Safely Deploy Your Global Business on Alibaba Cloud
Alibaba Cloud is the official cloud service partner of the Olympic Games and has been providing digital infrastructure for Alibaba Group. Based on extensive experiences, Alibaba Cloud provides high-performance cloud technologies to help your business operate at its best.
5,000,000,000
Attacks Blocked Per Day
2,000
DDoS Attacks Blocked Per Day
700,000
Owned Global SSL Certificates
7,340,000
Vulnerabilities Fixed Per Year
End-to-End Security Services
-
Professional Security Service Customization
Alibaba Cloud implements a security assessment of your business, analyzes your business needs, and works closely with you to customize the security rules that seamlessly suit your business.
-
Cloud-native Security Service
Alibaba Cloud cloud-native security services are developed based on the adaptive security architecture. These services enable continuous security monitoring and analytics for your data. Alibaba Cloud also provides real-time threat reports and quick recovery from security risks to protect your data.
-
Security Assurance Throughout Service Lifecycle
Alibaba Cloud manages the infrastructure and provides security assurance for its services. In addition, Alibaba Cloud has formulated a service delivery process to ensure that all the services that Alibaba Cloud delivers are secure and reliable.
Digital Transformation with Red Hat and Alibaba Cloud Episode 2: SecurityLearn how Red Hat approaches security and new security features added in Red Hat Enterprise Linux 8, and how you can take advantage of the flexibility of Alibaba Cloud's security services to build a cloud fortress.
Wednesday, January 13th | 10:00-11:00 (UTC+8)
Register the Conference >Alibaba Cloud Security Product
You can enjoy a private discount if you purchase multiple security services at a time. Contact Sales >
Type | Product | Scenario |
---|---|---|
Infrastructure Security |
![]() Free |
Basic DDoS protection integrated with ECS Get it Free > |
![]() |
BGP-based DDoS mitigation, low latency, X Tbit/s bandwidth, and anycast Buy Now > | |
![]() |
Assets/Baseline/Compliance/Ransomware/Mining/Tamper-proofing/AccessKey pair leak-proofing/Attack source tracing/Cloud security configuration monitoring/Cloud asset risk monitoring 7-day Free Trial > Buy Now > | |
![]() |
Top 1 in Asia-Pacific; The only Chinese product included in Gartner Magic Quadrant for web application firewalls Buy Now > | |
![]() New |
Risky operation interception and operation playback Multiple O&M protocols and automatic synchronization between cloud resources Buy Now > |
|
![]() |
Access control and IPS at the cloud perimeter, visualized east-west and north-south traffic, and interception of outbound traffic 7-day Free Trial > Buy Now > | |
![]() |
Flexible HTTPS for websites and applications Centralized management of certificates on and out of the cloud Buy Now > |
|
Identity Security |
![]() |
Records of all operations Real-time and visual reports Free Trial > |
![]() |
Multiple authorization methods and global validation upon one-time configuration Free Trial > | |
![]() |
Provides account, authentication, authorization, application, and audit features Free Beta > | |
Business Security |
![]() |
A highly customizable network security solution Buy Now > |
![]() |
Detection for pornography, violence, and terrorism in images, text, audios, and videos; Daily update of compliance intelligence Buy Now > | |
Data Security Assurance |
![]() New |
Sensitive data identification and data risk monitoring; Static and dynamic data desensitization to ensure asset security 7-day Free Trial > Buy Now > |
![]() Beta |
Cloud-based encryption and low costs Full qualifications, compliant with commercial cryptographic standards Try the Beta > |
|
![]() |
Cloud-based key hosting; Cloud service integration and encryption with ease Free Trial > Buy Now > | |
![]() |
Audit of all behavior and interception of risky operations Maintenance-free, no downtime, and quick deployment Buy Now > |
|
Service Security |
![]() |
Expert hosting support Routine security configuration, monitoring, and O&M Buy Now > |
Infrastructure Security
Identity Security
Business Security
Data Security Assurance
Service Security
Security Scenarios
- Online Business Protection
- Static Website Protection
- Business Migration Protection
- Data Security Assurance
- Cloud Security
- Online business operations are critical to enterprises in the e-commerce industry. Such operations may bring about specific issues, such as the system availability issues that arise due to a significant volume of inbound traffic, promotion abuse that comes along with promo codes and coupons, and distributed denial of service (DDoS) attacks. Such issues arise frequently, which may affect or bring a negative impact on online business operations. Based on extensive practical experience of Alibaba Group in the e-commerce industry, Alibaba Cloud provides comprehensive protection solutions that are designed for website operations.
