Host Security Service

Host Security Service (HSS) is designed to improve the overall security for hosts. It provides security functions such as host antivirus and host intrusion prevention (HIDS).

Virus Scanning and Killing

Industry-leading virus scanning and scanning technologies are used to detect threats more accurately.

Zero-Day Defense

Virtual patches are provided to defend against zero-day attacks, resolve pain points in compliance check, and prevent service interruption caused by a restart of the patch deployment server.

Centralized Management

HSS supports integrated management and high scalability to reduce management costs and complexity.

Strong Compatibility

The Agent is compatible with more than 22 operating systems.

Application Scenarios

  • Classified Protection Compliance

  • Unified Security Management

Classified Protection Compliance

Classified Protection Compliance

A tiered cyber security protection system is an important content of cyber security laws. The malicious code prevention function provided by HSS is a key item in classified protection compliance check. This function is used to detect the infection of malicious code and the spread between VMs to protect the security of servers and service systems.

Advantages

  • Malicious Code Prevention

    The deep packet inspection (DPI), antivirus, and integrity monitoring functions are used to protect service hosts against DDoS attacks and attacks from malicious programs such as worms and Trojan horses.

  • Virtual Patch

    Intrusion detection uses the virtual patch technology to resolve the scenario where manufacturers release vulnerabilities without providing patches. You can use virtual patches to recover the server without restarting it, which avoids service interruption.

Related Services

SIS

EdgeFW

DBSS

Unified Security Management

Unified Security Management

HSS provides a unified host security management function to help you manage the security configuration and security events of ECSs more conveniently. Reduce security risks and management costs.

Advantages

  • Cost Compliance

    HSS provides detailed audit reports that record attack information and policy compliance of the organization, and reduce costs to meet the audit requirements.

  • Centralized Management and Reduced OPEX

    HSS centrally manages multiple security clients of tenants and centrally manages and delivers security configurations. Security events can be displayed and managed in multiple dimensions.

Related Services

SSA

Functions

Anti-malsoftware

HSS provides identification and removal of malsoftware such as viruses, Trojan horses, and spyware.

  • Malware prevention

    HSS protects the operating environment of service systems, prevents viruses, spyware, Trojan horses, and other malsoftware from being attacked, detects suspicious or active malicious activities, generates alarms, and starts proactive preventive measures.

  • Malsoftware isolation

    HSS isolates blocked malsoftware to prevent complex attacks in the virtual environment.

  • Program self-protection

    HSS prevents malsoftware from trying to avoid detection by uninstalling or interrupting security programs.

  • Upgrade optimization

    The system functions are optimized to prevent antivirus storms caused by system scanning and signature database upgrade.

Intrusion Prevention

HSS monitors key operating system and application files to detect malicious and unexpected changes in real time.

  • Virtual patch

    Virtual repair is performed based on known unpatched vulnerabilities. Security protection is implemented in advance. No patch verification or update is required.

  • Communication security

    HSS checks all incoming and outgoing communications, to safeguard the system against any content that violates protocols or policies.

  • Vulnerability defense

    HSS defends hosts against SQL injection, cross-site scripting attacks, and attacks using other web application vulnerabilities.

Integrity Monitoring

HSS monitors key operating system and application files to detect malicious and unexpected changes in real time.

  • Security authentication whitelist

    The whitelist function reduces the number of known benign events and simplifies management.

  • Trusted event marking

    HSS marks trusted events to reduce management overhead.