System Security Assessment (SSA)

The system security assessment detects and analyzes the vulnerabilities of the tenant’s IT systems, proactively diagnoses security vulnerabilities and provides professional and effective security analysis and patching suggestions, and audits the patching effect to minimize the attack surface and help managers comprehensively and quickly locate the risk problems in the information assets.

  • Product Advantages
  • Product functions
  • Application scenarios
  • solution

Product Advantages

  • Rich vulnerability and configuration knowledge bases

    The vulnerability knowledge base has more than 160,000 pieces of system vulnerability information; The configuration knowledge base provides a configuration check library for hundreds of versions of systems with more than 40 products in 9 categories.

  • 安全稳定.png
    Comprehensively discover system vulnerabilities, weak passwords, and configuration hidden dangers

    Detect security vulnerabilities, security configuration issues, and weak passwords, and collect unnecessary open accounts, services, and ports.

  • Identify non-standard ports and accurately scan for service vulnerabilities

    Identify application service types on non-standard ports and perform vulnerability detection to avoid false negatives and false positives during scanning.

  • 可拓展.png
    Integrate and facilitate safety management processes

    The product can participate in the early warning, detection, analysis and management, and audit links in the security process.

Product functions

  • Remote vulnerability scanning

    Check the system vulnerabilities, configurations, and vulnerable accounts of the target host online, and then display the check results online.

  • Local configuration scanning

    Download the offline check tool to the target host to check the compliance of the offline host configuration.

  • Report management

    Provide summary reports and host reports to display the network security of the target and the security of individual assets, respectively.

  • Template management

    Manage various types of scan templates, including vulnerability templates, configuration templates, report templates, and password dictionaries.

  • Risk alarm

    Provide risk alarm and risk closed-loop processing functions, and support configurations such as alarm methods and alarm conditions.

Application scenarios

  • Security and compliance

  • Heavy protection/offensive and defensive drills

  • Vulnerability management

  • Network operators shall follow the requirements of the cybersecurity classified protection system, and perform their obligation to take technical measures to prevent computer viruses, network attacks, network intrusions, and other acts that endanger cybersecurity. To meet compliance requirements, regular security assessments for servers need to be conducted to identify security vulnerabilities and hidden dangers.

  • Conduct system security assessment of your own assets in advance, detect vulnerabilities in an all-round way, and discover security vulnerabilities, security configuration problems, and weak passwords in information systems, so as to help security managers find security problems before attackers and patch them in time.

  • The system security assessment can participate in the early warning, detection, analysis management, and audit links in the security process, and urge the security management personnel to repair risks through event alarms, providing closed-loop risk processing capabilities.

If you have any questions about Inspur Cloud, please contact us

Are you interested in our solutions?

Please do not hesitate to contact us! We're here to help.