SecMaster Editions
Why Huawei Cloud SecMaster?
Refined Metrics and Intuitive Situation Display
You get visibility into your current security situation through large screens, in real time. Large screens display all threats and alerts based on analysis and classification of massive data, making critical risks visible at a glance.
You can also create custom analysis reports to give you a quick overview of asset security.
Cloud Native Asset Inventory and Risk Prevention
No matter where your assets are, you can use SecMaster to manage them centralized.
SecMaster automatically checks cloud security configurations and provides system hardening recommendations. You can count on SecMaster to comply with Huawei Cloud security best practices and other security standards.
With SecMaster in place, you can stop worrying that there might be assets unprotected or settings mistakenly configured. There is no need to worry about implicit channels or security device vulnerabilities introduced by conventional bolted-on security solutions.
Intelligent and Efficient Threat Detection and Response
SecMaster can help precisely identify threats from massive security logs. Powered by years of experience of Huawei Cloud security operations team and built-in machine learning algorithms, SecMaster can analyze trillions of logs every day.
SecMaster associates threats, alerts, and assets through threat detection and asset profiling. It can identify the entire attack chain.
You can use playbooks to enable automatic response to threats with ease.
Flexible Environment Integration and Collaborative Operations
You can integrate security products, devices, and tools in the ecosystem for data-informative security operations.
You can create custom threat detection models and investigation and response playbooks to meet your security requirements.
You can use workspaces for collaborative security operations across departments or Managed Security Service Provider (MSSP) hosting.
More Services
More Services
Host Security Service (HSS)
Manage assets, prevent intrusions, and eliminate vulnerabilities
Web Application Firewall (WAF)
Shield web apps and websites against emerging threats 24/7
Database Security Service (DBSS)
Audit databases and detect SQL injections