Network Security Intelligent Disposal Platform Service-SA10

The Security Managed Service aims to ensure the sustained effectiveness of cybersecurity. Focusing on four risk factors: assets, vulnerabilities, threats, and incidents, it adopts a human-machine intelligence collaboration model through the effective coordination of a cloud-based security operation platform and a team of security experts. Together with users, it builds systematic security operation capabilities featuring 7×24-hour continuous protection, effective prevention, and active closed-loop management.

  • Details
  • Service Overview

    The Security Managed Service aims to ensure the sustained effectiveness of cybersecurity. Focusing on four risk factors: assets, vulnerabilities, threats, and incidents, it adopts a human-machine intelligence collaboration model through the effective coordination of a cloud-based security operation platform and a team of security experts. Together with users, it builds systematic security operation capabilities featuring 7×24-hour continuous protection, effective prevention, and active closed-loop management.

    1.1 Service Launch

    1. Component deployment and integration

    2. Asset collection and entry

    1.2 Security Status Assessment

    1. Policy inspection

    2. Vulnerability assessment

    3. Asset attack surface analysis (provided as required)

    1.3 Security Issue Remediation

    1. Policy optimization

    2. Guidance on vulnerability remediation

    2.1 Asset Management

    1. Asset fingerprint detection

    2. Asset change management

    2.2 Vulnerability Management

    1. Vulnerability scanning and verification

    2. Vulnerability remediation prioritization and notification

    3. Feasible vulnerability remediation solutions

    4. Vulnerability retesting and status tracking

    5. Weak password analysis and management

    6. Protection of highly exploitable vulnerabilities (provided as required)

    2.3 Threat Management

    1. 7×24-hour threat analysis and judgment

    2. 7×24-hour threat notification

    3. Threat impact analysis

    4. Assisted threat response

    5. Threat intelligence management

    6. Advanced threat hunting (provided as required)

    7. Policy inspection

    8. Policy optimization

    2.4 Incident Management

    1. Security incident investigation and analysis

    2. Security incident response and closure (provided as required)

    3. Emergency response for major incidents (provided as required)

    3.1 7×24-Hour Service Team

    1. Dedicated service manager

    2. Real-time expert consultation

    3. On-duty support during holidays

    4. Visualized Operation Results

    1. Weekly security operation report

    2. Monthly security operation report

    3. Semi-annual security operation report

    4. Annual security operation report

    5. Customer portal (provided as required)

    Service Deliverables

    • Initial Security Risk Analysis Report

    • Vulnerability Evidence Report (as required)

    • Vulnerability List (as required)

    • Emergency Response Report (as required)

    • Threat Intelligence

    • Attack Surface Inventory (as required)

    • Threat Hunting Report (as required)

    • Semi-Annual Summary Report

    • Annual Summary Report


    Service Overview

    The Security Managed Service aims to ensure the sustained effectiveness of cybersecurity. Focusing on four risk factors: assets, vulnerabilities, threats, and incidents, it adopts a human-machine intelligence collaboration model through the effective coordination of a cloud-based security operation platform and a team of security experts. Together with users, it builds systematic security operation capabilities featuring 7×24-hour continuous protection, effective prevention, and active closed-loop management.

    1.1 Service Launch

    1. Component deployment and integration

    2. Asset collection and entry

    1.2 Security Status Assessment

    1. Policy inspection

    2. Vulnerability assessment

    3. Asset attack surface analysis (provided as required)

    1.3 Security Issue Remediation

    1. Policy optimization

    2. Guidance on vulnerability remediation

    2.1 Asset Management

    1. Asset fingerprint detection

    2. Asset change management

    2.2 Vulnerability Management

    1. Vulnerability scanning and verification

    2. Vulnerability remediation prioritization and notification

    3. Feasible vulnerability remediation solutions

    4. Vulnerability retesting and status tracking

    5. Weak password analysis and management

    6. Protection of highly exploitable vulnerabilities (provided as required)

    2.3 Threat Management

    1. 7×24-hour threat analysis and judgment

    2. 7×24-hour threat notification

    3. Threat impact analysis

    4. Assisted threat response

    5. Threat intelligence management

    6. Advanced threat hunting (provided as required)

    7. Policy inspection

    8. Policy optimization

    2.4 Incident Management

    1. Security incident investigation and analysis

    2. Security incident response and closure (provided as required)

    3. Emergency response for major incidents (provided as required)

    3.1 7×24-Hour Service Team

    1. Dedicated service manager

    2. Real-time expert consultation

    3. On-duty support during holidays

    4. Visualized Operation Results

    1. Weekly security operation report

    2. Monthly security operation report

    3. Semi-annual security operation report

    4. Annual security operation report

    5. Customer portal (provided as required)

    Service Deliverables

    • Initial Security Risk Analysis Report

    • Vulnerability Evidence Report (as required)

    • Vulnerability List (as required)

    • Emergency Response Report (as required)

    • Threat Intelligence

    • Attack Surface Inventory (as required)

    • Threat Hunting Report (as required)

    • Semi-Annual Summary Report

    • Annual Summary Report