Securing the transcript - Deepin Technologies provides cybersecurity support for the 7th CISM Military World Games

Securing the transcript - Deepin Technologies provides cybersecurity support for the 7th CISM Military World Games

In the golden month of October just past, the 7th World Military Games was successfully held, with more than 9,300 military athletes from 109 countries competing on the same field. This was the first time that China hosted a comprehensive international military sports event and it was also the largest international sports event held in China after the Beijing Olympics.

During this period, Deepin Technology took on the arduous task of ensuring information security during the critical period. At the invitation of the Wuhan Public Security Bureau, nearly 20 security technology experts participated in the network security protection work of this Military Games, and fully cooperated with the Wuhan Public Security Bureau and various regulatory departments to complete the security work of the Wuhan Military Games, achieving the security goal of "zero security incidents" during the Wuhan Military Games.

■ Special network testing and comprehensive risk assessment

In the early stage of the Military Games, the Deepin Technology Security Service Team used the Smart Eye Security Testing Platform to conduct asset inventory, host vulnerability detection, video network front-end vulnerability detection, and illegal external connection monitoring for security targets such as the public security video transmission network. Combined with years of service experience accumulated for more than 200 public security industry customers across the country, the team conducted a multi-dimensional and comprehensive risk assessment of key information infrastructure such as the public security video transmission network from the host, network, system, and application levels.

■ Situation awareness, command and dispatch, full control of security situation

During the Military Games, by deploying a big data platform for network security threat perception, we monitored network attacks in real time, proactively analyzed threat intelligence, quickly handled and tracked the source, and visualized the security situation of the entire network.

The network security threat perception big data platform is based on actual combat, close to actual combat, and serves actual combat, and efficiently supports this network security protection mission.

■ Service team, 7*24 on duty, 0 safety accidents

During the Military World Games, the Deep Technology Security Expert Group went deep into the front line, on duty 24 hours a day, 7 days a week, and continued to fight uninterruptedly. In the discovery, response, analysis, and disposal of security incidents, security risks were effectively controlled to ensure that the security mission was foolproof.

■ Re-protecting the transcript

DeepTech received many letters of thanks from the Hubei Provincial Department of Ecology and Environment, Wuhan Municipal Public Security Bureau, Wuhan Municipal Public Security Bureau Video Investigation Brigade, Wuhan Municipal Public Security Bureau East Lake New Technology Development Zone Branch, Wuhan Municipal Public Security Bureau Qingshan District Branch, State Grid Hubei Electric Power Co., Ltd., Wuhan Tianhe Airport Co., Ltd., etc., fully affirming DeepTech's high-quality and efficient completion of network security tasks during the Wuhan Military Games.

From the Beijing APEC Summit, the Hangzhou G20 Summit, the World Internet Conference, to the Dalian Davos Forum, the Xiamen BRICS Summit, the Qingdao SCO Summit, and the Military World Games, Deepin Technology has repeatedly played its role in large-scale international conferences and events with its excellent products and technologies, leading teams and services. Deepin will regard every breakthrough as a driving force to move forward, practice corporate responsibility, and continue to contribute to the construction of national network security!

<<:  Talk: It's time to talk about what IPv4 and IPv6 are

>>:  [Important] IDC and Deepin Technology jointly released the technical white paper "Three Highs Application Delivery to Realize the All-Round Experience of Digital Natives"

Blog    

Recommend

Design tiny url

Design tiny url For example, Maimai will not allo...

5G promotes the rapid development of smart healthcare

Recently, the Ministry of Industry and Informatio...

Four predictions for SD-WAN in 2018

2018 will be the year of WAN transformation, as r...

How to prevent 5G from creating a new digital divide

There is no doubt that more pervasive 5G technolo...

The Heart of Smart Devices: Understanding Semiconductor Sensors

At the heart of smart devices lies a complex worl...

Why migrate to UCaaS? The reasons are many and obvious

[[395094]] Research shows that the future of ente...

Hostodo October Promotion: $45/year KVM-3GB/30G NVMe/5TB/three computer rooms

Hostodo has launched the Spooky October Sale, off...

A complete history of web crawlers

[[415987]] The well-known research organization A...

Five realistic predictions for enterprise IT in 2018

As 2017 is coming to an end, many companies are p...

Teach you how to easily obtain local area network devices

[[430847]] Preface With the rapid development of ...

Let's talk about Ocelot gateway using IdentityServer4 authentication

[[387801]] This article is reprinted from the WeC...