Your current location: Home > "Source" Side Cybersecurity > Power Plant Security Protection Solutions
Power Plant Security Protection Solutions
Applications

In accordance with the Cybersecurity Law of the People's Republic of China, the Implementation Guidelines for Classified Protection, and the requirements of the National Energy Administration on the security protection of SCADA systems for new energy power stations, the in-depth security protection follows the basic principles of "security zoning, dedicated networks, horizontal isolation, and vertical authentication" [also known as the "16-character policy"] and other relevant policies, providing planning and design solutions for power plant security protection systems.

System Composition


Functional Features
  • Intrusion Detection
    Real-time monitoring of various data packets and network behaviors, providing timely alarm and response mechanisms
  • Security Audit
    Audit the behaviors of monitoring systems and master station systems in the network, and perform operations such as querying, statistics, management, and maintenance based on stored records and operator permissions
  • Boundary Protection
    Implement logical isolation to prohibit illegal connections and data
  • Virus Defense
    Prevent virus intrusion into the system caused by improper use of mobile storage devices and laptops during equipment installation, debugging, or maintenance
  • Port Control
    For uncontrolled exposed multi-type peripheral ports, implement effective peripheral port control through portable operation and maintenance gateways, USB security isolation, and host port control technologies.
  • Business Monitoring
    Real-time monitoring of business modules such as AGC and AVC in two assessment criteria, identifying operational defects
  • Centralized Security Management
    Achieve centralized monitoring, trusted protection, and secure operation and maintenance of network security for the centralized control center and its subordinate new energy stations
  • Advantage of Independent R&D
    Independently developed security products enable us to better understand user needs
Cases