Security Situation Awareness Video

Security Situation Awareness (SSA) helps you understand and analyze your security situation. It provides information about security situations, attacker situations, and global situations to help you quickly mine valuable information from massive amount of data, understand security events in the past, and forecast security events in the future.

Comprehensive

SSA can detect 20+ cloud security risks, such as SSH brute-force attacks, RDP brute-force attacks, miner programs, ransomware, viruses, and Trojan horses.

Visible

Attackers, assets, and security event associations and trends are visualized.

Reliable

Thanks to Huawei's years of defense experience, SSA's threat detection and risk handling capabilities ensure precise responses to all kinds of sophisticated threats.

Smart

In-depth application of artificial intelligence (AI) empowers SSA to accurately detect unknown risks, helping you prevent all types of advanced persistent threats (APTs).

Application Scenarios

  • Security Situation Awareness

Security Situation Awareness

Security Situation Awareness

SSA can detect 20+ cloud security risks, such as SSH brute-force attacks, RDP brute-force attacks, miner programs, ransomware, viruses, and Trojan horses.

Advantages

  • Wide Coverage

    SSA covers a wide variety of attacks.

  • Visualization

    Attackers, assets, and security event associations and trends are visualized.

Related Services

HSS

EdgeFW

DBSS

Functions

Security Situation Awareness

SSA provides information about security situations, attacker situations, and global situations. It enables you to quickly find effective data among mass
data and correctly analyze each historical security event. It also helps you predict security situations.

  • Security situation overview

    Collects statistics on the number of attack times, number of detected vulnerabilities, number of virus infection times for a user each day, and attack trend in a week based on different dimensions.

  • User security situation

    Provides user asset data in three dimensions (that is, threat, vulnerability, and host virus) to help you identify whether your assets are vulnerable to attacks, asset damage levels, and damage processes.

  • Attacker situation

    Uses Big Data technologies to analyze the relationships between attack events, identify the behavior characteristics of attackers, and analyze the attack scale, attack means, and active time to help you come up with effective solutions against different types of attackers.

Video Tutorials

How Do I Handle Security Events