postgresql/Feb 2012


Host Protocols


SSH/Sep 2011

Telnet/Mar 2012

RDP/Aug 2012

Citrix ICA/Mar 2015

Rlogin/Dec 2011

VNC/Jan 2015