Product Advantages

Product Advantages

  • Latest Intelligence

    MTD continuously updates the threat list and whitelist database using both Huawei and third-party intelligence.
    MTD continuously updates the threat list and whitelist database using both Huawei and third-party intelligence.
  • Accurate Identification

    Trained by the machine learning algorithm, MTD can accurately detect threats based on blacklists and whitelists of IP addresses and domain names.
    Trained by the machine learning algorithm, MTD can accurately detect threats based on blacklists and whitelists of IP addresses and domain names.
  • Automatic Response

    You are quickly alerted about detected threats through messages and voice calls, improving the response efficiency.
    You are quickly alerted about detected threats through messages and voice calls, improving the response efficiency.
  • Cross-service Collaboration

    The detection results can be dumped to Object Storage Service (OBS) to meet compliance requirements, and synchronized to the Situation Awareness (SA) service for security operations.
    The detection results can be dumped to Object Storage Service (OBS) to meet compliance requirements, and synchronized to the Situation Awareness (SA) service for security operations.

Application Scenarios

AI Detection Engine

MTD identifies risks thanks to the neural network algorithms.

Advantages

Hijacking Detection

MTD uses the blacklist/whitelist association rule model to detect remote commands and controls malware for domain name servers.

Log Scan

MTD locates, traces, and analyses abnormal operations and access logs from the Cloud Trace Service (CTS).

Account Protection

MTD improves the security of the Identity and Access Management (IAM) system by building a login behavior model.

Functions

Functions

  • Preset Baseline Inspections

    SA provides you with default baseline inspection standards, covering lots of baseline settings.
    SA provides you with default baseline inspection standards, covering lots of baseline settings.
  • Asset Security Situation

    SA displays threats and risks to your assets.
    SA displays threats and risks to your assets.
  • Threat Event Statistics

    SA analyzes current threat events and impacted assets.
    SA analyzes current threat events and impacted assets.
  • Customizable Check Plans

    You can create custom inspections configured to start at an interval or time you choose.
    You can create custom inspections configured to start at an interval or time you choose.
  • Varied Integrations

    SA aggregates inspection data from a variety of products or services so that you can monitor and handle all events in one place.
    SA aggregates inspection data from a variety of products or services so that you can monitor and handle all events in one place.
  • Real-time Threat Events

    SA displays real-time threat events.
    SA displays real-time threat events.
  • Quick Identification of Vulnerable Resources

    You can view resources on the dashboard, organized by threat severity, to quickly identify the most vulnerable resources and take action in a timely and effective manner.
    You can view resources on the dashboard, organized by threat severity, to quickly identify the most vulnerable resources and take action in a timely and effective manner.
  • Attack Sources

    SA displays what attackers have initiated the most attacks along with their geographical locations.
    SA displays what attackers have initiated the most attacks along with their geographical locations.
  • Observable Cloud Service Security

    You can view the pass rate of the last baseline inspection on the dashboard to quickly locate and fix unsafe cloud service settings.
    You can view the pass rate of the last baseline inspection on the dashboard to quickly locate and fix unsafe cloud service settings.

Register with HUAWEI CLOUD to get free services

Register Now