Enable integration and linkage with third-party security products through providing third-party security product integration plugins. Integrate with cloud honeypot "Huanzhen" of MoreSec thoroughly, manage with plugins, and enable the deception defense system rapidly. Provide third-party device syslog access capability configurable on page, which can adapt to all security products without additional development, building enterprise SOC, and perceive the overall security posture of the enterprise in real-time.
Collect the asset port service application information actively in real time through the bidirectional linkage between the vulnerability scanning engine and the agent, which help eliminate over 90% of passive scanning requests and enable precise POC detection. Detect asset vulnerability risk around the clock and build a classified security vulnerability detection system based on system application patches, operation and maintenance risks, high-risk vulnerabilities, and emergency detection to help enterprises discover high-risk vulnerabilities timely.
Create the customized whitelist list for host process lists, file change behaviors, and network exfiltration behaviors through creating learning policies. Enable the process, file and network exfiltration micro-isolation configuration to defend the unknown threats actively.
Discover digital assets on the exposure surface of the enterprise from attacker’s perspective, and verify the risk status of the exposed assets through vulnerability detection capabilities. Provide comprehensive and accurate asset exposure risk reports to help enterprise security operators mitigate asset exposure risks rapidly.
Create a threat detection model independently that conforms to domestic characteristics based on the massive threat data provided by SaaS. Enable the linkage between terminals and third-party security devices, and associate terminal asset processes, files, and network behavior through alert information automatically. Conduct effectiveness detection of alert information to improve the accuracy of alerts. Filter invalid alerts Intelligently to improve the efficiency of security operation.
Following the conception of "promoting defense through attack", Fire Cloud AI blue army robot simulates APT attacks in actual business environment, and the infection process of blackmail virus and mining Trojan horse in network, to build a visualized attack chain, test the effectiveness of defense means, and improve the host security protection capability.