Why Huawei Cloud HSS?
Why Huawei Cloud HSS?
Wide Applicability and Comprehensive Functions
You can use HSS on the VMs, physical machines, and containers on public clouds, private clouds, other vendors' clouds, and data centers around the world.
HSS protects servers and containers throughout their lifecycles, helping you manage assets, fix vulnerabilities, check baseline settings, scan for and remove viruses, and detect intrusions.
Quick Alarm Report and Clearance
HSS can detect fingerprints, vulnerabilities, unsafe baselines on your servers and containers, and generate alarms in seconds.
Fix vulnerabilities and baseline issues in one click. Viruses can be automatically isolated in seconds.
High Performance and Accuracy
More than 99% of known ransomware can be detected. The accuracy of web shell and mining detection is greater than 99%.
HSS has been deployed and runs stably on millions of devices, with less than 2% CPU usage on average and little impact on services.
Low Costs and O&M Workloads
HSS is billed per use, easy to be installed, and can be available immediately after enabling. HSS can be used without installation on public cloud OSs.
Server and container security functions are integrated to reduce alarms and O&M workloads.
Meet Diverse Needs with a Range of HSS Editions
Meet Diverse Needs with a Range of HSS Editions
Edition
Basic
Identify server vulnerabilities and weak passwords. Suitable for individual users.
Professional
Detect viruses and fix vulnerabilities in one click.
Enterprise
Meet security and compliance requirements on the cloud.
Premium
Defend against ransomware and other intrusions.
Container
Prevent container escapes.
Web Tamper Protection
Protect web pages and system files from being tampered with.
Weak passwords
Weak passwords
Weak passwords
Server baselines
Weak passwords
Server baselines
Weak passwords
Server baselines
Container baselines
Weak passwords
Server baselines
System vulnerabilities
System vulnerabilities
Web-CMS vulnerabilities
System vulnerabilities
Web-CMS vulnerabilities
Application vulnerabilities
System vulnerabilities
Web-CMS vulnerabilities
Application vulnerabilities
System vulnerabilities
Web-CMS vulnerabilities
Application vulnerabilities
Container image vulnerabilities
System vulnerabilities
Web-CMS vulnerabilities
Application vulnerabilities
2 types
20+ types
30+ types
35+ types
40+ types
35+ types
Professional
Detect viruses and fix vulnerabilities in one click.
Weak passwords
System vulnerabilities
Web-CMS vulnerabilities
20+ types
Enterprise
Meet security and compliance requirements on the cloud.
Weak passwords
Server baselines
System vulnerabilities
Web-CMS vulnerabilities
Application vulnerabilities
30+ types
Premium
Defend against ransomware and other intrusions.
Weak passwords
Server baselines
System vulnerabilities
Web-CMS vulnerabilities
Application vulnerabilities
35+ types
Container
Prevent container escapes.
Weak passwords
Server baselines
Container baselines
System vulnerabilities
Web-CMS vulnerabilities
Application vulnerabilities
Container image vulnerabilities
40+ types
Web Tamper Protection
Protect web pages and system files from being tampered with.
Weak passwords
Server baselines
System vulnerabilities
Web-CMS vulnerabilities
Application vulnerabilities
35+ types
Abundant Application Scenarios for Service Security
Features
Features
Asset Management
HSS can count the processes, ports, middleware, and other assets on your servers and containers, and visualize the statistics for you.
Baseline Checks
Let HSS compare your settings with best practice baselines to detect security issues and fix them in one click.
Vulnerability Management
Use HSS to scan for 200,000+ vulnerabilities in your OS and software, and fix them in one click.
Antivirus
Take advantage of our cloud AI engine to detect and isolate Trojans, worms, mining software, ransomware, and more viruses in real time.
Intrusion Detection
HSS provides more than 400 threat detection models to detect intrusions, including brute-force attacks, reverse shells, penetrations, and container escapes in real time.
Ransomware Prevention
Protect your data with our end-to-end solution, which involves vulnerability detection, virus isolation, dynamic honeypots, and backup and restoration.
Web Tamper Protection
Protect the files on your servers, databases, and shared disks from being tampered with, and restore files within minutes if they are maliciously modified.
Container Image Security
HSS can scan for vulnerabilities, malicious files, and baseline issues in container images and provide suggestions.
Container Firewall
Cloud-native container access control, alarms, and blocking
Choice of Millions of Customers Worldwide
Choice of Millions of Customers Worldwide
Industry Recognition
Industry Recognition
Leader in the China Endpoint Security Detection and Response Market
Huawei Cloud entered the IDC 2020 Leaders quadrant with its technical and market performance in protecting cloud terminals (workloads), especially cloud servers and containers.
Highest Level of Trusted Cloud Service Certification by CAICT
At Trusted Cloud Summit 2020, Huawei Cloud Container Security passed strict tests of all its 49 capabilities and earned the highest level of trusted cloud service certification issued by China Academy of Information and Communications Technology (CAICT).
"Strong Performer" in The Forrester New Wave™
In August 2019, Forrester, an international authoritative consulting institution, released The Forrester New Wave™: Public Cloud Enterprise Container Platforms. The report shows that Huawei Cloud containers entered the Strong Performers quadrant.
More Services
More Services
SecMaster
Intelligent, next-gen cloud native security operations center
Cloud Backup and Recovery (CBR)
Centrally manage backups of your cloud and on-premises resources
Cloud Bastion Host (CBH)
Manage servers, control permissions, and audit O&M