Scenarios

HSS

  • Centralized security management

    With HSS, you can manage the security configurations and events of all your cloud servers on the console, reducing risks and management costs.

  • Security risk evaluation

    You can check and eliminate all the risks (such as risky accounts, open ports, software vulnerabilities, and weak passwords) on your servers.

  • Proactive security

    Count and scan your server assets, check and fix vulnerabilities and unsafe settings, and proactively protect your network, applications, and files from attacks.

  • Intrusion detection

    Scan all possible attack vectors to detect and fight advanced persistent threats (APTs) and other threats in real time, protecting your system from their impact.

CGS

  • Container image security

    Vulnerabilities will probably be introduced to your system through the images downloaded from Docker Hub or through open-source frameworks.

    You can use CGS to scan images for risks, including image vulnerabilities, unsafe accounts, and malicious files. Receive reminders and suggestions and eliminate the risks accordingly.

  • Container runtime security

    Develop a whitelist of container behaviors to ensure that containers run with the minimum permissions required, securing containers against potential threats.