Telecom operators as network infrastructure operators, its information system belongs to the national key information infrastructure implementation, has established complete network security protection measures, and in terms of data security not only need to protect the core operational data of telecom operators, but also need to protect the user's personal privacy information:
1、Telecom operators have many businesses and complex data use scenarios, and there is a risk of data leakage in the process of data use and flow;
2、There are a large number of external personnel and resident personnel to carry out business system development and maintenance, with high data access privileges, and risks of violation abuse and data leakage;
3、There are many sharing scenarios between telecom operators' business data and external units, and there is a risk of leakage in the process of data sharing and exchange;
4、Regulatory units have high requirements for data security protection of telecom operators.
We control the whole life cycle of data collection, transmission, storage, processing, sharing and exchange, and destruction in the environment of telecom operators' applications, databases, big data platforms, and cloud natives, etc., and realize the goals of "knowable data, controllable security, and manageable personnel" with the premise of "accurate and visible, safe and controllable". The protection goal of "data can be known, security can be controlled, and personnel can be managed" is realized:
1、Assist in the establishment of data security organization system and data security management system, so that daily data security operations are based on evidence and personnel protection;
2、Use data classification and grading tools to comprehensively sort out the internal data of telecom operators, as well as classification and grading, identify important data and core data, and clarify the focus of protection;
3、Use database auditing, database firewall, data desensitization, API security auditing, application desensitization, etc. to build a protection system covering databases and APIs, and safeguard the security of various data application scenarios;
4、Using the data security comprehensive governance platform, docking each data security capability unit, analyzing and mining all kinds of data security risks, situational awareness, and establishing data security joint prevention and control capabilities;
5、Regularly carry out data security risk assessment, identify potential risks and reinforce them in time.
1、Behavioral control of data access by internal and external personnel of telecom operators;
2、Sensitive data protection in data exchange and sharing scenarios between telecom operators and external parties;
3、Sorting out and categorizing data assets of telecom operators;
4、Data security risk assessment of telecom operators and security reinforcement suggestions;
5、Data security protection system construction for telecom operators.
The open architecture of the comprehensive data security management platform can be easily integrated with the existing network security situational awareness platform of telecom carriers to help telecom carriers form a network-wide network security and data security situational awareness.
Sensitive data intelligent identification, classification and grading technology can quickly and accurately sort out and identify the data assets in the network of telecom operators
Unique six-tuple, three-layer correlation, and rich protection rule base can accurately monitor and protect the internal and external threats faced by telecom operators.
All data security capability units can be adapted to the cloud environment, container environment and other new architectures of telecom operators to meet flexible deployment requirements.