Industry Solutions WAP端图片
Cloud Security
Problems faced by the industry
Problems faced by the industry

Cloud security has also become a focus of attention in the industry, and cloud data security is one of the most central issues in cloud security.

1.Cloud data faces threats from the tenant's own insiders, and tenant insiders can have maximum access to add, delete, and change cloud data;

2.Hacker APT attacks, SQL injections, database vulnerabilities and other attacks;

3.Attack methods such as virtual machine escape may be used to obtain sensitive data;

4.Business personnel do not do privacy on sensitive data access, which may cause data leakage;

 


Program Overview

In response to the security problems of cloud platform data, establish a monitoring and defense system for the entire life cycle of the data, regularly carry out data security vulnerability scanning to identify potential data security vulnerabilities and threats; implement a permission control mechanism, and formulate a permission access mechanism according to the roles of different cloud database accesses, so as to prevent data leakage and misuse. For the scenarios of data sharing and outgoing as well as real-time access, achieve desensitization of sensitive data.

 


Application Scenarios
Application Scenarios
Application Scenarios

1. Detailed records of logs of sensitive data access, electronic forensics, accurate to the person;

2. Identify the existence of vulnerabilities and weak passwords in the database through a comprehensive scanning and detection mechanism, timely risk and repair potential security vulnerabilities and threats;

3. Establish access rights control for internal personnel or third-party operation and maintenance personnel to effectively prevent malicious attacks by hackers and high-risk operations;

4. For development and testing personnel access or data sharing scenarios, desensitize business sensitive data such as cell phone numbers, ID cards, bank card numbers, etc. before data sharing to protect the privacy and security of sensitive data.

Characteristics and Advantages
Multi-cloud architecture support
Multi-cloud architecture support

Support for multiple cloud architectures: support for VMware vCloud, Openstack, KVM, RHEV, Hyper-V, CloudStack and so on.

Tenant rights separation
Tenant rights separation

Separation of rights: different cloud tenants provide separation of rights rules to ensure complete separation of rights and responsibilities between tenants.

Cloud-independent, direct log control
Cloud-independent, direct log control

Independent of the cloud platform: independent of the cloud platform, the user directly controls the security logs, to ensure the neutrality of the security protection results, but also to facilitate the upgrading and maintenance of security capabilities.

Value Demonstration
Tenant security, platform enhancement
Tenant security, platform enhancement
The data security of tenants is guaranteed, and the security of the cloud platform is also enhanced.
Tenant data security, business continuity
Tenant data security, business continuity
Comprehensive security protection safeguards the data security of tenants on the cloud and also ensures the normal and stable operation of tenants' businesses.
Meets cloud data compliance
Meets cloud data compliance
Satisfy the data security compliance requirements on the cloud.
Experience security protection for free now