For large enterprise customers, the number of servers is huge, and the security protection system is difficult to cover all assets. With the increase of security vulnerabilities, the cyber security becomes pressing problems. Numen SSP is based on SaaS, adopts adaptive plug-in engine, build the closed-loop security protection by multiple functional modules.
A flexible plug-in engine, multiple functional modules such as smart asset inventory, risk identification, intrusion detection, and baseline compliance are linked, data connectivity between modules with MITRE ATT&CK forms a closed-loop security process.
Based on 24x7 high-real-time monitoring on every node of attack path, it can automatically and timely detect cyberthreats and block cyberattacks, to prevent malicious actors damage the business servers thus avoiding customer’s losses.
Agent scanning mechanism can comprehensively detect the vulnerabilities of IT assets and discover latest vulnerabilities and server failures in real time. Continuous to protect the services, applications, and data in the server environment.
The product adopts a centralized management mode for unified platform management and control. It can be deployed on popular operating systems (OS) and compatible with hybrid business architecture, for example, physical environments, virtual environments, and cloud environments.
If an organization uses the Windows Active Directory to manage its network, this brings great convenience but also introduces great cybersecurity risks, because once an attacker takes control of single host, he can launch attacks on the Active Directory to control the entire network environment. Our products are fully protected by industry leading defense technology.
Based on a fine-grained asset inventory system, the server asset structure is automatically constructed, and the management console performs centralized and unified management. Continuous monitoring of asset information, real-time notification, and dynamic asset protection.
Relying on the mechanism of active scanning, continuous monitoring, analysis, and timely security patch update, accurate weak password detection, comprehensive monitoring of asset exposure risks, etc., it can effectively prevent potential cyberthreats and reduce the risks.
Multi-dimensional monitoring each node on the attack path, deep analysis from attack timeline and different dimensions, provide detailed solution, help users to deal with network attacks accurately and effectively.
Powerful capabilities of analysis and processing of massive data, automatic correlation to generate security logs, high flexible query, tracing the attack process, abnormal behavior, and intrusion events.
Continue to follow up to the baseline compliance guidelines and improve the checklists, thus can provide effective suggestions for non-compliant check items.
Continuous detect abnormal behaviors, protect sensitive data. When threats are detected, will record all malicious actions immediately and trigger joint defense, provide reliable protection for servers.
Actively and comprehensively discover the potential risks and vulnerabilities on the servers, promptly mitigate high risks, such as vulnerabilities, weak passwords, and malicious code execution, thereby improving the capabilities of security monitoring, prevention, and management, ensuring the last mile of cybersecurity.
Through the adaptive capabilities of prevention, detection, protection and response, formed a set of visual server management platform that can identify internal risks and defense external threats