Workflow
贝锐蒲公英路由器
icon
Search documents
拒绝数据泄露!揭秘贝锐蒲公英异地组网独家安全优势
Jin Tou Wang· 2025-06-06 08:41
Core Viewpoint - Beirui's Dandelion remote networking establishes a private network that ensures user local area network services and devices are not directly exposed to the public internet, requiring identity verification for remote access [1] Group 1: Access Control and Security Features - Beirui Dandelion offers fine-grained access control based on user identity, device information, and access time, allowing specific access configurations for remote work scenarios [3] - The system employs end-to-end encryption for data transmission, automatic isolation of risky terminals, and comprehensive logging of access behavior, ensuring robust data security [3] - Beirui Dandelion has passed the national information system security level protection certification and supports national encryption algorithms, safeguarding enterprise data assets [3] Group 2: Data Transmission Security - The technology utilizes multiple encryption mechanisms to ensure the confidentiality and integrity of data during transmission, employing asymmetric AES encryption and TLS protocols [4] - During P2P direct connections, identity verification is conducted through a session server to ensure trusted communication between parties [7] - A shared AES communication key is generated for encrypted data transmission, with TLS encryption activated during data forwarding through Beirui's relay servers [9] Group 3: Identity Verification and Hardware Security - Beirui Dandelion ensures trusted communication through strict terminal identity verification using encrypted HTTPS protocols [10] - The hardware is protected against malicious command injection risks through self-developed anti-injection technology [10][12] - The company adheres to security design principles, including the principle of least privilege and defense in depth, to enhance overall security [12] Group 4: Security Testing and Response - Beirui conducts regular security testing, including fuzz testing and penetration testing, to ensure compliance with the latest OWASP testing standards [12] - The company has established a Security Response Center (SRC) to create a standardized long-term security system, integrating public network security capabilities for early problem detection [12] - Collaborations with renowned security institutions for penetration testing and vulnerability scanning are conducted to assess product security and identify potential threats [14]