Information Security

The higher level of informatization along with frequent occurrences of information security incidents has heightened public awareness about this issue and attracted closer attention from all sectors. JSC offers the corresponding specific solution against different categories of problems about information security from source to end. Our company has developed security mechanisms including centralized management of application terminals, complete external interface control, important file encryption and cloud-based defense so as to effectively prevent disclosure of business information.

In the field of proprietary information security products, JSC specializes in research on anti-disclosure and anti-theft technology, integrates state-of-the-art core technologies and owns a series of security products including Unified Security Platform and Unified Security Gateway. JSC delivers information security services and integrated solutions, and our products are widely applied in China’s information security market, with the government, energy sector, transportation sector and enterprises being on the list of our major customers.


1. Terminal Monitoring System

Security mechanisms have been established within the terminal monitoring system including centralized management of application terminal, full control of external interface and important file encryption so as to prevent disclosure of business information and to achieve the security goals of “controllable operation, data encryption, contents auditing and efficient management”.

2. Unified Security Platform (USP)

Currently, most security equipment provides single and separate protection and is difficult to manage. To improve this situation, JSC has developed USP to carry out smart and centralized management on a unified platform, which has greatly increased the management efficiency and overall defensive capability.

2.1 Centralized Management

Techniques, including centralized collection of multi-source heterogeneous data, strategizing security and standardizing information security incidents, are applied to achieve centralized operation and monitoring of security equipment, unified management of strategies, centralized collection and analysis of security incidents.

2.2 Platform-based Management

The unified Security Platform integrates three functions (security management, operation & maintenance management and auditing management) and provides a unified management platform for managing security, systems and auditing. Based on ITIL’s best practice, this platform offers its users an automated and standardized operation and maintenance procedure, effectively organizes and manages IT work and improves the efficiency of IT department.

2.3 Smart Management

USP is under smart management and adopts correlation analysis, security visualization and situation awareness technologies.

2.4 Cloud-based Defense Mechanism

USP supports access to “cloud security center” where it implements real-time monitoring, intelligent security and dynamic strategy, serves the security goal of cloud-based defense and improves defense efficiency and capability of security device.

3. VPN (virtual private network) device

VPN devices comply with IPsec and offer a virtual private network solution that integrates smart networking, secure access, transparent data encryption and smart traffic control. VPNs enable regional offices and employees outside the office to build an encrypted network “tunnel” via the internet to the head-office and securely access its intranet.

4. Ferrying Device

While intranet is secured by being physically isolated from public network, difficulties remain in exchanging necessary data between the two. Use of removable storage devices to copy and use of compact discs to record has their own inconveniences and management intricacies, and is not proof to the threats posed by Trojan ferry attacks.

Our solution is to deploy a ferrying device between the physically separated intranet (highly secure) and public network (less secure) and allows unidirectional import of data files from public network to intranet. It makes data exchange secure and efficient, blocks Trojan ferry attacks and prevents leakage of internal data.

5. Host Protection Device

In-depth application filtering, point-to-site VPN, smart traffic control and virtual patch technologies are applied to offer professional protection for servers within an enterprise against wiretapping, infection of the host by computer worms and unauthorized access to corporate sensitive data. Thus WEB, database and other key services are more attack-resistant, and both the data and operation of the host are secured.

6. Boundary Protection Device

Application identity recognition, network behavior analysis, smart traffic control and specific attack detection are adopted for boundary protection. Such technologies can enhance management and control of the network behavior between LANs within an enterprise or between corporate LAN and Internet. Moreover, the traffic is allocated to specific users and applications while access to important data is ensured and prioritized. This device prevents occurrences of unauthorized access and unregulated access to the net and Trojan attacks, and helps enterprises create a secure and controllable network environment.

7. Unified Security Gateway (USG)

Armed with key technologies such as in-depth application filtering, smart traffic control, specific attack detection, transparent communications encryption and security integration, USG integrates host protection, boundary protection and encrypted VPN communications in order to enhance the overall defensive capability of traditional security gateway and reduce the cost of device input and maintenance.