Packaged with multiple product bundles.
| 1)Penetration Testing Service (Remote):Simulating the behavior of real attackers, we conduct in-depth penetration testing on target systems, websites, applications or networks to identify potential vulnerabilities and risks, and provide feasible remediation and defense recommendations. (Black-box or white-box testing shall be specified in advance.) |
| 2)Penetration Testing Service (On-Premises):By simulating the behavior of real attackers, in-depth penetration testing is performed on target systems, websites, applications or networks to identify potential vulnerabilities and risks, and feasible remediation and defense suggestions are provided.(Black-box or white-box testing mode shall be specified in advance.) |
| 3)Cybersecurity Awareness Training:Through an organized educational process, employees or individuals will gain a better understanding of cybersecurity threats, recognize the importance of protecting information assets, and develop the ability to adopt secure behavioral habits in their daily work and lives. |
| 4)Cybersecurity Advisory Service:Timely and accurately inform customers of newly discovered cybersecurity threats, vulnerability information and ongoing security incidents, and provide corresponding response recommendations. |
| 5)Network Security Intelligent Disposal Platform Service:Based on the Network Security Intelligent Disposal Platform Service – Z005 Local Operation Platform, a full set of normalized security services is provided for customers' information systems through a professional team, security platform and standardized processes, including continuous monitoring, threat detection, rapid response and proactive optimization. |
| 6)Network Security Planning & Construction Service:Based on national laws and regulations, industry standards, and the organization's own business requirements, we tailor a cybersecurity architecture for enterprises and public institutions. |
| 7)Information Security Management System Construction Service:In accordance with national laws and regulations as well as the actual business needs of customers, we systematically design, develop and deliver a complete, compliant and implementable information security management system. (Not sold separately) |
| 8)Internet Exposure Detection Service:Perform Internet exposure detection on customers' assets, services, open ports and other related information. |
| 1)Penetration Testing Service (Remote):Simulating the behavior of real attackers, we conduct in-depth penetration testing on target systems, websites, applications or networks to identify potential vulnerabilities and risks, and provide feasible remediation and defense recommendations. (Black-box or white-box testing shall be specified in advance.) |
| 2)Penetration Testing Service (On-Premises):By simulating the behavior of real attackers, in-depth penetration testing is performed on target systems, websites, applications or networks to identify potential vulnerabilities and risks, and feasible remediation and defense suggestions are provided.(Black-box or white-box testing mode shall be specified in advance.) |
| 3)Cybersecurity Awareness Training:Through an organized educational process, employees or individuals will gain a better understanding of cybersecurity threats, recognize the importance of protecting information assets, and develop the ability to adopt secure behavioral habits in their daily work and lives. |
| 4)Cybersecurity Advisory Service:Timely and accurately inform customers of newly discovered cybersecurity threats, vulnerability information and ongoing security incidents, and provide corresponding response recommendations. |
| 5)Network Security Intelligent Disposal Platform Service:Based on the Network Security Intelligent Disposal Platform Service – Z005 Local Operation Platform, a full set of normalized security services is provided for customers' information systems through a professional team, security platform and standardized processes, including continuous monitoring, threat detection, rapid response and proactive optimization. |
| 6)Network Security Planning & Construction Service:Based on national laws and regulations, industry standards, and the organization's own business requirements, we tailor a cybersecurity architecture for enterprises and public institutions. |
| 7)Information Security Management System Construction Service:In accordance with national laws and regulations as well as the actual business needs of customers, we systematically design, develop and deliver a complete, compliant and implementable information security management system. (Not sold separately) |
| 8)Internet Exposure Detection Service:Perform Internet exposure detection on customers' assets, services, open ports and other related information. |