Home Page _ Zero Trust Security Platform ZTP
Search By Category
Search By Keyword
Zero Trust Security Platform ZTP
 



Zero Trust Architecture (ZTA) is a security model that assumes no user or action can be trusted by default. It applies to internal and external users, applications, systems, and networks. Therefore, this model requires authentication and authorization at every access point and interaction to ensure that resources are accessed within a secure environment. The core concept of Zero Trust shifts the security focus from the network perimeter to data and applications themselves, ensuring that all data and applications operate in a protected state rather than relying solely on defending against external attacks. To implement Zero Trust, enterprises must adopt security mechanisms such as identity authentication, behavior analysis, enforced access control, and encryption, while emphasizing segmented access control, policy-based authorization, and multi-factor authentication. This effectively reduces cybersecurity risks, enhances overall security, and better addresses the constantly evolving landscape of cyber threats.




Jrsys Zero Trust Security Platform

 

The Jrsys Zero Trust Security Platform adopts PKI key pair and digital signature technologies to provide reliable identity authentication mechanisms. Trust evaluation is performed based on user context, strengthening overall cybersecurity protection.
  • Compliant with government Zero Trust architecture requirements
  • Graphical management interface for convenient administration
  • Synchronized with AD Server to ensure user account consistency
  • User event logging enables auditing of user operation records
  • Platform security level
  •      .Passed source code review and penetration testing
  •      .Meets IAL2 and AAL3 assurance levels
  • Supports HA synchronization mechanism


 

 


Jrsys Zero Trust App

 


 
  • Compliant with government Zero Trust identity authentication mechanisms
  • Asymmetric key digital signature technology
  • Key pairs securely stored in the mobile device secure enclave
  • Passwordless identity authentication
  • Mobile App for convenient on-the-go operations
  • Avoids risks associated with traditional password-based security
  • Enhances overall information security
  • Prevents account compromise
  • Authorization and privilege management

 




Jrsys Zero Trust Security Platform Interface

Graphical System Management Dashboard
A visualized and list-based management interface that clearly presents current user status, organizational structure, and data reports within the system, providing administrators with a convenient and intuitive system management interface.


Administrator Operation Interface
System administrators manage users across different groups based on organizational structure, including actions such as disabling access due to personnel changes, re-binding devices, and deleting accounts for departing employees.     



 

 

 

Event Log Audit and Traceability
Provides event review records and various types of system administrator operation logs to support audit inquiries and comply with audit and regulatory requirements.



 

 














Copyright 2020 © Jrsys INTERATIONAL CORP.

4F., No. 69, Jilin Rd., Zhongshan Dist., Taipei City 104, Taiwan (R.O.C.) 

TEL: (02)2511-7131



Designed by ezb2b2c