Host Security Service
Host Security Service (HSS) is designed to offer overall protection for your host. It provides complete functions such as login protection, system protection, and application protection, allowing you more time to focus on your services.
Join the open beta to claim a limited freetrial.
Same-page detection and protection functions for simplified management.
HSS protection ensures defense before, during, and after your services are online.
The advanced detection technologies and various detection libraries contribute to precise defense.
HSS agent occupies fewer resources, ensuring optimized running of the host system.
By detecting abnormal login behaviors, reporting exceptions, and intercepting IP addresses that are cracked by brute-force attacks, HSS expertly prevents hackers from accessing the hosts.
Uses advanced detection technologies to quickly identify brute-force attacks.
If an account is cracked, it is automatically blocked without manual intervention.
Detects system problems (such as weak passwords and malicious programs) and prompts you to harden the system for security, reducing the risk of host intrusion.
Comprehensively detects the system problems and offers troubleshooting solutions.
Uses cutting-edge detection technologies and latest detection libraries to pinpoint any system security issues.
Detects and blocks web page tampering in real time to ensure to ensure the perfect running of your website.
Uses state-of-the-art detection technologies to block tampering attempts in real time.
Allows flexible configuration of the directories and file types to be protected on the GUI.
Detects abnormal login behaviors, reports anomalies, and provides first-rate protection.
Blocks the source IP address that performs brute-force attacks for 24 hours to ensure host security.
Detects remote login behaviors and prompts you to take proper measures.
Checks the host system, uncovers problems, and prompts you to harden your system.
Checks the password complexity policy and provides password change suggestions to improve password security.
Scans system accounts and prompts you to change any weak password.
Checks running programs to identify malicious programs such as Trojans and viruses.
Monitors key system files and generates alarms when any key file is changed.
Lists ports in the system to help you identify risky ports and unknown ports.
Detects system and software vulnerabilities included in the CVE vulnerability library to help you identify risks.
Provides overall protection for applications in the system.
Provides all-round protection for the specified directories to prevent data tampering.