background

Product Overview

The 360 Cloud Exploration Security Monitoring System is a website application security monitoring service product for the party, government and military, finance, education, Internet and other users. Relying on 360's security brain, and the massive data accumulated by 360 in search, terminal security, website security and other aspects, it can effectively monitor website anomalies, continuously mine website risks, and fully alert various website security events, Provide users with security cloud monitoring services such as website vulnerability scanning, webpage tampering monitoring, webpage horse hanging monitoring, black word/dark chain monitoring, availability monitoring, phishing/phishing website monitoring, and unknown asset monitoring.

Manual report Remote application

DDoS monitoring, phishing, unknown assets

Missing scan and result verification manual report

pic
Ultra high cost performance ratio

Basic monitoring

Issue of event announcement

Security incident monitoring

The 360 Cloud Exploration System finds local security problems of customers through the cloud, combines more than 360 years of security data foundation and the analysis results of the threat intelligence center, uses proprietary advanced crawler technology, captures and tracks vulnerability information from multiple vulnerability intelligence sources, and timely pushes it to subscribers, which can comprehensively cover the security problems of websites, including the monitoring of phishing websites The problem of incomplete discovery of unknown assets solves the problem of insufficient discovery of traditional scanner websites.

Security vulnerability monitoring

The 360 Cloud Exploration System has opened up with many vulnerability discovery platforms on the cloud. Once these platforms find 0day vulnerabilities, they will display them on the 360 Cloud Exploration System as soon as possible, informing the website operation and maintenance personnel to strengthen security, and solving the problem that traditional scanners cannot find 0day vulnerabilities.

Unknown asset monitoring

360 has a global large-scale active website database, which detects 80 billion times every day, as well as the world's leading domain name information database, including 8 billion domain name information, and analyzes 240 billion DNS records every day, These big data information of websites covering the whole network enable 360 Cloud Explorer to discover many hidden assets and security risks, and achieve the monitoring capability at the page minute level.

Availability monitoring

360 Cloud Reconnaissance System solves the security problem of finding customers' local websites through the cloud, and relies on 360 powerful cloud resources to cover the country's access areas to monitor the viability of enterprises' local websites, including website viability, page viability, website access response time and other dimensions, to solve the problem of insufficient coverage of traditional scanner monitoring.

Product advantages

Product advantages

High reliability of cloud services

After six years of continuous service, it has served 3.5 million users, monitored 2 billion pages, found 230 million vulnerabilities, monitored 5 billion availability every day, provided highly sustainable, highly available, and highly accurate SaaS security services, participated in major network security for many times, and comprehensively monitored website asset security.

Comprehensive diversification

Build a multi-dimensional website security monitoring, use cloud computing and security big data technology to monitor the website security status in real time, meet the website security monitoring needs in an all-round way, and help complete the exploration of various security events.

Monitoring visualization

Use big data monitoring to realize visualization of website security situational awareness monitoring, security event overview, event details, and asset management

Closed loop safety operation

Set up a closed-loop website security monitoring scheme: discovery capability closed-loop, security event output closed-loop, notification and early warning closed-loop, website security construction scheme closed-loop, to achieve compliance inspection.

Quick, clear, stable and accurate

Short monitoring interval and low monitoring delay; Master the asset status of the whole network; High reliability of platform services and back-end engines; High page coverage, high vulnerability coverage, and many types of monitoring; The accuracy rate of monitoring content is high.

    user demand

  • 1. Timely grasp their own business security situation, timely discover security vulnerabilities and illegal assets, and meet the needs of security monitoring
  • 2. Timely detect website tampering, phishing and other problems
  • 3. Conduct website health check
  • 4. Timely conduct safety early warning

    Product value

  • 1. Carry out asset safety monitoring, comprehensively identify website risks, find problems on websites, realize compliance inspection, and solve the pressure of regulatory notices from regulators
  • 2. 24/7 care by security experts to achieve minute level response to security incidents and zero false alarm of security incidents
  • 3. Discover unknown assets on the website and realize one click management
  • 4. Ensure the website is healthy and available
  • 5. User zero deployment, simple and convenient operation, cost saving

    user demand

  • 1. Security incident linkage response
  • 2. Check the network asset information within the jurisdiction
  • 3. Effective network attack threat monitoring means
  • 4. Inform the disposal of business informatization

    Product value

  • 1. Unify and centralize security supervision, and realize the city's network security monitoring, perception, notification, disposal, traceability and other capabilities
  • 2. 7 * 24 hour care by security experts to achieve minute level response to security incidents and zero false alarm of security incidents
  • 3. Find out the situation of assets, comprehensively explore unknown assets, and realize one click management
  • 4. Form a comprehensive safety monitoring closed-loop throughout the "life cycle of safety events"
  • 5. Carry out all-weather safety supervision on various businesses under its jurisdiction and services, accurately identify safety problems and notify relevant responsible units
  • 6. The ability to provide "pre-warning, in-process protection and post service" for the business of government enterprises.

Product deployment

danao

Safe brain

data sharing

youjiantou
yuntan

Three six zero cloud exploration

7 * 24 hours time confirmation and notification of early warning
zuoxiaojiantou
jiance

Event monitoring

jiance

Notification management

jiance

asset management

jiance

Monitoring report

youxiaojiantou
wangzhan
wangzhan
wangzhan

User site group