Current Location: 首页 > Industrial control safety 1 >Industrial Control Safety Information Center
  • Evaluation index base
  • Vulnerability information base
  • Industrial control protocol library
  • Threat signature database
  • Threat intelligence bank
Asset fingerprint database
With 2000+ industrial asset fingerprint recognition
Cooperate with foreign manufacturers to collect fingerprint database, and sign relevant confidentiality agreements。
Fingerprint collection of industrial asset equipment within the Petrochemical Shared Cyber Security Joint Laboratory。
China Petrochemical Group, Sinochem Group, Yankuang, the second machine plant and other research and evaluation of industrial site fingerprint collection。
Dynamic update of asset identification fingerprint database through laboratory cooperation with domestic industrial asset manufacturers。
Evaluation index base
Support multi-industry evaluation indicators
Support enterprises in different industries to customize evaluation indicator templates
Built-in standard basic and enhanced protection indicators library
It supports multiple evaluation index libraries, and has inspection indicators for general safety requirements and inspection requirements for safety expansion of industrial control systems
Indicators, and industrial control system safety expansion requirements of the industry (covering petroleum, chemical, power, transportation, water conservancy and other industries)
Vulnerability information base
A comprehensive library of threat vulnerabilities
Fully support CVE industrial control vulnerability detection, built-in 130,000 + vulnerability rules。
As CNVD, CNNVD technical cooperation support unit, submitted a large number of original security vulnerabilities。
A large number of industrial control honeypots are deployed abroad to collect the characteristics of industrial control attack behavior and store them。
Industrial control protocol library
Identify more than 70 types of protocols
Equipment testing covers the main industrial control protocols, supports the monitoring of more than 70 industrial control protocols, and can scan assets at high speed;
Scan 68 protocols for a C-segment within 20 seconds;
Industrial control protocols include common Modbus, DNP3, S7, OPC and other protocols。It can identify all kinds of commonly used DSC, PLC, operator station, engineer station, router, switch, gateway, network camera, video management server, etc。
Threat signature database
A comprehensive library of threat vulnerabilities
It has a knowledge base of traditional security threats and is applicable to various complex network topologies. It can check the contents of various protocols and effectively detect viruses such as Trojans, backdoors, worms, and zombies。
Event library covering intrusion detection system products, the library has comprehensive intrusion detection, reliable Web threat detection, network scan detection and other functions, and has high security, high reliability and other features, to provide the strongest security protection for the user network。
Threat intelligence bank
Obtain enterprise-related intrusion intelligence through industry intelligence, industrial chain, backbone network node monitoring and other means;
Collect and respond to various vulnerability information from the Internet, CNVD, CNNVD, and continue to provide users with valuable vulnerability information。

Shandong Yuntian Safety Technology Co., LTD. All rights reserved Lu ICP No. 17007379-1

Lu public network Anbei 37010202002190

" class="hidden">风车动漫