Qingteng Wanxiang·Workload Adaptive Security Platforms
Provide the efficient intelligent perception, visible analysis and fast response capabilities
Asset Inventory
Risk Assessment
Intrusion Detection
Compliance
Security Log
Asset Inventory Platform
We are dedicated to automating the construction of fine-grained asset information from a security perspective, supporting the accurate identification and dynamic perception of business layer assets, enabling the protected objects to be clearly visible. By using Agent-Server architecture, we provide more than 10 kinds of key assets inventory of workload, more than 800 kinds of automatic identification for business applications and enhance the expansion ability of user-defined operations.
- Fine-grained carding of key assets
- Automatic identification of business applications
- Great Extension Ability
- Comprehensive correlation of intrusion and vulnerability
Risk Assessment Platform
We are dedicated to helping users find internal risks accurately, helping security teams locate problems quickly and effectively solve security risks. At the same time, it provides detailed asset information and risk information for accurate analysis and response. Detection of weak passwords of more than 30 applications is supported, and more than 30,000 high-value vulnerabilities can be automatically matched, so that the attack surface will be reduced effectively by 90%.
- Continuous security monitoring and analysis
- Multiple applications/system risks
- Strong Vulnerability Library Matching
- Professional specific remediation proposals
Intrusion Detection System
Provide multi-anchor detection capability, which can detect intrusion events in real time and accurately, discover breached hosts, and provide a means of response to intrusion events, which has zero impact on business systems. The detection capability covers more than 100 intrusion scenarios, and the fast response time is less than 15 seconds. Through visibility depth analysis, more comprehensive and efficient attack detection can be achieved.
- Multidimensional intrusion perception
- Real-time event monitoring alarm
- Deep visible analysis
- Fast processing response
Compliance System
A benchmark requirement consisting of the Graded Protection of Information Security and CIS is constructed, which covers several versions of the mainstream operating system, web applications, databases, etc. Combined with the baseline content, on the one hand, users can quickly carry out enterprise internal risk self-test to meet the security requirements of regulatory authorities; on the other hand, enterprises can define baseline as the security standard of enterprise internal management.
- Continuous follow-up of regulatory policy requirements
- Covering various systems/application baselines
- Support for customized inspection standards
- Seamless integrating with enterprise management platform
Security Log Data Platform
Workload Web event log is stored using big data technology, the product can also guide customers to query and analyze the log from the security point of view, discover the trace of hacker intrusion, and restore the attack site. Based on ES system, the product has the ability to obtain query results within 5 seconds while statistically analyzing TB level data, ensure that all data is stored for at least 180 days, and flexibly imported into other systems for use.
- Big data storage technology
- Quick information query and retrieval
- Volume analysis and processing of large data
- Support flexible system export