Policies and Configurations of Continuous Optimization
Provide targeted consulting services on security protection policies and practical configuration support based on the requirements for cloud security in a specific period of time.
Provide multi-dimensional reporting solutions to analyze risks and demonstrate how they are mitigated as report-based security monitoring is an indispensable part of daily operations. Implement specific configurations on behalf of you with authorization or simply provide consulting services on reporting solutions.
Support for Product Integration
Configure security products to integrate them with your business systems on behalf of you with authorization, or simply provide guidance and assistance on products configurations. In the latter case, configurations can be done by customer.
End-to-End Monitoring, Inspection, and Alerting
Regularly inspect the services, policies, security event alerts, and logs to determine the availability and effectiveness of security services and the effectiveness of security protection policies. Implement real-time monitoring on and send DingTalk group notifications for high-risk security events, such as the running of mining applications and the occurrence of viruses and web shells.
Service Solution Upgrade
In cases where you need to upgrade a solution to respond to changes in the security environment, provide consulting services on and implementation support for solution optimization. This ensures that security services can defend against attacks in a timely and effective manner to maintain business stability.
Regular Service Reports
Deliver every month a Security Service Operation and Usage Report, which covers the operation and usage of the relevant security service and suggestions on architecture optimization.