Asset Security SaaS Services

Service Overview


With the continuous development of customer business systems, IP, ports, services and other assets are also increasing day by day, and the number of security loopholes is also increasing. At the same time, the number of emergency security loopholes in the Internet continues to increase, making it more difficult for internal emergency response. From the perspective of security management and control, Jingan Technology provides customers with asset security operation capabilities, asset security vulnerability assessment, asset security vulnerability management capabilities, and third-party plug-in emergency monitoring capabilities for business systems, forming a long-term mechanism for asset risk management and control in customers' business systems.


Service Requirements


Asset Management


Business systems continue to increase, IT assets continue to increase, and management mechanisms such as asset reporting, asset monitoring, and asset recovery are lacking in the security management process.


Compliance Requirements


On the one hand, Internet security incidents occur frequently, and the harmfulness affects the company's image, economic interests and even national security; on the other hand, the business system is frequently iterated, and the existing online business lacks an effective security assessment mechanism.


Risk of Code Leakage


In the past security incidents, a large part of the R&D personnel or third-party R&D personnel lacked security awareness. For the convenience of remote opening, the company's source code was uploaded to the Internet platform at will, resulting in the leakage of core system information and security incidents.


Emergency Capability


Emergency vulnerabilities and 0day vulnerabilities are frequent and spread very fast. The business system assets are huge, the management is not refined enough, and the security personnel are difficult to accurately locate the affected assets, resulting in slow security response and the risk of malicious attacks.


Service Content


Web Asset Management


Customers can customize the time to automatically inspect web assets, including website status, associated domain names, website titles, IP addresses, website services, and monitoring of changes in open-source frameworks. Improve the management ability of the person in charge of asset association, effectively help customers grasp the changing status of Web assets, and avoid asset security risks.


Web Risk Monitoring


The SaaS service conducts real-time monitoring of serious security risks such as pornographic, gambling, drug and other sensitive content, business continuity, web page tampering, and web attacks, finds that security problems are automatically associated with assets, accurately locates the associated assets, and helps users quickly locate problems and effectively avoid them. Asset compliance risk.


Code Leak Monitoring


The SaaS service can monitor whether the core system code of the customer's business system is leaked on the major code hosting platforms on the Internet according to the characteristics of the customer's business system.


Service Effectiveness


Web Security Risk Real-Time Detection


Comprehensively monitor security risks such as sensitive content of Web business, Web tampering, Web attacks and vulnerabilities, realize real-time detection of Web security risks, and meet compliance requirements.


Visual Management of Website Assets


Automatically discover domain names, websites, services, assets, etc. to ensure that changes are within the scope of monitoring and real-time monitoring of changes in assets. The assets are classified and modeled, and through statistical analysis of data, the visualized operation and maintenance management of asset risks is realized.


Emergency Response


When large-scale attack events such as 0-day vulnerabilities and high-risk vulnerabilities break out, emergency detection in the asset dimension can be carried out to ensure that the vulnerability is discovered in a timely manner in the user network, and at the same time, the situation after the vulnerability repair can be tracked and verified.


Company Name: Shanghai Jingan Information Technology Co., LTD

Email:info@easmcn.com

Official Accounts

Mini Programs

2022@竞安科技所有

沪ICP备2022010711号

沪公网安备 31011202002916