SIEM
QAX SIEM helps government and enterprise customers to continuously monitor the security posture by collecting multiple and heterogeneous massive logs, using correlation analysis, machine learning, threat intelligence etc., upgrading the system form "passive defense" to "active defense".
See ProductTIP
QAX TIP is a product for enterprise users, which provides localized deployment, enables intelligence use, and facilitates users to efficiently use intelligence to discover threat products.
See ProductSOAR
QAX SOAR is a system of intelligent collaboration that integrates security operations-related teams, tools and processes through orchestration and automation, processes data from different sources in an orderly way, keeps conducting security alert triage and investigation, case management, cooperative operations, and incident response, and eventually realizes highly efficient and effective security operations.
See ProductVM
Vulnerability Managment System is a comprehensive vulnerability scanning product with independent intellectual property rights. The product was developed from the perspective of pre-attack stage. It checks the security vulnerabilities of targets from multiple perspectives, such as operating systems, web systems, weak passwords, databases, network devices, firewalls, etc. After the triage, the product provides a detailed report on the vulnerability and its solution to customer.
See ProductNDR
QAX SkyEye New Generation Threat Sensitive System (referred to as SkyEye system) is a sophisticated solution that provides customers with cybersecurity services and products, specialized in offense and defense penetration and data analysis, focusing on threat detection and response.
See ProductEDR
QAX Endpoint Detection and Response (EDR) system is a new generation of endpoint security products driven by threat intelligence.
See ProductSD-WAN
QAX Security SD-WAN consists of the security network Routing Gateway System and the Security Network Management and Control Platform, which can be integrated with the security capabilities such as NGFW, ICG and lPS deployed in virtualization.
See ProductZTNA
A data-centered, identity-based architecture provides continuous evaluation and adaptive access control mechanism for enterprise resources and digital assets.
See ProductNGFW
Data-Driven Security for coordinated safeguarding of perimeters.
See ProductSWG
Gain insights into online behavior and comprehensively respond to online risks.
See Product