It leverages the advantages of new generation of hardware technology, with information security technology and management principles to design a fully integrated system.
It helps clients realize unified security management for information systems from monitoring, audit, risk management, system operations & maintenance and etc. perspectives.
Features Highlight
Asset Management Includes asset identification and change management, asset tag/grouping, and life cycle management. |
Centralized Monitoring Correlative analysis engine to analyze massive logs and traffics to discover attacks and malicious behaviors. |
Risk/Threat Indicator Presents overall security posture by calculating alarms, incident tickets, attacking characters and etc. factors. |
Threat Intelligence Integrates multiple sources of threat intelligence to achieve precise threat detection and vulnerability alert. |
Workflow Engine Supports flexible flow definitions that comply with ITIL and ITSM procedures. |
Compliance Enabler Facilitates and carries out security policies, specifications and requirements into daily works. |
Automatic Asset Discovery Automatically discovers and collects hosts, ports, services and applications in the network, creates fingerprint information based on asset data, uncover anomalies if fingerprint changes. |