CN Join us

Free Download

Please fill in the following information to obtain free download resources

  • Company

    *
  • Name

    *
  • Position

    *
  • Email

    *
  • Mobile

    *
  • Code

    Get Code
  • Company

    *
  • Name

    *
  • Position

    *
  • Email

    *
  • Mobile

    *
  • Code

    Get Code

Leave us a message and feedback

Please complete the feedback questions or suggestions

  • Company

    *
  • Name

    *
  • Position

  • Email

    *
  • Mobile

    *
  • Content

  • Code

    Get Code

Building Orchestratable Security Framework For Online Transactions

The full proxy architecture can solve any protocol translation problem, while encryption algorithms and protocol management can reduce costs and enhance protection

Background

In traditional online banking, security devices are integrated into the network in series. The single point of failure (SPOF) is eliminated through the HA mechanism built in the devices themselves. In this case, however, it will result in idle devices, insufficient utilization of resources and impossibility to enhance performance through horizontal scalability.

Solution Overview

In traditional online banking, security devices are integrated into the network in series. The single point of failure (SPOF) is eliminated through the HA mechanism built in the devices themselves. In this case, however, it will result in idle devices, insufficient utilization of resources and impossibility to enhance performance through horizontal scalability.

In new online banking, the SSLO technology is used to conduct pooling design of security devices, and take each type of security devices as security service to protect business flow in the form of a security service chain. Horizontal scalability and real-time monitoring are supported for security devices to ensure business continuity.

Customer Pain Points And Challenges

Encrypted traffic causes security blind spots and high-performance consumption;

High delay;

Poor scalability of security devices, resulting in scaling difficulty;

All traffic flows through all security devices, wasting resources;

The security device strategy remains unchanged; High O&M and troubleshooting costs;

Construction of security device resource pools to reduce investment cost of security devices.

Features

Centralized decryption

Centralized decryption/encryption supports viewing SSL/TLS traffic and checking by multiple security tools. Re-encrypted user traffic is bound to Internet and Web applications, supporting security check.

High-performance decryption

Provide high-performance decryption for inbound and outbound SSL/TLS traffic, and support security check to expose threats and prevent attacks.

Low management cost

Dynamically link security devices, monitor and scale up them individually; Reduce management costs and improve the utilization of security resources by intelligently managing the decryption of the whole security chain through upper and lower classification engines.

Superior flexibility

Provide a single platform to check the next generation encryption protocols, thus providing unparalleled flexibility, minimizing architecture changes and preventing new security blind spots.

Flexible integration

Flexible integration into even the most complex architecture to integrate SSL encryption/decryption and deliver the latest encryption technology for the entire security infrastructure.

Customer Benefits

Improved security performance: The decrypted SSL traffic load and health check is a full guide for the utilization, optimization and availability of the security service chain.

Lower security TCO: Centralized encryption control and management reduces the burden on the security chain and employees, and eliminates potential security risks.

Enhanced security and visualization: The full proxy architecture can solve any protocol translation problem, while encryption algorithms and protocol management can reduce costs and enhance protection.

Exclusive solutions and services for you

我(wǒ)們随時準備爲您提供幫助

  • 咨詢熱線

    400-820-5-820