-
Product Advantages
-
Product functions
-
Application scenarios
-
solution
-
Product Advantages
- Security large model
With the security Agent as the starting point, it provides intelligent support for key security operation scenarios, realizes security automatic operation, and solves security pain points.
- Threatening operations
Provide customers with centralized threat detection, investigation, and disposal capabilities. Help customers improve the efficiency of threat detection and response.
- Security threat awareness
Comprehensive vulnerability scanning identifies and blocks abnormal behaviors outside the baseline range, improving risk identification and handling capabilities.
- Asset Security Center
Help customers realize automatic and dynamic inventory of assets on the cloud and reduce the risk of “shadow IT” on the cloud.
- Emergency vulnerability warning
Precise push helps customers realize timely perception and rapid disposal of high-risk vulnerabilities.
- Automated responses
SOAR orchestrates responses for different threat types to achieve closed-loop threat management.
Product functions
- Threat detection
A variety of threat detection models and alarms can be automatically analyzed and correlated, which can effectively improve operational efficiency.
- Safety precautions
Mainstream system and software vulnerability scanning, and support for the latest hot vulnerability warning.
- Survey responses
Provide full log analysis and automated attack tracing to improve operational efficiency.
- Security visualization
Provide security data visualization to help security operators make safe disposal decisions.
Application scenarios
-
Threatening operations
-
Various offensive and defensive drills such as network protection operations
-
Inspur Security Operations Center can integrate Inspur cloud host security and cybersecurity multi-party data and capabilities, and apply Inspur’s many years of threat analysis experience and threat intelligence data to help customers carry out threat operations and completely solve various problems in threat operations.
-
According to the security offensive and defensive experience of Inspur Cloud over the years, a variety of threat models are established, and a national threat information sharing is formed in combination with threat intelligence, so as to assist customers in avoiding low-level problems and improving defense scores in offensive and defensive drills. And after the offensive and defensive drills, a summary report will be output.
More options
Empower customers to quickly and securely migrate to the cloud,
If you have any questions about Inspur Cloud, please contact us
Are you interested in our solutions?
Please do not hesitate to contact us! We're here to help.