QI-ANXIN Zero Trust Security Solution

A data-centered, identity-based architecture provides continuous evaluation and adaptive access control mechanism for enterprise resources and digital assets.

Home > Products & Technology > QI-ANXIN Zero Trust Security Solution


QI-ANXIN Zero Trust Security Solution, is a data-centered, identity-based architecture which provides continuous evaluation and adaptive access control mechanism for enterprise resources and digital assets. The solution builds a trust chain from multiple dimensions from people, devices, environment, and access behaviors, helps enterprises achieve a new generation of cybersecurity architecture with comprehensive identity security, dynamic authorization, risk measurement, and agile management.


Identity-based Paradigm

The foundation of QI-ANXIN Zero Trust is to provide identity-based adaptive access control. Digital identity is the cornerstone of our Zero Trust Architecture, and it needs to realize comprehensive identity management. The solution establishes a unified digital identity tag and governance process for physical entities such as users, devices, applications, and business systems.


Resource Secure Access

With QI-ANXIN Zero Trust, all access requests including user accessing to business application, application APIs calling, etc. should be authenticated, licensed, and have considerable trust level.


Continuous Evaluation

With QI-ANXIN Zero Trust, one-time authentication cannot ensure the continuous legitimacy of identity. Continuous trust evaluation is a key method to build trust from scratch in Zero Trust Architecture. Even if a strong multi-factor authentication is used, it is still necessary to continuously conduct trust evaluation by measuring the risk of access subject.

The trust evaluation of the subject is based on several factors, such as the authentication methods used, the health of the device, whether the application is distributed by the enterprise, and the access behavior, etc.; the trust evaluation of the environment might include access time, source IP address, source geographic location, access frequency, device similarity, etc.


Adaptive Access Control

With QI-ANXIN Zero Trust, the access rights of the subject are not static, but dynamically calculated and measured according to subject attributes, object attributes environment and continuous trust evaluation results. The traditional access control mechanism is a macro binary logic, mostly based on static authorization rules, blacklisting and whitelisting and other technical means for one-time evaluation. The access control in Zero Trust Architecture is based on the idea of continuous measurement and automatic adaptation, which is a dynamic micro decision logic.



Security Architecture Innovation

l  Establishing industry benchmark by adopting Zero Trust Architecture to solve data access problems of enterprise customers.

l  The solution has been standardized, and been practiced in real enterprise projects, rapid upgrade and deployment can be realized.

l  Reconstructing enterprise information security boundary, solving the data access security problems.


Improve Security Capabilities to deal with real-time risks

l  Adopting the unified digital identity information realize the comprehensive authentication of the access user identity.

l  Meet real-time security requirements through fine-grained and dynamic authorization methods.

l  Centralized business agent provides channel encryption and attack protection functions to effectively protect the transmitted data.

l  Obtain real-time environment security status, access behavior data, intelligently analyze risks and adjust access control policies.


Automatic Management to Reduce Operation and Maintenance Costs

l  Through automatic identity management, authentication, and authorization capabilities, it effectively reduces the workload and human error of enterprise IT personnel.

l  Solve security problems from architecture level in low investment, high reliability and avoiding redundant construction.


Improve work efficiency and user experience

l  Eliminate physical logical boundaries and provide access to enterprise data in anytime, anywhere.

l  Automatically obtain user identity security status for access authorization, and secure user access without sense.