The Security Managed Service aims to ensure the sustained effectiveness of cybersecurity. Focusing on four risk factors: assets, vulnerabilities, threats, and incidents, it adopts a human-machine intelligence collaboration model through the effective coordination of a cloud-based security operation platform and a team of security experts. Together with users, it builds systematic security operation capabilities featuring 7×24-hour continuous protection, effective prevention, and active closed-loop management.
Component deployment and integration
Asset collection and entry
Policy inspection
Vulnerability assessment
Asset attack surface analysis (provided as required)
Policy optimization
Guidance on vulnerability remediation
Asset fingerprint detection
Asset change management
Vulnerability scanning and verification
Vulnerability remediation prioritization and notification
Feasible vulnerability remediation solutions
Vulnerability retesting and status tracking
Weak password analysis and management
Protection of highly exploitable vulnerabilities (provided as required)
7×24-hour threat analysis and judgment
7×24-hour threat notification
Threat impact analysis
Assisted threat response
Threat intelligence management
Advanced threat hunting (provided as required)
Policy inspection
Policy optimization
Security incident investigation and analysis
Security incident response and closure (provided as required)
Emergency response for major incidents (provided as required)
Dedicated service manager
Real-time expert consultation
On-duty support during holidays
Weekly security operation report
Monthly security operation report
Semi-annual security operation report
Annual security operation report
Customer portal (provided as required)
Initial Security Risk Analysis Report
Vulnerability Evidence Report (as required)
Vulnerability List (as required)
Emergency Response Report (as required)
Threat Intelligence
Attack Surface Inventory (as required)
Threat Hunting Report (as required)
Semi-Annual Summary Report
Annual Summary Report
Component deployment and integration
Asset collection and entry
Policy inspection
Vulnerability assessment
Asset attack surface analysis (provided as required)
Policy optimization
Guidance on vulnerability remediation
Asset fingerprint detection
Asset change management
Vulnerability scanning and verification
Vulnerability remediation prioritization and notification
Feasible vulnerability remediation solutions
Vulnerability retesting and status tracking
Weak password analysis and management
Protection of highly exploitable vulnerabilities (provided as required)
7×24-hour threat analysis and judgment
7×24-hour threat notification
Threat impact analysis
Assisted threat response
Threat intelligence management
Advanced threat hunting (provided as required)
Policy inspection
Policy optimization
Security incident investigation and analysis
Security incident response and closure (provided as required)
Emergency response for major incidents (provided as required)
Dedicated service manager
Real-time expert consultation
On-duty support during holidays
Weekly security operation report
Monthly security operation report
Semi-annual security operation report
Annual security operation report
Customer portal (provided as required)
Initial Security Risk Analysis Report
Vulnerability Evidence Report (as required)
Vulnerability List (as required)
Emergency Response Report (as required)
Threat Intelligence
Attack Surface Inventory (as required)
Threat Hunting Report (as required)
Semi-Annual Summary Report
Annual Summary Report