Product Advantages
Product Advantages
-
Latest Intelligence
MTD continuously updates the threat list and whitelist database using both Huawei and third-party intelligence.MTD continuously updates the threat list and whitelist database using both Huawei and third-party intelligence. -
Accurate Identification
Trained by the machine learning algorithm, MTD can accurately detect threats based on blacklists and whitelists of IP addresses and domain names.Trained by the machine learning algorithm, MTD can accurately detect threats based on blacklists and whitelists of IP addresses and domain names.
-
Automatic Response
You are quickly alerted about detected threats through messages and voice calls, improving the response efficiency.You are quickly alerted about detected threats through messages and voice calls, improving the response efficiency. -
Cross-service Collaboration
The detection results can be dumped to Object Storage Service (OBS) to meet compliance requirements, and synchronized to the Situation Awareness (SA) service for security operations.The detection results can be dumped to Object Storage Service (OBS) to meet compliance requirements, and synchronized to the Situation Awareness (SA) service for security operations.
Application Scenarios
AI Detection Engine
MTD identifies risks thanks to the neural network algorithms.
Advantages
MTD uses the blacklist/whitelist association rule model to detect remote commands and controls malware for domain name servers.
MTD locates, traces, and analyses abnormal operations and access logs from the Cloud Trace Service (CTS).
MTD improves the security of the Identity and Access Management (IAM) system by building a login behavior model.
Functions
Functions
-
Preset Baseline Inspections
SA provides you with default baseline inspection standards, covering lots of baseline settings.SA provides you with default baseline inspection standards, covering lots of baseline settings. -
Asset Security Situation
SA displays threats and risks to your assets.SA displays threats and risks to your assets. -
Threat Event Statistics
SA analyzes current threat events and impacted assets.SA analyzes current threat events and impacted assets.
-
Customizable Check Plans
You can create custom inspections configured to start at an interval or time you choose.You can create custom inspections configured to start at an interval or time you choose. -
Varied Integrations
SA aggregates inspection data from a variety of products or services so that you can monitor and handle all events in one place.SA aggregates inspection data from a variety of products or services so that you can monitor and handle all events in one place. -
Real-time Threat Events
SA displays real-time threat events.SA displays real-time threat events.
-
Quick Identification of Vulnerable Resources
You can view resources on the dashboard, organized by threat severity, to quickly identify the most vulnerable resources and take action in a timely and effective manner.You can view resources on the dashboard, organized by threat severity, to quickly identify the most vulnerable resources and take action in a timely and effective manner. -
Attack Sources
SA displays what attackers have initiated the most attacks along with their geographical locations.SA displays what attackers have initiated the most attacks along with their geographical locations. -
Observable Cloud Service Security
You can view the pass rate of the last baseline inspection on the dashboard to quickly locate and fix unsafe cloud service settings.You can view the pass rate of the last baseline inspection on the dashboard to quickly locate and fix unsafe cloud service settings.
Documentation
Documentation
Register with HUAWEI CLOUD to get free services
Register Now