Home Page News Function launch & deactivation
Search By Category
Search By Keyword
Function launch & deactivation
WAF web application firewall
Date:
2024/09/20
Title:
WAF web application firewall
Description:

Web Application Firewall (English: Web Application Firewall, abbreviation: WAF) is a specific form of application firewall used to filter, monitor and block HTTP/HTTPS traffic through web services. By monitoring HTTP/HTTPS traffic, It prevents attacks that exploit known vulnerabilities in web applications, such as SQL injection/cross-site scripting (XSS)/file inclusion and incorrect system configuration.


A web application firewall is a special type of application firewall, designed specifically for web applications. It is deployed in front of web applications and analyzes the two-way (usually HTTP/HTTPS) traffic of the network, enabling it to detect and block any Malicious content. This functionality may be implemented in software or hardware, executed in a special device, or in a typical server running a general operating system. It may be a stand-alone device or included in other network components. In other words, a WAF can be a virtual or physical device that prevents vulnerabilities in web applications from being exploited by outsiders. These vulnerabilities may be due to outdated programs or programming flaws. A WAF works by blocking compliance with a rule set, also known as (as filter conditions) traffic to solve these program flaws.


Previously unknown vulnerabilities could only be discovered through penetration testing or vulnerability scanners. A web application vulnerability scanner, also known as a web application security scanner, is defined in SAMATE NIST 500-269 as "a method of inspecting a network Automated programs that identify applications for potential security vulnerabilities. In addition to searching for vulnerabilities in specific web applications, these tools can also check for program errors. Web application vulnerability scanners can make corrections to the program within the application. It is also possible Custom strategies need to be applied to provide temporary emergency fixes (called virtual patches) for specific network application vulnerabilities.
WAFs are not a panacea for security solutions, but are designed to be used in conjunction with other network perimeter security solutions (such as network firewalls and intrusion prevention systems) to provide a holistic defense strategy.


Supported models
NGS 1315HE / 1351HF / 3542HTG / 3572HF / 5752HF / 5772HG / 5792HF / 5952HTG / 5972HG

Url
HERHSIANG Information's mail archive and mail server adopt server-level motherboard Onboard network port and use network card built-in network wake-up function (Wake on LAN) function.
Date:
2023/08/18
Title:
HERHSIANG Information's mail archive and mail server adopt server-level motherboard Onboard network port and use network card built-in network wake-up function (Wake on LAN) function.
Description:

HERHSIANG Information's mail archive and mail server adopt server-level motherboard Onboard network port and use network card built-in network wake-up function (Wake on LAN) function.
It is recommended to use a UPS uninterruptible power system. When the power is restored, the UPS needs to wait for the battery capacity to charge up to the set percentage, and then wake up the remote device function.
Generally, the equipment needs to wait until the UPS battery is completely out of power to 0% to restore the power supply before starting the remote equipment.
Related functions can prevent the remote device from being unable to start the remote device after the power supply is restored after the remote device has been automatically shut down in advance when the UPS battery still has power.


Supported models
MArchive full series
MA2 H57TA
MDS H169
Full range of MDispersion
MD2 H57TA2D
MDA H57TA


Url
AI automated spam protection function module Offer to buy
Date:
2023/05/28
Title:
AI automated spam protection function module Offer to buy
Description:

E-mail attacks on the rise

MArchive full series mail archiving servers and MDS/MDispersion mid-to-high-end series mail servers adopt AI automated spam protection reasons, according to research statistics conducted by the US Cybersecurity and Infrastructure Security Agency in December 2022, at least 8 out of every 10 companies Every now and then, employees of businesses fall victim to phishing by hackers.
Relevant data shows that most Internet users are unprepared for information security and emails. However, today's hackers attack emails in a variety of ways, such as: APT and BEC and other highly targeted attacks, which make administrators and general users unable to defend effectively.
When hackers use various methods to attack through the information network, when hackers carry out "24 hours a day Zero day vulnerability", in the virus scanning websites such as International Virus Total and various Anti-virus software, fake phishing websites or some attached files are often regarded as harmless letters. Because the zero-day attacked websites and some attached files still belong to relevant databases and have not recorded new types of harmful letters, administrators and users Or the computer's built-in or anti-virus software fails to detect some high-potential harmful websites and virus files, which will still lead to serious consequences later.
HERHSIANG Information has introduced the AI Spam automated spam filtering mechanism, which can effectively isolate or block harmful emails after comparing and learning from the database, thereby preventing harmful emails from entering the user's mailbox, which can effectively protect the security of the user's related equipment Safety.


