Risk Assessment (RA)

Based on the current situation of the information system, with reference to the national information security risk assessment specifications, identify and analyze assets, threats, vulnerabilities, and security measures, evaluate from the physical layer, network layer, system layer and application layer, comprehensively analyze the information security risks faced by the system, and generate an effective information security risk assessment report.

  • Product advantages
  • Product functions
  • solution

Product advantages

  • Service standardization

    The whole process can be controlled, with clear goals, process supervision, and controllable results.

  • 安全稳定.png
    Professional service personnel

    The technical personnel are senior safety testing experts with CISP-PTE, OSCP and other qualification certifications.

  • Service process

    Based on national standards, the risk factors are comprehensively analyzed, and the assessment report is automatically output.

Product functions

  • Vulnerability scanning

    Use vulnerability detection tools for automated scanning to obtain security vulnerabilities to the greatest extent within a controlled range.

  • Asset identification and classification

    Identify, group, and classify information assets, and establish a list of information assets.

  • Threat assessment

    Analysis of the potential damage to the asset.

  • Vulnerability assessment

    Identify vulnerabilities in information assets through technical testing and other means.

  • Assessment of existing security measures

    Assessment of the effectiveness of existing technologies and management tools to control risk.

If you have any questions about Inspur Cloud, please contact us

Are you interested in our solutions?

Please do not hesitate to contact us! We're here to help.