Product Advantages

Product Advantages

  • Quickly Discover Unsafe Configurations

    SA can detect over 90% of your system unsafe configurations on your cloud infrastructure. The scan covers 4 baseline categories, including 27 checks based on industry best practices.
    SA can detect over 90% of your system unsafe configurations on your cloud infrastructure. The scan covers 4 baseline categories, including 27 checks based on industry best practices.
  • Respond to Alarms in Minutes

    SA can monitor more than 200 types of threat in real time with the powerful threat intelligence library of HUAWEI CLOUD. Powered by big data analysis, SA can respond to security events, track threat sources, and collect attack evidence in minutes.
    SA can monitor more than 200 types of threat in real time with the powerful threat intelligence library of HUAWEI CLOUD. Powered by big data analysis, SA can respond to security events, track threat sources, and collect attack evidence in minutes.
  • Improve Efficiency with Other Services

    SA can integrate three types of security services from HUAWEI CLOUD and its partners for centralized threat management, intelligent monitoring, and root cause analysis. SA also provides open APIs to enable cross-cloud capabilities for more efficient O&M.
    SA can integrate three types of security services from HUAWEI CLOUD and its partners for centralized threat management, intelligent monitoring, and root cause analysis. SA also provides open APIs to enable cross-cloud capabilities for more efficient O&M.
  • Baseline Checks

    SA detects unsafe settings in your cloud services or resources on HUAWEI CLOUD and helps you meet requirements of DJCP 2.0.
    SA uses graphic panels displayed on a large HD display, provides custom security reports, and gives your system security scores to show your system security situation on the cloud. This helps you quickly locate risks and take action if a threat is discovered.

Application Scenarios

Cloud Service Baseline Inspection

You can quickly learn which hosts or cloud services have unsafe configurations and how you can fix them as SA uses an AI engine to inspect baseline configurations, report alarms, and provide recommendations.

Advantages

Many Cloud Services Inspected

SA scans cover 4 different types of baseline configurations involving 27 cloud services.

Easy Baseline Scanning

You can enable scan tasks and identify unsafe configurations in just a few clicks.

Protection Suggestions Available

You can fix unsafe configurations with hardening suggestions from SA to build a more secure cloud environment.

Suggested Related Services

Function Comparison

Function

Basic Edition

Professional Edition

Emergency vulnerability notices



Baseline inspection


Host vulnerability detection

Linux,Windows,Web-CMS



Website vulnerability detection



Threat detection


Supports 8 categories and 161 checks.

Threat analysis

Security orchestration

Custom triggers

APIs

Emergency vulnerability notices

Basic Edition


Professional Edition


Baseline inspection

Basic Edition

Professional Edition


Host vulnerability detection

Linux,Windows,Web-CMS

Basic Edition


Professional Edition


Website vulnerability detection

Basic Edition


Professional Edition


Threat detection

Basic Edition


Professional Edition

Supports 8 categories and 161 checks.

Threat analysis

Basic Edition
Professional Edition

Security orchestration

Basic Edition
Professional Edition

Custom triggers

Basic Edition
Professional Edition

APIs

Basic Edition
Professional Edition

Functions

Functions

  • Preset Baseline Inspections

    SA provides you with default baseline inspection standards, covering lots of baseline settings.
    SA provides you with default baseline inspection standards, covering lots of baseline settings.
  • Asset Security Situation

    SA displays threats and risks to your assets.
    SA displays threats and risks to your assets.
  • Threat Event Statistics

    SA analyzes current threat events and impacted assets.
    SA analyzes current threat events and impacted assets.
  • Customizable Check Plans

    You can create custom inspections configured to start at an interval or time you choose.
    You can create custom inspections configured to start at an interval or time you choose.
  • Varied Integrations

    SA aggregates inspection data from a variety of products or services so that you can monitor and handle all events in one place.
    SA aggregates inspection data from a variety of products or services so that you can monitor and handle all events in one place.
  • Real-time Threat Events

    SA displays real-time threat events.
    SA displays real-time threat events.
  • Quick Identification of Vulnerable Resources

    You can view resources on the dashboard, organized by threat severity, to quickly identify the most vulnerable resources and take action in a timely and effective manner.
    You can view resources on the dashboard, organized by threat severity, to quickly identify the most vulnerable resources and take action in a timely and effective manner.
  • Attack Sources

    SA displays what attackers have initiated the most attacks along with their geographical locations.
    SA displays what attackers have initiated the most attacks along with their geographical locations.
  • Observable Cloud Service Security

    You can view the pass rate of the last baseline inspection on the dashboard to quickly locate and fix unsafe cloud service settings.
    You can view the pass rate of the last baseline inspection on the dashboard to quickly locate and fix unsafe cloud service settings.

Register with HUAWEI CLOUD to get free services

Register Now