Assets and Threats are Knowable
SOC provides in cloud assets full life cycle management and supports fine-grained asset information automatically constructed from the perspective of security. Through the linkage of security inspection engine, and utilization of up to 25 types of log data real-time management of cloud security threats can be achieved.
AI Analysis, Data Modeling and Risk Management
Equipped with intelligent risk analysis ability, SOC help users efficiently identify potential risks by conducting AI intelligent analysis, data mining, business behavior analysis and dynamically associating customer data related to business, assets, vulnerabilities, threats, identity, behavior, etc.
Prevention and Defense
The platform provides security prevention capabilities such as mainstream system vulnerability identification and baseline configuration verification, as well as active defense and security capabilities such as website protection and virus killing to protect the security of assets on the cloud in both directions.
Multidimensional Situation is Fully Visible
Support real-time presentation of the overall security assessment status on the cloud through multiple dimensions such as asset situation, website situation, vulnerability situation, threat situation, attack situation and event situation, so as to have a full view of the current security situation.
One-key blocking: timely and effectively handling of emergency safety incidents can quickly reduce adverse impact of safety incidents.
Asset identification: full detection of unknown assets to automate the construction of fine-grained asset information
Vulnerability scanning: major systems, software vulnerability identification and closed-loop disposal
Asset identification: full detection of unknown assets to automate the construction of fine-grained asset information
Vulnerability scanning: major systems, software vulnerability identification and closed-loop disposal
Baseline check: configure check details based on the operator's accumulated experience to reduce the risk caused by improper configuration
Web security: identify and protect malicious features of website traffic to ensure the security of core business data
Intrusion Detection: discover lost assets utilizing intelligence, and block active outreach and other abnormal network behaviors
Log analysis: Log accurate intelligent correlation analysis, mining potential threats and issue warnings
Executive View of Security Situation: control the global security perspective, multi-dimensional view of the security situation
We use cookies to ensure your high-speed browsing experience. By continuing to browse this site, you agree to our use of cookies. Details