The platform provides timely and accurate vulnerability matching functions, quickly locate critical vulnerabilities, and advice on feasible solutions to eliminate the threats.
Platform enables easy look up of APT group information, including tactics, techniques and procedures, background, as well as relation graph, etc.
Platform enable batch automatic detection of local mails, integrates OWL and RAS engines, and helps enterprises to comprehensively detect internal attack mails, phishing mails and APT mail attacks, making it more powerful in EXP attack prevention compared with traditional email gateway.
It can be integrated with SOC, SIEM, SPLUNK and other platforms, through Restful API to achieve high-performance detection, and enhance security capacity.
Enrich localized intelligence through cloud based database, and it can be upgraded through internet connection.
It provides batch automatic local mail detection service for enterprises. It integrates OWL and RAS efficient engine technology, which can quickly detect if it is a malicious mail or there are threats in attachments, etc. It enhances the users ability to detect malicious content in attachments.
Cloud data is sunk to the users local environment and is linked with the users security products. The platform not only provides multi-dimensional intelligence sharing, but also realizes multi-source intelligence access and integration. Based on standard STIX intelligence, it empowers users third-party equipment and carries out product linkage processing, building an integrated endogenous intelligence management system.
Based on advanced machine learning technology, automated multi-level correlation, and deep mining of information, it provides users with efficient and accurate intelligence response capabilities, quickly queries the full amount of IOC, and carry out qualitative analysis of false positives and attacks, and obtains rich context information related to malware families and attack groups.
Relying on strong sample collection capability and leading network data in China, it includes APT intelligence from hundreds of intelligence sources and multiple security research teams. It has rich data sources such as behavior sample database, domain name information database, survival website database and vulnerability intelligence database.