-
Product Advantages
-
Product functions
-
Application scenarios
-
solution
-
Product Advantages
- Rich vulnerability and configuration knowledge bases
The vulnerability knowledge base has more than 160,000 pieces of system vulnerability information; The configuration knowledge base provides a configuration check library for hundreds of versions of systems with more than 40 products in 9 categories.
- Comprehensively discover system vulnerabilities, weak passwords, and configuration hidden dangers
Detect security vulnerabilities, security configuration issues, and weak passwords, and collect unnecessary open accounts, services, and ports.
- Identify non-standard ports and accurately scan for service vulnerabilities
Identify application service types on non-standard ports and perform vulnerability detection to avoid false negatives and false positives during scanning.
- Integrate and facilitate safety management processes
The product can participate in the early warning, detection, analysis and management, and audit links in the security process.
Product functions
- Remote vulnerability scanning
Check the system vulnerabilities, configurations, and vulnerable accounts of the target host online, and then display the check results online.
- Local configuration scanning
Download the offline check tool to the target host to check the compliance of the offline host configuration.
- Report management
Provide summary reports and host reports to display the network security of the target and the security of individual assets, respectively.
- Template management
Manage various types of scan templates, including vulnerability templates, configuration templates, report templates, and password dictionaries.
- Risk alarm
Provide risk alarm and risk closed-loop processing functions, and support configurations such as alarm methods and alarm conditions.
Application scenarios
-
Security and compliance
-
Heavy protection/offensive and defensive drills
-
Vulnerability management
-
Network operators shall follow the requirements of the cybersecurity classified protection system, and perform their obligation to take technical measures to prevent computer viruses, network attacks, network intrusions, and other acts that endanger cybersecurity. To meet compliance requirements, regular security assessments for servers need to be conducted to identify security vulnerabilities and hidden dangers.
-
Conduct system security assessment of your own assets in advance, detect vulnerabilities in an all-round way, and discover security vulnerabilities, security configuration problems, and weak passwords in information systems, so as to help security managers find security problems before attackers and patch them in time.
-
The system security assessment can participate in the early warning, detection, analysis management, and audit links in the security process, and urge the security management personnel to repair risks through event alarms, providing closed-loop risk processing capabilities.
More options
Empower customers to quickly and securely migrate to the cloud,
If you have any questions about Inspur Cloud, please contact us
Are you interested in our solutions?
Please do not hesitate to contact us! We're here to help.