Network information security products
847130.90
Portable digital automatic data processing machines, weighing not more than 10 kg, consisting of at least a central processing unit, a keyboard and a display: Other: - Used for cyberinformation security testing and evaluation: scan, test and analyze the configuration, status and log data of the information system; detect and identify vulnerabilities; make information security risk assessment; - Used for cyberinformation security supervision: supervise and analyze electronic data; collect and analyze real-time log data; detect and give warning of potential risks or events that may threaten the information security; - Used for attack and hacking combat: save the information system from attack and hacking
|
847130
Data-processing machines, automatic, portable, weighing <= 10 kg, consisting of at least a central processing unit, a keyboard and a display (excl. peripheral units)
|
847141.90
Comprising in the same housing at least a central processing unit and an input and output unit, whether or not combined: Other: - Used for cyberinformation security testing and evaluation: scan, test and analyze the configuration, status and log data of the information system; detect and identify vulnerabilities; make information security risk assessment; - Used for cyberinformation security supervision: supervise and analyze electronic data; collect and analyze real-time log data; detect and give warning of potential risks or events that may threaten the information security; - Used for attack and hacking combat: save the information system from attack and hacking
|
847141
Data-processing machines, automatic, comprising in the same housing at least a central processing unit, and one input unit and one output unit, whether or not combined (excl. portable weighing <= 10 kg and excl. those presented in the form of systems and peripheral units)
|
847149.90
Other, presented in the form of systems: Other: - Used for cyberinformation security testing and evaluation: scan, test and analyze the configuration, status and log data of the information system; detect and identify vulnerabilities; make information security risk assessment; - Used for cyberinformation security supervision: supervise and analyze electronic data; collect and analyze real-time log data; detect and give warning of potential risks or events that may threaten the information security; - Used for attack and hacking combat: save the information system from attack and hacking
|
847149
Data-processing machines, automatic, presented in the form of systems "comprising at least a central processing unit, one input unit and one output unit" (excl. portable weighing <= 10 kg and excl. peripheral units)
|