Cyber Security Products

SIEM

QAX SIEM helps government and enterprise customers to continuously monitor the security posture by collecting multiple and heterogeneous massive logs, using correlation analysis, machine learning, threat intelligence etc., upgrading the system form "passive defense" to "active defense".

See Product

TIP

QAX TIP is a product for enterprise users, which provides localized deployment, enables intelligence use, and facilitates users to efficiently use intelligence to discover threat products.

See Product

SOAR

QAX SOAR is a system of intelligent collaboration that integrates security operations-related teams, tools and processes through orchestration and automation, processes data from different sources in an orderly way, keeps conducting security alert triage and investigation, case management, cooperative operations, and incident response, and eventually realizes highly efficient and effective security operations.

See Product

VM

Vulnerability Managment System is a comprehensive vulnerability scanning product with independent intellectual property rights. The product was developed from the perspective of pre-attack stage. It checks the security vulnerabilities of targets from multiple perspectives, such as operating systems, web systems, weak passwords, databases, network devices, firewalls, etc. After the triage, the product provides a detailed report on the vulnerability and its solution to customer.

See Product

NDR

QAX SkyEye New Generation Threat Sensitive System (referred to as SkyEye system) is a sophisticated solution that provides customers with cybersecurity services and products, specialized in offense and defense penetration and data analysis, focusing on threat detection and response.

See Product

EDR

QAX Endpoint Detection and Response (EDR) system is a new generation of endpoint security products driven by threat intelligence.

See Product

SD-WAN

QAX Security SD-WAN consists of the security network Routing Gateway System and the Security Network Management and Control Platform, which can be integrated with the security capabilities such as NGFW, ICG and lPS deployed in virtualization.

See Product

ZTNA

A data-centered, identity-based architecture provides continuous evaluation and adaptive access control mechanism for enterprise resources and digital assets.

See Product

NGFW

Data-Driven Security for coordinated safeguarding of perimeters.

See Product

SWG

Gain insights into online behavior and comprehensively respond to online risks.

See Product