Asset Safety Management Solution

It covers the whole scene and has a 360-degree panoramic view to conduct comprehensive management of assets,
open the panorama of assets and asset risks, and open the God perspective of asset safety operation.

Face Challenges



Fragmentation of Assets

Assets cannot be comprehensively identified and discovered, and there are a large number of unknown assets, even those existing outside the Internet. At the same time, the depth of asset identification is insufficient, and more attributes of assets cannot be obtained, such as the exposure status of assets in the network, the network mapping relationship of assets, the access behavior of assets and other key attributes of assets.

Technological change brings challenges

With the development of security technologies and the emergence of new technologies, security boundaries become blurred. For example, the use of virtualization, cloud computing, container technology, the widespread use of BYOD, illegal outreach and other illegal operations will make security boundary protection ineffective and fail to effectively protect assets.

Lack of correlation analysis and scientific restoration decisions

The lack of in-depth correlation analysis between assets makes it impossible to explore potential security risks, accurately predict security incidents in advance, and provide effective repair suggestions and steps.

Legal and industry monitoring requirements

Network Security Law and Isoguarantee 2.0 provide clear security for asset security. Meanwhile, multiple monitoring departments list exposure to Internet Web services, systems and networks as key inspection targets.

Feature of Scheme



Comprehensiveness

The asset discovery and detection capability covering the whole scene, through the offensive and defensive perspectives, combined with traffic collection and plug-in docking four dimensions for a comprehensive detection of assets, including known assets, unknown assets, Internet assets, etc.

Relevance

Through comprehensive asset information collection, comprehensive in-depth correlation analysis is carried out to provide scientific decisions for asset management.

Real time performance

Dynamic asset status and event tracking, real-time understanding of asset status changes and the latest security events, providing real-time emergency response capabilities.

Accuracy

Accurate risk detection and rich verification methods, combined with correlation analysis for threat depth identification, and complete traceability capability.

Persistence

We have continuous discovery, detection, assessment, notification, disposal, re-inspection and archiving capabilities to provide a closed-loop asset security operation model for the entire process.

Openness

We provide rich log format, fully open API, and dock to third-party products for security linkage and intelligence sharing, providing more control tentacles.

Advantages of Scheme



Multi-dimensional continuous monitoring

Through the offensive and defensive perspectives, combined with traffic collection and plug-in docking, covering all scenarios, a 360-degree panoramic view will be taken to do a comprehensive governance of assets.

New define asset new properties

Through multi-dimensional correlation analysis, more asset attributes are explored, such as the exposure state of asset network, asset network mapping relationship, asset access relationship and other new asset attributes.

Provide scientific risk management decisions

Relying on rich asset attributes, combined with correlation analysis, to provide scientific risk management decisions, to find the most threatening 5% of security risks.

Attack chain prediction

By relying on rich asset attributes and combining with in-depth correlation analysis, potential security risks can be predicted in advance to provide scientific decisions for the disposal of security incidents.

Safe Operation Visualization

A visual topology is dynamically generated by combining assets and asset business access relationships to visualize the secure operation of assets.

Intrusion detection and prevention capabilities

Multidimensional intrusion awareness, including network threat, website backdoor, WebShell, rights detection, abnormal operation, behavior baseline, extortion, mining, malware. You can isolate assets based on IP addresses, domain names, and services automatically or manually based on asset security status.

Application Scenarios



Daily operations & closed loop process

Identify the most threatening risks; Go all out to solve; Provide repair suggestions; Intelligent mitigation measures; Continuously monitor utilization trends.

0day emergency & quick hemostasis

Network emergency survey; Discover the sphere of influence; Intelligent emergency response; Patch update reminder.

Cyber security drill

Inventory of assets; Assets go offline; Wartime strategy; Attack chain prediction; Targeted deployment.

Linkage of intelligence

Docking situational awareness, SIEM; External intelligence supplement; Output information, effective deployment.

Company Name: Shanghai Jingan Information Technology Co., LTD

Email:info@easmcn.com

Official Accounts

Mini Programs

2022@竞安科技所有

沪ICP备2022010711号

沪公网安备 31011202002916