- 1. Ensure the stable operation of business O&M systems.
- 2. Defend against web attacks and malicious frauds.
- 3. Protect business servers from intrusion and prevent data loss.
- Based on the experiences on e-commerce business protection for many years, Alibaba Cloud takes care of your business and prevents server malfunctions caused by malicious activities and attacks.
- After identifying and protecting malicious features of the business traffic on website or applications, only the secure traffic are returned to the server. The website HTTPS is encrypted to prevent hijacking and tampering. It avoids the malicious intrusion of the website server and safeguards your business data.
- Hackers blackmail, database leaks
- Service unavailability due to competitor HTTP flood attacks
- Web pages are tampered with or embedded in dark chains
- Security is one of the important factors when enterprises consider whether to migrate their business to the public cloud, or determine the systems and data to be migrated to the public cloud. Alibaba Cloud provides comprehensive security solutions that can keep customer business safe in the public cloud from different dimensions.
- 1. Perform unified monitoring, management, and audit to guarantee standard operating procedures in the cloud.
- 2. Ensure the continuity of cloud-based business and defend against DDoS and web attacks.
- 3. Implement complete network isolation to ensure that communications between different regions in the cloud are compliant and under control.
- 4. Provide all-round protection at the server level to keep servers safe.
Related Products
- Based on years of practical experience in the security protection for enterprise data in the cloud, Alibaba Cloud extracts eight core capabilities from the data security maturity model (DSMM). These core capabilities are required for enterprises that want to safely deploy their business in the cloud. Enterprises can master and develop these capabilities at the levels of cloud, pipeline, and terminal.
Technical Focus
- Provide data lifecycle management.
- Focus on key topics in protecting data security.
- Improve the overall defense and response capabilities against risks.
- In addition to the customers who deploy their business on Alibaba Cloud, the security solutions provided by Alibaba Cloud also cater to the security requirements of customers who operate business in data centers or customers of other cloud service providers. Alibaba Cloud Anti-DDoS Pro and Web Application Firewall (WAF) can protect both cloud and on-premises services. WAF also allows customers to deploy forwarding ports on servers to manage and control data in the cloud and forward data to the ports. For the customers who are unable to access cloud services for a period of time, Alibaba Cloud Security Center can help them protect their servers in the data center. This way, more customers can benefit from cloud security protection.
Technical Focus
- Defend against DDoS attacks, web attacks, and server attacks that aim at on-premises assets.
- Share the information about the most recent attacks in the cloud with customers in their self-managed environments.
- Centralize the management and control of both cloud and on-premises assets by using unified security policies.
Related Products
Get one-on-one guidance from technical experts and private discounts now.
Contact SalesAlibaba Cloud Adheres to International Security and Compliance Standards
-
GDPR
-
PCI DSS
-
MPAA
-
DJCP MLPS
-
CSA STAR
-
AICPA
Being a Cloud Security Expert
Get hands-on experiences and certificates with your featured courses.
Cloud Security Overview
Cloud Platform Security Overview
Learn about Alibaba Cloud's security products line and their design strategy.
Application Security
Protect Your Web Application on Alibaba Cloud
Learn the main security risks faced by web applications on internet and solutions offered.
Network Security
Use Anti-DDoS Basic and Pro to Defend DoS Attack
Learn how Alibaba Cloud Anti-DDoS products protect your business continuity and security.
Enable Alibaba Cloud End-to-End Security Services
Adopt leading cloud security technology to escort your business
Contact Sales