Host Security Service (HSS)

Why Huawei Cloud HSS?

Why Huawei Cloud HSS?

Meet Diverse Needs with a Range of HSS Editions

Meet Diverse Needs with a Range of HSS Editions

Edition

Basic

Identify server vulnerabilities and weak passwords. Suitable for individual users.

Professional

Detect viruses and fix vulnerabilities in one click.



Enterprise

Meet security and compliance requirements on the cloud.


Premium

Defend against ransomware and other intrusions.


Container

Prevent container escapes.




Web Tamper Protection

Protect web pages and system files from being tampered with.


Baseline check

Weak passwords


Weak passwords


Weak passwords

Server baselines

Weak passwords

Server baselines

Weak passwords

Server baselines

Container baselines

Weak passwords

Server baselines

Vulnerability detection

System vulnerabilities



System vulnerabilities

Web-CMS vulnerabilities

System vulnerabilities

Web-CMS vulnerabilities

Application vulnerabilities

System vulnerabilities

Web-CMS vulnerabilities

Application vulnerabilities

System vulnerabilities

Web-CMS vulnerabilities

Application vulnerabilities

Container image vulnerabilities

System vulnerabilities

Web-CMS vulnerabilities

Application vulnerabilities

Vulnerability fix
Intrusion detection

2 types

20+ types

30+ types

35+ types

40+ types

35+ types

Asset management
Security report
Ransomware prevention
Web tamper protection
Price
$1.50
USD/month/device
Buy
$6.00
USD/month/device
Buy
$13.80
USD/month/device
Buy
$27.80
USD/month/device
Buy
$42.20
USD/month/device
Buy
$150.00
USD/month/device
Buy

Basic

Identify server vulnerabilities and weak passwords. Suitable for individual users.

Baseline check

Weak passwords


Vulnerability detection

System vulnerabilities



Vulnerability fix
Intrusion detection

2 types

Asset management
Security report
Ransomware prevention
Web tamper protection
$1.50
USD/month/device
Buy

Professional

Detect viruses and fix vulnerabilities in one click.



Baseline check

Weak passwords


Vulnerability detection

System vulnerabilities

Web-CMS vulnerabilities

Vulnerability fix
Intrusion detection

20+ types

Asset management
Security report
Ransomware prevention
Web tamper protection
$6.00
USD/month/device
Buy

Enterprise

Meet security and compliance requirements on the cloud.


Baseline check

Weak passwords

Server baselines

Vulnerability detection

System vulnerabilities

Web-CMS vulnerabilities

Application vulnerabilities

Vulnerability fix
Intrusion detection

30+ types

Asset management
Security report
Ransomware prevention
Web tamper protection
$13.80
USD/month/device
Buy

Premium

Defend against ransomware and other intrusions.


Baseline check

Weak passwords

Server baselines

Vulnerability detection

System vulnerabilities

Web-CMS vulnerabilities

Application vulnerabilities

Vulnerability fix
Intrusion detection

35+ types

Asset management
Security report
Ransomware prevention
Web tamper protection
$27.80
USD/month/device
Buy

Container

Prevent container escapes.




Baseline check

Weak passwords

Server baselines

Container baselines

Vulnerability detection

System vulnerabilities

Web-CMS vulnerabilities

Application vulnerabilities

Container image vulnerabilities

Vulnerability fix
Intrusion detection

40+ types

Asset management
Security report
Ransomware prevention
Web tamper protection
$42.20
USD/month/device
Buy

Web Tamper Protection

Protect web pages and system files from being tampered with.


Baseline check

Weak passwords

Server baselines

Vulnerability detection

System vulnerabilities

Web-CMS vulnerabilities

Application vulnerabilities

Vulnerability fix
Intrusion detection

35+ types

Asset management
Security report
Ransomware prevention
Web tamper protection
$150.00
USD/month/device
Buy

Abundant Application Scenarios for Service Security

Ransomware Prevention
Ransomware Prevention

HSS uses ransomware detection engines and dynamic honeypots to prevent ransomware from intruding your system, encrypting data, or spreading to other devices. Known ransomware can be blocked in real time. Unknown ransomware can be detected and removed in seconds. You can also configure backup policies so that data can be restored from backup in the case a ransomware attack ever gets through.

Advantages
Strong Defense Against Known Ransomware

HSS can prevent 99% of known ransomware families. It protects servers, containers, and applications from intrusions, malicious encryption, and virus spread, fighting ransomware in every phase of its kill chain.

Immediate Detection and Blocking

HSS can quickly block and isolate ransomware processes and files to prevent malicious encryption and to prevent them from spreading.

Detection of 99% of the Known Forms of Ransomware

Precise detection based on intelligence, AI, features, and behaviors keeps the false positive rate below 1%.

Web Tamper Protection
Web Tamper Protection

Web tampering can interrupt web page access and mislead visitors, resulting in reputational damage and even economic losses. HSS can block malicious requests and static tampering attempts while also generating alarms, protecting your web pages, documents, and images.

Advantages
Web File Protection

HSS protects static web content in .html, .txt, .js, and more formats. You can back up web pages to local or remote servers, or use kernel-level drives to detect and prevent local tampering.

Dynamic Web Tamper Protection

Our proprietary runtime application self-protection (RASP) technology can block requests that attempt to tamper with your databases and file servers.

Dynamic Attack Source Tracing

HSS can detect 14 types of dynamic web page attacks in real time, including SQL injection and deserialization input, and it can trace attack sources too.

Related Services
Container Security
Container Security

Systematically protect your Cloud Container Engine (CCE) and on-premises container clusters throughout their lifecycles with our asset management, image security, cluster security, and runtime intrusion detection features.

Advantages
Image Scans

HSS scans image repositories and running container images for vulnerabilities, malicious files, and unsafe configurations, and provides suggestions to help you enhance security.

Container Cluster Security

22 configurable rules help you check for typical container attacks, including privileged pod and man-in-the-middle attacks.

Container Runtime Checks

HSS can detect more than 20 types of container runtime intrusions, including container escapes, ransomware, and reverse shells.

Multi-cloud Management
Multi-cloud Management

Manage the security and O&M of your servers and containers on other clouds, private clouds, and integrated data centers (IDCs) all in HSS. You can scan for and fix vulnerabilities and baseline issues, and prevent ransomware on and off cloud in a centralized manner to reduce security management and operation costs.

Advantages
Cross-cloud Management

You can deploy the HSS agent on Huawei Cloud, hybrid clouds, private clouds, data centers, and other clouds, and manage their security all on Huawei Cloud.

Broad OS Support

HSS can be deployed on physical machines, VMs, and container clusters running diverse OSs, including Windows and Linux distributions like Ubuntu, Debian, and EulerOS.

Custom Policies

In HSS enterprise edition and higher, you can define and apply different policies for different servers or server groups for more refined security operations.

Features

Features

Choice of Millions of Customers Worldwide

Choice of Millions of Customers Worldwide

Industry Recognition

Industry Recognition

Start Your

Security Journey


on the Cloud
Try Now

More Services

More Services