Details of Logo 02-C-002182

TOP > 02-C-002182

CN-2-C-20210208-000799

Logo ID 02-C-002182
Approved Date 2021/02/27
Application ID CN-2-C-20210208-000799
Applied Date 2021/02/08
Usage Agreement Agreed
OEM Licensor's Logo ID -
Note -
Target Information
Test Category Core Protocols
Vendor Name Hangzhou Moresec Technology Co.,Ltd.
Country CN
Product Name (original) MoreSec-D
Product Version (original) V3.0
Product Description (original) MoreSec-D is the first threat intelligence product based on attack confusion and deception defense technology in China. By constructing traps on the path that hachers must go through, confusing their attack targets and accurately sensing the behavior of hackers. It can isolate attacks and trace hte hacker's identity and attack intention to form hacker attack intelligence. It is found that APT attacks using 0day vulnerability can protect customer network from various risks caused by 0day attacks (such as sensitive information disclosure, key infrastrucure demage, etc.). This product can be used to protect the business system vulnerable to hacher attacks, especially in the business scenarios of finance, securities, operators and other sensitive information including a large number if user data or funds. Through the construction of user threat intelligence system, it can realize the passive response of security incidents to the active response of security threats, and help enterprises control security risks.
Product Name Moresec-H
Product Version V4.0
Product Classification Host
Product Description MoreSec-D is the first threat intelligence product based on attack confusion and deception defense technology in China. By constructing traps on the path that hachers must go through, confusing their attack targets and accurately sensing the behavior of hackers. It can isolate attacks and trace hte hacker's identity and attack intention to form hacker attack intelligence. It is found that APT attacks using 0day vulnerability can protect customer network from various risks caused by 0day attacks (such as sensitive information disclosure, key infrastrucure demage, etc.). This product can be used to protect the business system vulnerable to hacher attacks, especially in the business scenarios of finance, securities, operators and other sensitive information including a large number if user data or funds. Through the construction of user threat intelligence system, it can realize the passive response of security incidents to the active response of security threats, and help enterprises control security risks.
Vendor's Note -
Test Information Test Specification 5.0.1
Interoperability Test Scneario 5.0.1
Information for Series of Product
Interoperable
Devices
Router
1 Vendor Name FreeBSD Project
Device Name FreeBSD
Version 9.1-release
2 Vendor Name OpenBSD Project
Device Name OpenBSD
Version 5.3
Host
1 Vendor Name Microsoft
Device Name Windows 10
Version 1903
2 Vendor Name Ubuntu Project
Device Name Ubuntu
Version 18.04.5
Target supporting
Advanced Functions:
- Transmitting Echo Requests(Passive Node)
- Configuring Multicast Packet Size
- Multicast Routing(Router Only)
o RFC 4191 Type C Host(Host Only)
o Duplicate Overlapping Fragments
- Beyond Scope of Source Address(Router Only)
- Tracking Connections for ICMPv6
- Router Advertisement DNS (Host Only)