Features:
AI Spam function introduction

Collect a huge Chinese word segmentation database. The calculation basis of AI Spam is traditional/simplified Chinese word segmentation database. The difference between Chinese and English is the key to the accuracy of word segmentation to determine the email intent analysis. For example: Go to Global Information on the internet
Segmentation determines the semantic classification of the above-mentioned words. The R&D unit has done research and shows that after entering AI SPAM calculations between continuous words and segmented words, the accuracy difference is 1~2%. The slight difference is reflected in the accuracy of the final email judgment To a certain extent, with the help of the Chinese word segmentation database established by the research and development unit, AI Spam is more accurate and simple in the calculation of mail classification.


AI Word Analysis module
The AI Spam imported by HERHSIANG Information disassembles the subject and content of the email and then enters the comparison action. The relevant Chinese word segmentation database has fully complied with the usage habits and usage of traditional and simplified Chinese. Enter the AI algorithm program classification comparison analysis after the words. AI Spam database statistics have built more than 1 million classified emails. The database can be divided into five categories: normal/notification/e-mail/junk/phishing emails, After AI automatic comparison and analysis, new emails will be automatically classified into five categories according to relevant characteristics. With the help of email vocabulary and semantic classification, users can be asked to "immediately" click on the link URL in the email or open the "full file" 24 hours a day Zero day vulnerability" mails are effectively blocked outside the relevant equipment to prevent them from entering and endangering the user's equipment.


Content filtering analysis module
In addition to classifying harmful emails, the AI Spam automatic spam protection system will check whether the URL links and attached files in the inner text of the letter contain known viruses and harmful URLs in the system database.
In addition, through the HERHSIANG Sandstorm database, known phishing/trojan horse emails are blocked. There are more than 2 million phishing URLs and 1 million Trojan horse data files in Sandstorm. For spam hazard emails that cannot be identified by the content, for example, For short content emails/graphic text emails, etc., use BAYES (Bay's Theorem) rules to assist in judgment.

Analysis of letter sending behavior
Hexiang Information has introduced a variety of module judgment methods to reduce the probability of misjudgment. After AISPAM/Sandstorm and BAYES (Bayes' theorem) rules and other first-level classifications based on email content, the AI SPAM system is developed by the research and development unit Analyze and judge the behavior of the sender, find out the large amount of forwarding/illegal forwarding sent by the robot computer, illegal forwarding through free mailboxes or even fake domains and other unreasonable sender behaviors, and at the same time use the basic verification mechanism SPF Sender domain lookups such as /DKIM/DMARC are also processed.

These emails sent through abnormal channels have a characteristic. They will definitely not be normal emails, and will be classified as e-mails and spam by the system. When the user reconfirms the sender and email from the notification letter After the subject is safe, you can retrieve the safe letter from the AI SPAM automated spam protection system.


Analysis of letter sending behavior module
HERHSIANG Information has introduced a variety of module judgment methods to reduce the probability of misjudgment. After AI Spam/Sandstorm and BAYES (Bayes' theorem) rules and other first-level classifications based on email content, the AI SPAM system is developed by the research and development unit Analyze and judge the behavior of the sender, find out the large amount of forwarding/illegal forwarding sent by the robot computer, illegal forwarding through free mailboxes or even fake domains and other unreasonable sender behaviors, and at the same time use the basic verification mechanism SPF Sender domain lookups such as /DKIM/DMARC are also processed.

These emails sent through abnormal channels have a characteristic. They will definitely not be normal emails, and will be classified as e-mails and spam by the system. When the user reconfirms the sender and email from the notification letter After the subject is safe, you can retrieve the safe letter from the AI Spam automated spam protection system.


