-
Product Advantages
-
Product functions
-
Application scenarios
-
solution
-
Product Advantages
- East-west traffic threat awareness
Listen on malicious behaviors in east-west traffic to help tenants quickly locate threat sources such as compromised hosts.
- Dynamically display intranet risks
The custom port is consistent with the service system and dynamically displays changes in security risks.
- Full-port scanning and identification
Support full-port scanning and identification of probes, comprehensively collect attack behaviors, and avoid false negatives.
Product functions
- Simulation of common services
Simulation of services for commonly used protocols can cover most of the external ports required by service systems.
- Brute-force hack identification
For remote management protocols and services, you can professionally identify their login behaviors and set alarm thresholds.
- Judgment of the compromised host
When a large number of horizontal scans targeting high-risk ports are detected, the attack source is determined to be a compromised host.
- Alarm email notification
After an attack event or a compromised host is discovered, an email is sent to the corresponding asset security officer for alarming.
- Whitelist policy circumvention
You can set whitelist IP and whitelist ports for special services.
- Customize port settings
You can customize the port settings for open simulated services, and you can set the corresponding ports according to business conditions.
Application scenarios
-
Security and compliance
-
Cybersecurity of major events/offensive and defensive drills
-
Classified Protection 2.0 requires that the boundary design of cloud security zones be able to identify and monitor network traffic between virtual machines. IHPS relies on probes deployed in VPCs to detect intranet attack threats in real time.
-
IHPS can be used as the last line of defense in the virtual network. Through the identification of attacks and timely alarm notifications, it can quickly find the compromised hosts in the network, so as to take emergency measures, and query relevant logs through the located IP, analyze the attack methods, and form a traceability analysis report.
More options
Empower customers to quickly and securely migrate to the cloud,
If you have any questions about Inspur Cloud, please contact us
Are you interested in our solutions?
Please do not hesitate to contact us! We're here to help.