On March 31, 2022, the domestic network security authority Security Cow officially released the “China Network Security Industry Panorama (ninth edition)” (hereinafter referred to as the “Panorama”). The panorama is positioned to show the overall ecology of China’s network security industry, to show the overall development of China’s network security industry and representative manufacturers in subdivisions, and has been widely concerned and recognized by the industry since its launch.
With its core technical strength in the field of industrial control safety, Hollysys Research Institute has been strongly selected into the two major sectors of computing environment safety and industrial control safety, including: trusted computing, industrial control safety detection and protection, industrial control safety management, and industrial control safety services, of which the industrial control safety sector has achieved full coverage.
Trusted computing
✓ Safe and reliable PLC control system
Based on trusted Computing 3.0 system, it mainly consists of three parts: security master controller, security engineer station and security management platform. The main security controller adopts dual architecture, domestic operating system and real-time system; The security engineer station has added the identity identification based on digital certificate on the basis of the original engineering password to achieve two-factor authentication; The digital certificate of communication encryption and decryption is generated by the security management platform, and the national secret algorithm is used to encrypt and decrypt the communication data in the data communication stage.
Industrial control safety management
✓ Industrial network security management platform
Through the data collection of various IT and OT devices in the industrial control system, real-time analysis and visual display are carried out to perceive the abnormal behavior and events of the industrial network. At the same time, the industrial network PC, server, controller, network equipment, industrial control security equipment and other terminal equipment for centralized performance status monitoring, security strategy management, comprehensive control of industrial network security situation, connected to the security protection island, for security managers to provide decision-making basis, to achieve industrial information security disposal closed loop, to ensure the safety and reliability of industrial production.