AI Spam Automated Spam Protection keeps improving

HERHSIANG Information has introduced a new AI Spam function module, which can make the judgment accuracy of mails as high as 99.5%. Through the judgment and analysis of mail content and sending behavior of the system function, it can automatically distinguish between normal and malicious or spam letters, and improve the level of spam letters It can also reduce the chance of users opening phishing letters.
In addition, hacker attack methods are also constantly improving, they will forge emails to be the same as real emails, so the MArchive mail archiving servers and MDS/MDisperison email host core system must constantly learn new attacks by itself or can be phished mail.
The research and development unit has included these attack and phishing features in the calculation logic database as a basis for judgment, so that the AI Spam system can use the continuous self-learning mechanism to face the phishing letters and spam attacks that are attacked 24 hours a day throughout the year. It can also quickly make accurate judgments, thereby effectively reducing spam and phishing letters to users, causing unnecessary losses.

Url
MDS / MDispersion 新版響應式Webmail
Date:
2022/11/24
Title:
MDS / MDispersion 新版響應式Webmail
Description:

In response to the popularization of mobile phones in the trend of the times, the HERHSIANG mail server has a built-in responsive WEBMAIL, which supports computer/laptop/tablet/mobile browsers to facilitate sending and receiving messages outside.


Supported models: HMail P30 / MDispersion H168 H57TA2D H91X2D / MDS H169




Url
NGS next-generation firewall supports two-factor two-stage authentication
Date:
2022/07/11
Title:
NGS next-generation firewall supports two-factor two-stage authentication
Description:

Unlike many previous network services that use single-factor password authentication by default, Two-Factor Authentication (2FA), which combines two different authentication methods, users need to pass two or more authentication mechanisms before they can get Authorize access to the system resources provided by the service provider. There are many ways to verify, such as PIN code/fingerprint/scanning QR code/or one-time code and other auxiliary verification, and the purpose is to provide higher security for the account. This The two-factor authentication function combined with Google Authenticator uses the mobile phone owned by the user as the second authentication factor to achieve auxiliary authentication. The function is disabled by default. After enabling this function, the system will prompt you to enter a password and a one-time code. Can access your account.
HERHSIANG NGS next-generation firewall has three parts, supports two-step verification: account management/Internet authentication/SSL VPN


Supported version
NGS 3H/5H V9.0.2.2
NGS 1U full series V9.0.2.3

Url
Buying the following mail models from now on will have built-in Kaspersky Anti-Virus for 1 year
Date:
2021/10/07
Title:
Buying the following mail models from now on will have built-in Kaspersky Anti-Virus for 1 year
Description:

 Mail server
MDispersion H57TA(U)(W) & H91X


Mail archive server
MArchive H57TA(U)(W) & MArchive H91XT

Url
Main features of IPMI Tool ( IP KVM )
Date:
2020/12/24
Title:
Main features of IPMI Tool ( IP KVM )
Description:

Main features of IPMI Tool
Android IOS APP / Remote System Management / SuperBlade Management / MicroBlade Management / System Power Control / HDD and NVMe Management / FRU Management / System Diagnostics (via Super Diagnostics Offline) / NM (Node Manager) Management / Group Management


Support model
MDispersion H24E / H57TA (U) (W) / H91X
MArchive H57TA (U) (W) / H91XT

Url
3G/4G USB support model list
Date:
2019/01/23
Title:
3G/4G USB support model list
Description:
DLINK DWM-222 / HUAWEI E3372h / HUAWEI E161 (limited to 3G)

Firewall support model
NGS full range
NTS full range

 

Url
L2TP VPN support models
Date:
2017/03/21
Title:
L2TP VPN support models
Description:

Full range of HSecurity
Full range of UTM
Full range of NTS
Full range of NGS

Url
MD series support mobile phone IOS & Android APP
Date:
2017/03/21
Title:
MD series support mobile phone IOS & Android APP
Description:

MD mail server supports IOS & Android App
Go to Googls and Apple Store Street to search for HERHSIANG, download and install.


The Android version will be downloaded and installed from the official website from 2021

Url
Total
11

HERHSIANG Information Co., Ltd. (Uniform number: 13167798)

 88673494097  88673596785  service@herhsiang.com

 3F, No.5, Dinghe St., Sanmin District, Kaohsiung City Taiwan  

Business hours: Monday ~ Friday 8:30 ~ 12:00 / 13:30 ~ 1800 

(Except holidays and national holidays)
Copyright © 2002~2024