Security Center
A unified security management system that identifies, analyzes, and notifies you of security threats in real time
Overview
Benefits
Choose How You Pay
SLA
Overview
Comprehensive and Intelligent Security Management
Powered by big data technologies, Security Center provides protection from ransomware, various viruses, and web tampering. Security Center also provides compliance assessment to protect cloud and on-premises servers and meet regulatory compliance requirements. Security Center is fully compatible with third-party service providers. This reduces operations and maintenance (O&M) costs for security management.
Features
Vulnerability Management and Fixes
Security Center identifies the vulnerabilities of mainstream systems and software. It also allows you to fix the vulnerabilities with only a few clicks.
Cloud Platform Configuration Assessment
Security Center links the capabilities of cloud services to form a security closed-loop based on security practices.
Baseline Check
Security Center reduces the risks caused by improper configurations based on a checklist of the best configurations provided by Alibaba Cloud.
Anti-virus and Anti-ransomware
Security Center implements real-time interception on seven types of viruses, including known ransomware, mining programs, worms, and DDoS trojans.
Anti-tamper
Security Center prevents your website from being hacked or controlled by the acts that involve terrorism, dark chains, or backdoors.
Application Whitelist
Security Center prevents the unauthorized use of your applications to maintain complete serviceability.
Automated Alert Detection and Association
Security Center automatically associates alerts and identifies intrusions caused by low-risk anomalies to improve operational efficiency.
Custom Alerts
Security Center supports the real-time analysis and aggregation of third-party data on the cloud. It also supports custom alert rules.
Security Overview
Security Center provides a security screen to show network security from multiple dimensions with various metrics.
SecuAutomated Attack Traceabilityrity
Security Center automatically traces the sources and causes of attacks. This helps you understand the ins and outs of intrusion threats and make quick responses.
Log Analysis and Audit
Security Center provides log analysis and audit capabilities. It also provides a platform to trace attacks and ensure compliance.
Asset Fingerprints
Security Center collects various information, such as host port, process, software, and scheduled task information.