Product Advantages
Innovative SIEM concept, more comprehensive security protection
Real-time data collection, summary analysis, instant locating of key threat events; security equipment linkage, effective identification of advanced threats and unknown threats; more comprehensive protection, can effectively identify high-frequency and low-frequency crawlers, CC attacks, host failure, data leakage, illegal privilege escalation, and other problems.
Adapted to various cloud scenarios such as public cloud, hybrid cloud, and private cloud
It can be adapted to heterogeneous global resources and network environments and perform advanced threat analysis and linkage processing for traffic in various scenarios such as public cloud, private cloud, and hybrid cloud to effectively manage security issues in various multi-cloud scenarios.
More flexible security protection through bypass deployment and software definition
Distributed bypass deployment mode without impact on online business; In the private cloud and hybrid cloud scenarios, it does not change the original architecture and business traffic flow direction, not only has no impact on the business, and can quickly realize elastic expansion, break through the bottleneck of bandwidth and performance.
A custom data model for more accurate threat identification
Customizable data models can be used to automatically identify abnormal and normal behaviors based on custom models through unsupervised and semi-supervised learning engines.
Product Feature
Multi-engine thorough data threat analysis
Comprehensive data collection and distributed storage. Using unsupervised and semi-supervised learning algorithms to identify abnormal behavior and achieve continuous evolution through self-learning and more accurate threat perception.
Security Orchestration, Automation, and Response (SOAR)
Support custom security events, and the system automatically analyzes the cause of failure when the event is triggered and perform multi-business system and “multi-device, multi-level” linkage according to predetermined logic.
User and Entity Behavior Analytics (UEBA)
Defining behaviors based on a six-tuple array model from time, place, person/ID, scope, action, and result and performing behavior analysis of users and entities.
Visualization Analysis
With customizable data dashboards, configurable security reports, and a large multi-dimensional situational display, it provides a comprehensive view of the situational conditions of the user's environment.
Global Threat Intelligence Center
Automatic integration of network intelligence information, including IP addresses, for accurate threat traceability analysis.
Application Scenarios
Customer Case
Get Stronger Security Today
Start a Free trial to Boost Your Network Security
Get Started
Get Started
Protect and accelerate access to your website and application systems
Experience Demo