Traditional Culture Encyclopedia - Hotel accommodation - Which online behavior management system is more advantageous?

Which online behavior management system is more advantageous?

Jinshan online behavior management system is a hardware audit product based on online behavior, which has dual application functions of online behavior audit and network security protection. With the help of * * * sharing the common * * framework system platform, behavior audit, content audit, system security management, web content management, email content management, IM & amp; P2P, audit management, etc. The modular design structure can provide users with personalized customized configuration to meet the needs of different periods. It also provides a variety of deployment modes such as gateway, bridge and bypass to meet the diverse needs of complex network environment.

Its rich management functions and applications include:

Manage online behavior

Stop online entertainment activities

Monitor web browsing

Monitor file transfer

Monitor chat history

Monitor e-mail content

Second, the product function:

All-round monitoring, network behavior is caught.

Web browsing monitoring-real-time recording of all the web pages visited by users in the local area network (including access time, web page content, belonging website, geographical location, etc. ) and provide it to managers in the form of web snapshots.

Information submission monitoring-real-time recording of all data submitted through web pages (website login, BBS posting, service application, etc.). ), and restore the data for managers to see.

E-mail monitoring-Real-time recording of e-mails sent and received by all users in the local area network (POP3/SMTP protocol), recording information such as network card address, IP address, sending and receiving time, title, recipient/sender, attachment, content and e-mail size, and directly viewing the e-mail content and its attachments.

File transmission monitoring-real-time recording of files uploaded and downloaded by all users in the network through FTP protocol and files transmitted by web pages, instant messaging tools, etc.

Chat monitoring-monitoring the use of all users' chat tools (QQ/MSN/YMSG/ICQ, etc.). Log in to the LAN in real time, and record the local ID, the other ID, online time, etc. Online users, and fully restore and view the chat content of MSN and YMSG.

Network traffic monitoring-check the real-time traffic and traffic trends of all users in the LAN.

Completely banned, put an end to online entertainment during working hours.

Network access rights-according to application requirements, you can set network access policies (including VIP access, network disconnection and rule filtering).

Web page access control-according to the time policy, set the access rights of different users or groups and control the online information submission rights of web pages.

E-mail control-according to the time policy and e-mail control policy, set the e-mail control rights of different users or groups. Specific control items include sender filtering, recipient filtering, email subject filtering, email content filtering, etc.

File transfer control-Set file transfer permissions for different users or groups according to time policy and file transfer control policy. Specific control items include: allow/prohibit FTP access, allow/prohibit FTP upload, allow/prohibit FTP download, allow/prohibit FTP upload file filtering, allow/prohibit FTP download file filtering, and web page file downloading filtering.

Instant Chat Control-Allow/prohibit instant messaging software such as QQ/MSN according to time policy. Using the fingerprint technology of instant messaging protocol, QQ/MSN is completely forbidden to log in through web port or proxy. MSN chat content can be fully monitored, and QQ chat content can also be fully monitored after the client is installed.

IP layer filtering-set IP white list (VIP all-pass) and IP black list (no network connection) for applications such as antivirus software upgrade.

Port-level control-realize communication port-level control for TCP/UDP transmission protocol. Online games (such as Lianzhong, China Game Center, etc. ) can be banned, and the online game behavior control list can be added by itself. Prohibited control list can be customized, such as stock software, Netease bubble, global communication, Taobao commerce and so on. , and supports blacklist and whitelist functions.

Peer-to-peer software control-complete control of software such as eDonkey/Emule, BT, Kazaa, pplive and stock trading by using communication protocol fingerprint technology.

Harmful information filtering-through intelligent learning and fuzzy matching technology, effectively filter harmful information on the Internet, including reactionary, cult, pornography, violence, drugs, gambling, etc.

Detailed access policy configuration

Group strategy-assign every employee and every computer access to the Internet; You can manage employees in each department through groups and set different access policies for different departments.

Time policy-All controlled projects support setting access rights 24 hours a day.

Filtering strategy-Powerful filtering keywords define matching wildcards, and flexible access filtering strategy is defined.

Traffic policy-The maximum and minimum guaranteed traffic of the target company can be flexibly set according to IP, user name and group, and the priority of the target company can be set.

Convenient and efficient log analysis and statistics function

KingGate Security Gateway provides powerful query function and various forms of statistical reports to help you understand the company's network behavior and resource consumption from multiple angles. You can query by content keyword, application agreement, department, employee, IP, time, history, prohibited items, combination, time period, department and user, and time period. And support Excel package log export function. It is convenient to customize more flexible and powerful custom reports.

Third, product advantages:

Intelligent integration

Kingsoft Internet Security online behavior management not only provides behavior and content audit, but also pays attention to protecting users' networks. Provide effective security protection, content monitoring and filtering, and give users a deep protection barrier.

Comprehensive audit

Focus on auditing web page access, mail sending and receiving, file transmission, information exchange, etc. At the same time, don't forget to audit P2P, games and access control behaviors, and provide users with a comprehensive network application status analysis.

Content audit

Through a powerful management platform, control and restore application-based content, such as online content, email content, file transfer content, chat content, system content, P2P, games and so on. Powerful anti-leakage function, various ways to prevent the disclosure of confidential information of enterprises, and provide a comprehensive analysis of network application.

Hotel audit

Kingsoft online behavior management fully considers the particularity of hotel industry audit, organically combines hotel online management and audit, and provides open code and non-open code authentication methods; Provide plug-and-play Internet access.

flow control

Kingsoft Internet Security Online Behavior Management uses powerful security control functions to manage the uplink and downlink bandwidth of network users, such as bandwidth limitation, bandwidth guarantee and policy priority. At the same time, it provides users with comprehensive and rich traffic analysis logs and reports, and understands the bandwidth usage and network resource utilization of each user in the network in real time.

Safety protection

Kingsoft Internet Security relies on firewalls for online behavior management, giving full play to the advantages of access control and security protection of firewalls, and building a security barrier for users' networks.

Intelligent log system

The log is intelligently classified and retrieved, and the online behavior is clear at a glance. Built-in efficient analysis tools support graphic culture and graphic output.

Universal opening

Kingsoft Internet Security has an open online behavior management interface, which can be seamlessly connected with the interface of public security departments to realize information sharing. At the same time, it can be managed through Jinshan Infocenter control center.

Seamless link with Kingsoft Internet Security desktop antivirus software.

Kingsoft Internet Security online behavior management introduces linkage operation mechanism, automatically detects the antivirus status of Kingsoft Internet Security at the client, matches the linkage access rules of the client, and realizes the security defense of the client, thus realizing the overall linkage protection of network security.

Fourth, the specific application

Kingsoft Internet Security Behavior Management System meets the information management requirements of Internet sites in Technical Measures for Internet Security Protection (Order No.82 of the Ministry of Public Security) issued by the Ministry of Public Security. Provide Internet-based behavior audit, monitor users' online behavior, and provide security control and protection functions. Can effectively prevent the malicious spread of illegal information; Avoid divulging state secrets, commercial information and scientific research achievements; Monitor the use of network resources in real time to improve the overall work efficiency. It can meet the needs of government, banks, high-tech enterprises, hotels, internet cafes, libraries, schools, broadband communities and other online behavior management.