No results found. Please try re-entering the product name
Ping An Host Security (PHS) provides risk prevention and security protection for Ping An Cloud’s host. Adopting the Adaptive Security Architecture proposed by Gartner in 2014, it avoids the passive traditional defense and equips systems with powerful real-time monitoring and response capabilities to help enterprises effectively predict risks, accurately perceive threats, and improve response efficiency, thus ensuring the last-kilometer security of enterprises.
Add a protective shell to the Agent to prevent tampering. Encrypted transmission and host-end communication ensure data security.
Its application to 50000+ hosts proves that its stability is up to 99.998%. Automatic restart within 2 minutes after going offline ensures that the system is always under monitoring.
When the system load is normal, the consumption is very low, with CPU utilization <1% and memory usage <40M.
Integrates domestic and foreign mainstream anti-virus engines like Avira AntiVirus and ClamAV.
Keeps abreast of regulatory policies to help enterprises meet regulatory requirements. Customize inspection criteria for scenarios with different inspection benchmarks.
Designed to provide risk prevention and security protection for Ping An Cloud’s host , it adopts the Adaptive Security Architecture which is an enterprise security architecture proposed by Gartner for the next decade, and can effectively resist advanced attacks in a complex and changing environment, representing the development direction of the whole security industry.
Its innovations are as follows:
focusing on ensuring the security of the business system behind the firewall and emphasizing the construction of a security system based on business, from the inside out;
and moving from the traditional security event protection to continuous security response and processing process, continuously protecting enterprise security from multiple dimensions.
In accordance with the cybersecurity classified protection regulations, it is able to detect intrusions on important nodes, prevent malicious programs from obtaining or tampering with sensitive information, and send alarms in case of serious intrusions. It also supports static detection and behavior detection of malicious codes such as backdoor, Trojan, worm and webshell; controls and isolates the detected malicious codes; and enables users to check if they meet the compliance baseline.
Asset inventory, dedicated to helping users automate the construction of fine-grained asset information from a security perspective, supports accurate identification and dynamic perception of business-level assets, and provides visibility of the protected assets. Adopting the Agent-Server architecture and with good expansion capability, it takes inventory of critical assets for more than 10 types of hosts and automatically identifies more than 200 types of business applications.
The compliance baseline consists of the baseline requirements of China’ Cybersecurity Classified Protection and the Center for Internet Security (CIS), covering multiple versions of mainstream operating systems, Web applications, and databases, etc. With the compliance baseline, users can quickly conduct internal risk self-test, find problems and timely fix them to achieve the security conditions required by the regulatory authorities; and enterprises can customize their baseline standards as the security benchmark for their internal management.
Intrusion detection provides multi-anchor detection capability of accurately perceiving intrusions in real time and finding the breach host, and provides response measures to the intrusions.
Risk discovery is committed to helping users accurately discover internal risks, helping the security team quickly locate and effectively solve security risks, and providing detailed asset and risk information for making analysis and responses.
Professional
Enterprise
Flagship
Call us
400-151-8800
Email us
cloud@pingan.com