Current Location: 首页 > Industrial control safety > Product system > Inspection series
  • Industrial scene simulation sand table
  • Industrial training range platform
Industrial Safety assessment System
Haotian Industrial Security Assessment System is a portable device that integrates industrial control network security inspection, risk assessment, isoassurance assessment and threat perception。Help regulatory assessment agencies accurately assess the network security status of industrial enterprises, can also be used for enterprise self-examination and self-assessment, is a strong support tool for industrial network security supervision。
Process standard
Index comprehensiveness
Detailed report
Convenient and efficient
Functional characteristics
Support multi-industry evaluation indicators
Complete and complete evaluation index library。The system not only has built-in standard basic protection indicators and enhanced protection indicators, but also has inspection indicators for general safety requirements, inspection indicators for safety expansion requirements of industrial control systems, and industrial control system safety expansion requirements indicators (covering petroleum, chemical, electric power, transportation, water conservancy and other industries).。
Flexible asset management
Active and passive asset management: Supports flexible asset management by setting the asset range and then detecting assets and grouping assets according to their common characteristics。
High coverage for device identification
Equipment detection covers the main industrial control protocols, supports the monitoring of more than 90 industrial control protocols, can scan assets at high speed, and scan 68 protocols of a C-segment within 20s。
Authoritative vulnerability library
A comprehensive library of threat vulnerabilities。The system fully supports CVE industrial control vulnerability detection, with 130,000 + built-in vulnerability rules。The company shares real-time threat intelligence with a Ministry of Public Security, and is the only authorized network security service organization of the Ministry of Public Security in Shandong。
Industrial scene simulation sand table
With the ability of "3D+ digital" as a means, through the simulation of industrial scenes, various types of business security scenarios and information security scenarios can be reproduced. Through the simulation platform + data interaction of real industrial control equipment, the goal of industrial control security can be simulated, monitored, analyzed and displayed。
Height simulation
Multidimensional presentation
Deep customization
Attack simulation
Functional characteristics
Simulation industrial control system
The goal is to simulate the typical control system and process sand table of an industrial industry。It consists of three parts: process system, automatic control system and simulation model。The process simulates the actual field process hardware system, using the standard industrial system architecture。The control system adopts the mainstream PLC commonly used in the industrial industry, and the upper computer adopts the mainstream configuration software, which is combined with the process to achieve a typical industrial system scene。
Red team attack and plan
The subsystem used to infiltrate and attack the simulated industrial control system mainly contains the hardware and software resources and attack schemes required for infiltration and attack. Through this system, the whole process of real industrial control security events can be restored and the security risks and weak links of the industrial control system can be found。
Blue team defense and plan
The subsystem for monitoring and protection simulation industrial control system mainly includes products such as boundary protection, detection and audit, host protection and security management。Through this system, the attack behavior is discovered in real time and the simulation industrial control system is protected, and the effectiveness of security products and protection schemes is verified。
Effect display system
The subsystem is used to display the attack and defense effect, including the attack path protection means, the harm brought by the attack to industrial production, etc. The subsystem includes the sand table model, display panel, operation table, large screen display terminal, sound and photoelectric display terminal, etc。
Industrial training range platform
Dongyue Industrial Training Range platform covers energy, power, manufacturing, transportation and other fields, to meet the needs of key information infrastructure security system construction, industrial network attack and defense capability verification needs, industrial product testing and evaluation needs。Through virtualization technology and simulation technology, the target range can reproduce real industrial network nodes and links, and realize the tasks of network space industrial network system planning and demonstration, ability testing and evaluation, product research and development test, product safety test, talent education and training。
Experimental guidance
Vulnerability simulation
Scene simulation
Courseware customization
Functional characteristics
Attack scenario simulation
The range platform presets various types of attack knowledge and tools,Exploit virtualization to attack the environment,Provide a variety of reasonable and effective attack means,Based on the security weakness in the industrial control network,Integrated boundary separation, network monitoring, terminal protection and other measures,Design a variety of industrial control safety scenarios,Implement real production environment attack simulation。
Industrial control vulnerable point simulation
Dongyue industrial training range platform using the range test box,Highly simulated various types of industrial field control system scenarios and environments,Combine the software and hardware resources of industrial control resources as required,Realize the simulation of configuration software, HMI, DCS, PLC, sensor, etc,Keep the online experience relevant to the real environment。
Attack experiment supervisor
The attack experiment guide arranges the complete task script preset in the drill process, and the system will gradually guide the trainees or researchers to complete the entire attack and defense plot or emergency drill according to the predefined scenarios and plots。
Threat scenario customization
Customize threat scenarios By defining and supplementing attack scripts or attack aircraft frameworks, you can continuously improve your Red team attack skills。Using customized scenarios, it can meet various types of attack targets and defense system reproduction, and provide students or security researchers with recoverable and replaceable virtual and real combination attack and defense scenarios。
Industrial network terminal security gateway
Haotian industrial network terminal security gateway is for industrial application scenarios, based on a solid SoC system platform and perfect software core construction, to achieve industrial site data acquisition, transmission, conversion, backtransmission, control and security protection functions。
Encrypted transmission
Trust mechanism
Edge computing
Protocol conversion
Functional characteristics
Advanced architecture
Based on highly reliable hardware architecture, it supports flexible access, transparent transmission and calculation processing of various industrial control protocol data, and realizes highly integrated field data edge computing architecture。
A variety of industrial control protocol support
Support a variety of field interconnection protocol libraries (Modbus/TCP, BACnet, DLT645, MQTT, PPI, etc.) to ensure interoperability and compatibility of existing systems。
Secure encrypted transmission
Supports the access and data output of various semaphore sensors, and the built-in encryption engine provides data encryption transmission to ensure data integrity and confidentiality。
Whitelist mechanism
Using the whitelist policy, the device blocks all untrusted data and protocols to protect against unknown threats。
High reliability
Industrial reliability design with fanless, wide temperature range to meet harsh environment deployment and stringent requirements in EMC, IP and other protection areas。

Shandong Yuntian Safety Technology Co., LTD. All rights reserved Lu ICP No. 17007379-1

Lu public network Anbei 37010202002190