Business Challenges

Business Challenges

  • System Intrusions

    Most enterprises value functionality more than security, so their systems tend to have vulnerabilities that can be exploited by attackers.
    Most enterprises value functionality more than security, so their systems tend to have vulnerabilities that can be exploited by attackers.
  • DDoS Attacks

    DDoS attacks can have a huge impact on enterprises. Enormous economic losses and high churn can occur every minute a system is offline.
    DDoS attacks can have a huge impact on enterprises. Enormous economic losses and high churn can occur every minute a system is offline.
  • Data Security

    Hackers are doing everything they can to steal data from enterprises. Safeguarding data against complex attacks has become a major challenge.
    Hackers are doing everything they can to steal data from enterprises. Safeguarding data against complex attacks has become a major challenge.
  • Costs

    For many enterprises, the cost of running a dedicated team of security experts to design security solutions, perform security assessments and O&M, and respond to security emergencies can be prohibitive.
    For many enterprises, the cost of running a dedicated team of security experts to design security solutions, perform security assessments and O&M, and respond to security emergencies can be prohibitive.

Full-stack Defense to Protect Your Data

  • Platform Security

  • Expert Service & Security Ecosystem

  • Network Security

  • Application Security

  • Host Security

  • Database Security & Data Encryption

Platform Security

Infrastructure Security

Compute resources can be scaled up or down so that services meet in-the-moment requirements.

O&M security

HUAWEI CLOUD provides one-stop pre-integration of services into a wide range of devices, allowing for hundreds of millions of connections and O&M-free service provisioning.

Security compliance

HUAWEI CLOUD services comply with security and compliance requirements in and outside China, and have been certified by many authorities.

Expert Service & Security Ecosystem

Security Expert Service (SES)

Enjoy professional security services provided by our experts in collaboration with information security authorities throughout the industry. Services include identifying security risks, fixing vulnerabilities, and developing security solutions.

Service assurance

Entrust your business to our professional teams, who can provide you with a wide range of assurance services.

Security ecosystem

Take advantage of a diverse range of security products from exceptional suppliers on HUAWEI CLOUD.

Network Security

Anti-DDoS

Anti-DDoS uses powerful devices to precisely defend against DDoS attacks. It protects your applications and notifies you instantly if it detects an attack. Anti-DDoS improves bandwidth usage and helps ensure stability and reliability.

Advanced Anti-DDoS (AAD)

Powered by Huawei's anti-DDoS cleaning center and big data operation platform, AAD allows you to specify high-defense IP addresses, to which malicious traffic will be diverted, hiding and protecting your servers from attacks.

Application Security

Web Application Firewall (WAF)

WAF examines all HTTP/HTTPS requests to detect and block attacks, ensuring website stability and preventing data breaches.

Vulnerability Scan Service (VSS)

On the VSS console, you can scan for website vulnerabilities and the system will suggest how to fix them before they are exploited by hackers.

Host Security

Host Security Service (HSS)

HSS helps you manage assets and system configurations, and detect vulnerabilities and intrusions, reducing security risks.

Related Services

Database Security & Data Encryption

Database Security Service (DBSS)

DBSS provides one-stop pre-integration of services into a wide range of devices, allowing for hundreds of millions of connections and O&M-free service provisioning.

Data Encryption Workshop (DEW)

DEW allows you to use dedicated encryption resources, and to manage keys and key pairs. Your keys will be protected by hardware security modules (HSMs) and can be integrated with many other HUAWEI CLOUD services. With these features, you can develop your own encryption applications.

Typical Scenarios

  • Anti-Intrusion

  • Anti-DDoS

  • Data Protection

  • Expert Services

Anti-Intrusion

Introduction

Real-Time Monitoring, Precise Defense, and Full Protection

Web Application Firewall (WAF)

WAF examines all HTTP/HTTPS requests, detecting and blocking attacks, such as SQL injections, XSS, webshells, and other exploits, ensuring the security of web applications deployed on cloud servers.

Virtual Private Cloud (VPC)

You can use VPCs, logically isolated using VXLAN, to strictly control access to VMs in your data center. You can also configure security groups, specifying what ports and protocols (TCP, UDP, or ICMP) can be used for access.

Host Security Service (HSS)

HSS protects your servers from being hacked. It detects and records remote logins, weak passwords, and malware.

Anti-DDoS

Introduction

Powerful Traffic Cleaning Devices and Operation Platform Guarding Your Business.

Anti-DDoS traffic cleaning

Anti-DDoS cleans up to 5 Gbit/s of traffic free of charge. Its "7-layer cleaning" technology examines and cleans every packet to defend against traffic and application layer attacks, keeping your business protected and secure.

Advanced Anti-DDoS (AAD)

AAD can defend against attacks with more than 5 Tbit/s of traffic. Up to 600 Gbit/s DDoS traffic on network and application layers can be diverted to a single high-defense IP address. You can purchase elastic bandwidth in addition to your basic bandwidth, adjusting the DDoS defense threshold anytime to protect servers against heavy-traffic attacks in a cost-effective manner.

Data Protection

Introduction

Safeguarding Your Data Assets

Web Application Firewall (WAF)

WAF examines all HTTP/HTTPS requests, detecting and blocking attacks, such as SQL injections, XSS, webshells, and other exploits, preventing data breaches.

Database Security Service (DBSS)

With reverse proxies and machine learning, DBSS helps you identify sensitive data, audit databases, and prevent injection attacks.

Key Management Service (KMS)

KMS interconnects with other basic cloud services (such as OBS, EVS, and IMS) to provide highly reliable HSMs for tenant applications, encrypting all the data you want to protect on the cloud.

Expert Services

Introduction

Professional Team Tailoring Solutions for You

Security Expert Service (SES)

We work with leading institutes in information security to identify weaknesses and vulnerabilities in your system, and will provide a detailed report with professional advice on discovered issues.

Security solution

We tailor security solutions based on the deployment, characteristics, and security assessment results of your business systems.

Security response

Our team of experts is ready 24/7 to respond to security emergencies.

Service assurance

We provide a wide range of assurance services you can easily access, and listen carefully to your feedback.

Solution Advantages

  • Customized Solutions

    Take advantage of security solutions precisely targeting your pain points, solutions custom designed for your business.

  • Privacy & Security

    Your data and applications are always and only yours. We protect them but never access them.

  • Professional Services

    Enjoy security assessment, solution design, O&M, and emergency response services from professional teams.

  • Robust Ecosystem

    Entrust your data and services to an open and mutually beneficial security ecosystem with solutions based on shared responsibility.