Securing the transcript - Deepin Technologies provides cybersecurity support for the 7th CISM Military World Games

Securing the transcript - Deepin Technologies provides cybersecurity support for the 7th CISM Military World Games

In the golden month of October just past, the 7th World Military Games was successfully held, with more than 9,300 military athletes from 109 countries competing on the same field. This was the first time that China hosted a comprehensive international military sports event and it was also the largest international sports event held in China after the Beijing Olympics.

During this period, Deepin Technology took on the arduous task of ensuring information security during the critical period. At the invitation of the Wuhan Public Security Bureau, nearly 20 security technology experts participated in the network security protection work of this Military Games, and fully cooperated with the Wuhan Public Security Bureau and various regulatory departments to complete the security work of the Wuhan Military Games, achieving the security goal of "zero security incidents" during the Wuhan Military Games.

■ Special network testing and comprehensive risk assessment

In the early stage of the Military Games, the Deepin Technology Security Service Team used the Smart Eye Security Testing Platform to conduct asset inventory, host vulnerability detection, video network front-end vulnerability detection, and illegal external connection monitoring for security targets such as the public security video transmission network. Combined with years of service experience accumulated for more than 200 public security industry customers across the country, the team conducted a multi-dimensional and comprehensive risk assessment of key information infrastructure such as the public security video transmission network from the host, network, system, and application levels.

■ Situation awareness, command and dispatch, full control of security situation

During the Military Games, by deploying a big data platform for network security threat perception, we monitored network attacks in real time, proactively analyzed threat intelligence, quickly handled and tracked the source, and visualized the security situation of the entire network.

The network security threat perception big data platform is based on actual combat, close to actual combat, and serves actual combat, and efficiently supports this network security protection mission.

■ Service team, 7*24 on duty, 0 safety accidents

During the Military World Games, the Deep Technology Security Expert Group went deep into the front line, on duty 24 hours a day, 7 days a week, and continued to fight uninterruptedly. In the discovery, response, analysis, and disposal of security incidents, security risks were effectively controlled to ensure that the security mission was foolproof.

■ Re-protecting the transcript

DeepTech received many letters of thanks from the Hubei Provincial Department of Ecology and Environment, Wuhan Municipal Public Security Bureau, Wuhan Municipal Public Security Bureau Video Investigation Brigade, Wuhan Municipal Public Security Bureau East Lake New Technology Development Zone Branch, Wuhan Municipal Public Security Bureau Qingshan District Branch, State Grid Hubei Electric Power Co., Ltd., Wuhan Tianhe Airport Co., Ltd., etc., fully affirming DeepTech's high-quality and efficient completion of network security tasks during the Wuhan Military Games.

From the Beijing APEC Summit, the Hangzhou G20 Summit, the World Internet Conference, to the Dalian Davos Forum, the Xiamen BRICS Summit, the Qingdao SCO Summit, and the Military World Games, Deepin Technology has repeatedly played its role in large-scale international conferences and events with its excellent products and technologies, leading teams and services. Deepin will regard every breakthrough as a driving force to move forward, practice corporate responsibility, and continue to contribute to the construction of national network security!

<<:  Talk: It's time to talk about what IPv4 and IPv6 are

>>:  [Important] IDC and Deepin Technology jointly released the technical white paper "Three Highs Application Delivery to Realize the All-Round Experience of Digital Natives"

Blog    

Recommend

Two threads, two mutexes, how can a dead loop be formed?

[[351971]] Fans’ questions must be arranged. How ...

my country has built the world's largest 4G network

[[181278]] On January 6, the Ministry of Science ...

How to display IP location across the entire network?

In order to further regulate domestic online publ...

Web Hosting Guide: Ten Ways to Improve Website Performance

In today’s digital world, website speed is extrem...

How will 6G develop in the future?

In the past two years, with the gradual populariz...

10 hottest enterprise networking startups in 2019

Cloud computing, automation, and intent-based net...

A big competition among operators’ 5G strengths!

Recently, according to the latest news from the M...

Zgovps: $15.9/year-AMD EPYC7B13/1GB/20GB/1TB@500Mbps/LAS4837

Share the Los Angeles AMD VPS series hosts provid...

What is the difference between WiFi and Ethernet connections?

In today's networking world, Wifi and Etherne...

How fiber optic networks can create more efficient and secure connections

We live in a technologically advanced age where h...

Why do you need to ask someone to deploy WiFi at home? You can do it yourself

WiFi has become a necessity in life, and I believ...

Wi-Fi 6 forces basic network equipment to upgrade

Wi-Fi 6 (802.11ax) is here, and more and more wir...