It covers the whole scene and has a 360-degree panoramic view to conduct comprehensive management of assets,
open the panorama of assets and asset risks, and open the God perspective of asset safety operation.
Fragmentation of Assets Assets cannot be comprehensively identified and discovered, and there are a large number of unknown assets, even those existing outside the Internet. At the same time, the depth of asset identification is insufficient, and more attributes of assets cannot be obtained, such as the exposure status of assets in the network, the network mapping relationship of assets, the access behavior of assets and other key attributes of assets. |
Technological change brings challenges With the development of security technologies and the emergence of new technologies, security boundaries become blurred. For example, the use of virtualization, cloud computing, container technology, the widespread use of BYOD, illegal outreach and other illegal operations will make security boundary protection ineffective and fail to effectively protect assets. |
Lack of correlation analysis and scientific restoration decisions The lack of in-depth correlation analysis between assets makes it impossible to explore potential security risks, accurately predict security incidents in advance, and provide effective repair suggestions and steps. |
Legal and industry monitoring requirements Network Security Law and Isoguarantee 2.0 provide clear security for asset security. Meanwhile, multiple monitoring departments list exposure to Internet Web services, systems and networks as key inspection targets. |
Comprehensiveness The asset discovery and detection capability covering the whole scene, through the offensive and defensive perspectives, combined with traffic collection and plug-in docking four dimensions for a comprehensive detection of assets, including known assets, unknown assets, Internet assets, etc. |
Relevance Through comprehensive asset information collection, comprehensive in-depth correlation analysis is carried out to provide scientific decisions for asset management. |
Real time performance Dynamic asset status and event tracking, real-time understanding of asset status changes and the latest security events, providing real-time emergency response capabilities. |
Accuracy Accurate risk detection and rich verification methods, combined with correlation analysis for threat depth identification, and complete traceability capability. |
Persistence We have continuous discovery, detection, assessment, notification, disposal, re-inspection and archiving capabilities to provide a closed-loop asset security operation model for the entire process. |
Openness We provide rich log format, fully open API, and dock to third-party products for security linkage and intelligence sharing, providing more control tentacles. |
Multi-dimensional continuous monitoring Through the offensive and defensive perspectives, combined with traffic collection and plug-in docking, covering all scenarios, a 360-degree panoramic view will be taken to do a comprehensive governance of assets. |
New define asset new properties Through multi-dimensional correlation analysis, more asset attributes are explored, such as the exposure state of asset network, asset network mapping relationship, asset access relationship and other new asset attributes. |
Provide scientific risk management decisions Relying on rich asset attributes, combined with correlation analysis, to provide scientific risk management decisions, to find the most threatening 5% of security risks. |
Attack chain prediction By relying on rich asset attributes and combining with in-depth correlation analysis, potential security risks can be predicted in advance to provide scientific decisions for the disposal of security incidents. |
Safe Operation Visualization A visual topology is dynamically generated by combining assets and asset business access relationships to visualize the secure operation of assets. |
Intrusion detection and prevention capabilities Multidimensional intrusion awareness, including network threat, website backdoor, WebShell, rights detection, abnormal operation, behavior baseline, extortion, mining, malware. You can isolate assets based on IP addresses, domain names, and services automatically or manually based on asset security status. |
Daily operations & closed loop process Identify the most threatening risks; Go all out to solve; Provide repair suggestions; Intelligent mitigation measures; Continuously monitor utilization trends. |
0day emergency & quick hemostasis Network emergency survey; Discover the sphere of influence; Intelligent emergency response; Patch update reminder. |
Cyber security drill Inventory of assets; Assets go offline; Wartime strategy; Attack chain prediction; Targeted deployment. |
Linkage of intelligence Docking situational awareness, SIEM; External intelligence supplement; Output information, effective deployment. |
Company Name: Shanghai Jingan Information Technology Co., LTD
Email:info@easmcn.com
Official Accounts
Mini Programs