Overview
The host intrusion detection system HIDS includes the following functions:
- Asset inventory: structure asset information through host discovery, host inventory and application inventory, and provide the ability to associate with risk identification and intrusion detection and visual query interface
- Risk identification: identify security risks in advance, accurately identify weak passwords, system vulnerabilities, application vulnerabilities and non-compliance security baselines, provide guidance for security reinforcement and reduce threats
- Intrusion detection: multi anchor real-time monitoring of abnormal login, suspicious account, abnormal process, virus trojan, tampering of sensitive files and other intrusion behaviors, and sending alarm information at the first time
- Real time defense: occupy a small amount of resources, provide violent cracking protection and malicious code protection functions, and provide appropriate security defense capabilities for the system
- Security response: provide manual security service access for emergency response, so that security operators can quickly obtain snapshot information of core assets and assist in the disposal of intrusion events
- Attack traceability: intelligently analyze massive security logs, provide log retrieval and visual clues, and help users locate the source of attack and the cause of intrusion"
Highlights
- Intelligent identification, accurate detection, massive data-driven, dual engine killing
- Continuous monitoring, second-level warning in real time, lightweight, high stability operation
- One click installation, simple operation and maintenance, integrated service and closed loop
Details
Features and programs
Financing for AWS Marketplace purchases
Pricing
Free trial
Dimension | Description | Cost/month |
---|---|---|
License | the number of host licenses | $15.50 |
Vendor refund policy
Returns are not supported. If monthly payment users need to unsubscribe, it can take effect next month
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Vendor resources
Support
Vendor support
1.Xin Li:South China and West China,lix2@wangsu.com ,19151630930; 2.Kaili Wang:North China and Beijing,wangkl@wangsu.com ,18811552358; 3.Yunyan Xu:East China,xuyy2@wangsu.com ,13761813907 4.Wechat contact information of the enterprise:17601675934;Search 17601675934 through "Enterprise wechat Contacts" to add friends for contact; 5. 7 * 24-hour specialized guard: *200 + technical experts and special personnel; *QQ, wechat, hotline and e-mail are open in multiple channels and respond in seconds; *Dual guarantee of main / standby person in charge; 6. "Golden Triangle" business escort: *Sales & pre-sales + technical service + product & R & D, multi team three-dimensional support; *Leading insight into industry scenario demand; *Professional operation analysis to help business development
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.