LCSA Series Secure Application Delivery End (VAI)

SDSA | Software Defined Smart ApplicationsCloud Security Convergence Architectureoverall introductionLuccitech cloud application delivery solution solves the experience, security, work efficiency and so on of the traditional application center in a deep level to meet the intelligent needs of the business. Whether it is smart government affairs, smart city, smart legal affairs, smart park, smart cam

Cloud Security Application Delivery Terminal (VAI Module)

cloud security application delivery end is a way of BOYD, which provides a virtual running environment for the application. In this sandbox-like environment, not only the executable file of the application is implemented, but also the runtime environment it needs.

Essentially, VAI(Virtual Application Infrastructure) refers to the abstraction of application dependencies on low-level systems and hardware. Users only need to deploy all kinds of common applications on the proxy server (cluster), and integrate all kinds of application software into the cloud application delivery portal for end users to use safely.

security

1.Data Transmission Security

using a proprietary protocol can effectively prevent data leakage, the server and the client are only transmitted between the real-time refresh of the image, the real data is not transmitted in the network.

2.Data Storage Security

data is stored centrally on the server side. Deploy system upgrades and virus protection on the server side to effectively prevent data leakage.

can control the access of mobile media, while preventing data leakage can also prevent the invasion of viruses and Trojans.

has a personal network disk function, everyone can set up an exclusive own network disk, store personal data, you can set other people can not access, so as to ensure security.

to ensure the safety of information enterprises all data (coding procedures, work reports, mail, chat records, etc.) are stored in the enterprise's own server, and can easily carry out rights management, online behavior management.

3.Single Secure Sign-On

After the single sign-on function is enabled on the server side, the user name and password of the application are saved on the server side to ensure the security of the account and password.

4.Security Rights Management

can create new accounts or import domain users to manage them.

corresponding to different users set different permissions to access the application, and can set the time period of Internet behavior management.

sets MAC address binding for end users.

set whether to allow copy and paste, disk mapping, print mapping, and external network access for end users.

5, other security

Through the ability to deliver network products, we can obtain WAF, VPN and other converged security capabilities.

Cloud Application Delivery

Operators

(1)a deployment, safe operation, easy to operate, greatly reducing the cost of learning.

(2)through the unified authentication module can simultaneously secure login authorization of all applications.

(3)work environment and private environment are separated from each other, and there is no need to worry about poisoning and other effects on business operations and data center security.

(4) fast access to new business corresponding to the application and administrator assigned permissions.

(5) support mobile office used in mobile phones, tablets and other smart terminals, to meet the staff BYOD office (bring your own device office) and mobile office and security.

management operation and maintenance personnel

(1)help operation and maintenance personnel reduce the complexity of deployment applications and improve business flexibility;

(2)centralized deployment reduces training and O & M costs for clients.

(3)new business, only need to update it in real time according to the role.

(4)help your unit to establish a stable and reliable operation and consistent office environment, to ensure the continuity of IT architecture;

(5)Ensure data security and operational security;

(5)non-disruptive real-time online system updates, upgrades and maintenance;

(6)no longer worry about old system compatibility, maintenance and upgrades.

the value of application delivery, security and cloud

(1)consumes less resources, and application virtualization consumes far less resources than desktop virtualization. For the same service requirements, the consumption is only 1/4 of that of desktop virtualization..

(2)acceleration technology makes the same network conditions, the number of support services greatly increased.

(3)application delivery management, network disk and peripheral support ensure business delivery efficiency.

(4)cloud application delivery platform itself takes full advantage of virtualization properties, greatly improving the delivery capacity and flexibility of the business.

(5)multiple security guarantees (client audit security, network audit, IPS, SSL offload, WAF security, etc.) to achieve unified and secure delivery

(6)multiple algorithms and multiple applications support greatly improves the high availability and elasticity of services and avoids business interruption.

(7)global load balancing, SDN adaptation, traditional environment, and hybrid cloud platform support, the cloud computing evolution of future services is more secure.

(8)supports rich traditional application/Internet/big data optimization solutions and templates, including Microsoft, IBM, Oracle, SAP, Splunk, etc. Applications, also include education finance and other industry configuration programs and templates.

(9) The practice of cloud evolution and cloud delivery security integration architecture to provide efficient protection for the enterprise's Internet and transnational information security deployment. Preparation

Platform Feature List


Module

Function

Description

Cloud Application Delivery Platform

Management side function

User Management

manages users based on the company's organizational structure, grouping users and publishing applications (application groups) to users (user groups).

Application Deployment

can be C/S, B/S applications, desktop, documents, centralized rapid release and management

security policy and folder management

can manage security policies and folders for employees, including exclusive folders, shared folders, hidden folders, hidden control panels, etc.

Internet Behavior Management

plan when employees can access the Internet and when they can open an application.

Single Sign-On

realize the login integration of multiple application systems; just log in to the client, you can directly open each system, no need to enter the account and password again.

Server Management

can easily understand the operation of the server, CPU usage, memory usage, client application and other information in the grasp

User Information Import and Export

allows IT managers to reduce deployment time during management or system upgrades

Cloud Application Deliverer

(Hardware/Private Cloud/Public Cloud Edition)

LCA/LCV/LCCSeries *

HARedundancy

Global Load Balancing
Server Load Balancing
Session Hold
application front-end optimization (IPS/cache/data compression/Web application firewall)
SSL acceleration/offload
SSO Secure Single Sign-On
Policy-based content switching
server health detection
SNMP support
User Management
supports IPv6
interface binding and VLAN

Cloud Delivery Client Optimization

Value Added Kit

intelligent traffic management suite, industry big data suite, server and network virtualization compatible extensions, VDI support(Virtual Desktop Infrastructure), VOI(Virtual OS Infrastructure)expansion, hyper-converged hardware platform expansion*

Client Features

supports multiple device logins

clients are available in PC, desktop, notebook and thin clients. The advanced version supports Android, iOS smartphones and tablets.

supports web clients,

C/SClient

supports multiple ways to open applications through Web and C/S customers, making the user experience more flexible and convenient.

Seamless Mode

implementation of virtual applications in the local display, operation, and local applications exactly the same. Seamless connection, seamless display, seamless application operation.

Instant Information Exchange *

instant messaging, including text communication, voice intercom, voice messaging, file transfer

application resources to enjoy at any time

server can be opened directly without installation.

Featured Screen Sharing *

can share the local screen with one or more clients, and the mouse and keyboard can be distributed and recovered at will.

Screen Recording *

records and stores the employee's use of the application on the client.

Audio Mapping

mapping server-side audio to the client to achieve audio on the server, local playback

disk mapping, printer mapping

Realize virtual files to print through a local printer, the file can be saved locally or on the server, the administrator set permissions freely.

Cloud Disk *

allocating private and public storage space to each user to realize the storage and sharing of resources.

* Professional ADC Application Deliverer is the key guarantee and architecture guide for software-defined smart applications. API capabilities and extension kits help users improve high availability and intelligent service capabilities.

* There will be differences between the different versions of the industry version and the enterprise version. Please refer to the latest matching technical data and provide corresponding services with local agents..