我们非常重视您的个人隐私,当您访问我们的网站时,请同意网站使用的所有cookies。有关个人数据处理的更多信息可访问《隐私政策》

Guarded by a multi-dimensional security system, it is a brand-assured choice.

  • Physical Security

    F1_icon01.svg
  • Data Security

    F1_icon02.svg
  • Network Security

    F1_icon02.svg
  • Application Security

    F1_icon04.svg
  • Inspection and Audit Security

    F1_icon05.svg
  • Physical Security

    • Data Storage Computer Room

      • An IDC facility planned, designed, and constructed in accordance with T3+ international standards.

    • Power System

      • 35KV independent substation with dual independent power feeds

      • UPS: 4 sets in 2N configuration with dual 10KV independent municipal power feeds

      • Power distribution: Dual UPS supplying power to server cabinets

      • Backup power: N+1 diesel generator system with dual diesel supply

    • Security System

      • Three-layer protection

      • 24/7 security personnel stationed in the computer room

      • Security scanning system

      • Identity verification

      • 360° comprehensive video surveillance


    • Network System

      • Carrier-neutral (BGP) interconnected with China's three major carriers: China Telecom, China Unicom, and China Mobile

      • Dual-feed, dual-carrier data center

    • Cooling System

      • N+1 configured Carrier chillers with dual water circulation systems

      • 24-hour full-load capacity water storage tanks, and 15-minute full-load capacity chilled water storage tanks

      • Each precision air conditioner is equipped with dual chilled water pipes. Features underfloor air supply, isolated hot and cold aisles, and enclosed cold aisle design

      • Temperature range: 22±2°C; Humidity range: 50±10%

      • Ranged water leak detection system


  • Data Security

    Frame 1618875529.png
    • Code Generation Process

      System-automated code generation mechanism prevents human interference in the creation of codes.

    • Storage Process

      Dual-encryption mechanism for codes eliminates the risk of accidental data leakage.

    • Transmission Process

      Local encryption mechanism for codes prohibits unauthorized computers from decrypting data.

    • Printing Process

      Immediate deletion of codes after printing prevents leakage of printed codes.

    • Disposal Process

      Designated incineration mechanism prevents discarded identifiers from being reused.

  • Network Security

    • Network Firewall

      Conceals application network architecture, minimizes network access permissions, and blocks cyber-attacks.

    • IDS/IPS System

      Identifies and filters various attack behaviors while coordinating with network devices to fend off unauthorized attacks.

    • Virus Firewall

      Serves as the first-line network virus gateway, regularly updates virus databases, and identifies and blocks viruses at the network entry point.

  • Application Security

    • F1_icon06.svg

      Application Firewall

      Blocks web-based attacks, provides early warning notifications, and ensures comprehensive platform protection.

    • F1_icon07.svg

      Penetration Testing

      Simulates hacking behaviors to test and evaluate the system's security resilience.

  • Inspection and Audit Security

    • Dynamic Awareness System

      Utilizes big data and AI algorithms to analyze various logs and assess the platform's security status.

    • Vulnerability Scanning System

      Conducts security audits on applications within the data center systems and performs vulnerability remediation based on scan results.

    • Account Management

      Manual audits of network devices, AD, system accounts, and VPN accounts.

    • Bastion Host

      Tracks operator-application interactions, logs operational behaviors, and traces abnormal activities.

    • Database Audit System

      Audits and restricts access to databases by applications and personnel, preventing application anomalies or unauthorized access.

icon01.svg
a1img11.svg