Overview

Benefits

XDR Platform
Gathers risk alerts and logs from CWPP, CFW, and WAF, then analyzes the data using threat intelligence and an in-house security database. This enables customers to centrally manage threat detection, investigation, and response capabilities, thereby enhancing efficiency in detecting and responding to threats.

Asset Security

Alerts on Urgent Vulnerabilities

Configuration Management
Identifies configuration vulnerabilities across products like CVM, COS, CloudDB, and CLB, aiding customers in mitigating risks associated with inaccurate configurations and enhancing overall cloud security.

Internet Attack Surface Mapping

Log Collection and Query

Security Visualization
Displays the real-time monitoring data and security posture of your assets and services on the Dashboard and Overview page. You can also download reports whenever necessary.

Automated Handling

Cloud UBA
Scenarios
XDR Platform
Asset Security Management
Managed Services
Scenario
Continuous security threats, including network and host intrusions, pose challenges to cloud assets. Enterprises mitigate these risks by employing various security solutions such as CWPP, CFW, and WAF. Yet, managing alerts, configurations, and policies separately diminishes operational efficiency. In response, CSC integrates data and capabilities from security products, along with years of threat analysis experience and intelligence data, to streamline threat operations for customers.
Solutions
The Cloud XDR threat operations solution leverages CSC as its central platform to gather and assess alerts and logs from CWPP, CFW, and WAF. It conducts detailed analysis through alert characterization, event investigation, and threat intelligence, enabling the identification of critical alerts and the generation of comprehensive compromise reports to track the entire attack process. As a cloud-native product, CSC seamlessly integrates the handling and blocking functionalities of CWPP, CFW, WAF, and security groups, enhancing customers’ threat response efficiency. Additionally, Alto Cloud offers cloud-based threat management and operations services to assist customers lacking in operational resources and capabilities in conducting real-time threat monitoring and response.
Scenario
Leveraging the public cloud for business operations enhances flexibility, but it also entails frequent asset changes, necessitating significant operational and management efforts. Therefore, customers require automated tools for asset management.
Solutions
CSC offers a comprehensive security management platform for overseeing cloud asset processes. It gathers data on cloud assets, detects security vulnerabilities, and addresses them through automated policies. This establishment of a unified asset-centric security management platform enhances overall cloud security.
Scenario
As cybersecurity challenges and stringent security compliance requirements continue to rise, customers seek professional managed services to assist in constructing and operating their security systems.
Solutions
CSC delivers expertly managed security services. Security engineers ensure continuous monitoring, rapid emergency response, and routine inspections for customers. This allows customers to concentrate solely on strategic security system planning and management, effortlessly ensuring the secure operation of their cloud-based businesses.
Distributed Cloud
Natural Language Processing