The solution consists of manual services and automated tools, covering all IT assets related to Internet oriented information systems
such as Web business system, portal website, operation platform, business interface, IP, port and service.
Multi-dimensional continuous monitoring, rapid positioning of high-risk assets and multi-link comprehensive coverage make it in an
advantageous position in the market competition.
Business development brings challenges Enterprise Internet services have developed rapidly, and some Internet services have not been checked before going online, leaving security risks. |
Technological change brings challenges With the development of security technology and the introduction of new technologies, the number of security vulnerabilities is increasing, which increases the risk of exposure of enterprise Internet assets. |
Legal and industrial regulatory requirements The Cyber Security Law has made clear requirements on clear asset information data, and several regulatory departments have listed exposure to Internet Web services, systems and networks as key inspection targets. |
Asset information research and preliminary sorting By sorting out and improving the relevant record forms and issuing the asset survey statistical table, the management information attributes of the assets, such as the belonging department, responsible person and business system, are sorted out to help improve the information of the Internet exposed assets and realize the knowable, searchable, manageable and controllable of the Internet exposed assets. |
Automatic asset discovery and identification Relying on asset discovery and vulnerability scanning system, using distributed scanning architecture, combined with fingerprint identification technology to achieve accurate scanning; Built-in asset learning model accurately identifies asset sources according to known assets and automatically discovers unknown assets. |
Asset all-weather risk monitoring Detect the vulnerability of the system in an all-weather manner, discover the security vulnerabilities, security configuration problems, weak passwords, etc., collect unnecessary accounts, services, and ports of the system, and form an overall security risk report, helping security managers to find security problems before attackers and repair them in time. |
24/7 asset compliance monitoring Conduct external inspection based on employee behavior characteristics and key information of the enterprise; NLP based content detection technology is used to efficiently detect bad information in exposed assets. |
Asset audit and management In strict accordance with the requirements of related asset reporting and management, provide clear and definite audit and comparison results report, timely discover the assets that should be reported but not reported, and assist to quickly complete the reporting of assets. |
Asset penetration testing services Different from traditional penetration testing or scanning assessment, we focus more on the risks and vulnerabilities that can be exploited, and are result-oriented, penetrating from business, assets, data, applications and employees to conduct a comprehensive security assessment of the system under test. |
Check the security of assets before they go online Services include: vulnerability scanning, baseline configuration verification, penetration testing services, code audit services, etc. |
Asset management system optimization Help to formulate or optimize and adjust the management system and process of Internet exposed assets, optimize and improve the management efficiency of exposed assets, and assist customers to meet the compliance management requirements of exposed assets. |
Multi-dimensional continuous monitoring Provide 24/7 vulnerability monitoring, automate the discovery and maintenance of IT asset risks, and continuously monitor enterprise security from multiple dimensions such as vulnerability security, compliance testing and external threat intelligence analysis. |
Quickly locate high-risk assets Combined with custom detection, quickly locating high-risk assets from massive amounts of data greatly simplifies risk management and shortens the emergency response process. |
Comprehensive coverage of multiple links The perfect combination of manual and tool, following the PDCA principle, fully covers pre-launch safety, operation monitoring, closed-loop follow-up process, management specifications, etc. |
Company Name: Shanghai Jingan Information Technology Co., LTD
Email:info@easmcn.com
Official Accounts
Mini Programs