Security incident monitoring
The 360 Cloud Exploration System finds local security problems of customers through the cloud, combines more than 360 years of security data foundation and the analysis results of the threat intelligence center, uses proprietary advanced crawler technology, captures and tracks vulnerability information from multiple vulnerability intelligence sources, and timely pushes it to subscribers, which can comprehensively cover the security problems of websites, including the monitoring of phishing websites The problem of incomplete discovery of unknown assets solves the problem of insufficient discovery of traditional scanner websites.
Security vulnerability monitoring
The 360 Cloud Exploration System has opened up with many vulnerability discovery platforms on the cloud. Once these platforms find 0day vulnerabilities, they will display them on the 360 Cloud Exploration System as soon as possible, informing the website operation and maintenance personnel to strengthen security, and solving the problem that traditional scanners cannot find 0day vulnerabilities.
Unknown asset monitoring
360 has a global large-scale active website database, which detects 80 billion times every day, as well as the world's leading domain name information database, including 8 billion domain name information, and analyzes 240 billion DNS records every day, These big data information of websites covering the whole network enable 360 Cloud Explorer to discover many hidden assets and security risks, and achieve the monitoring capability at the page minute level.
Availability monitoring
360 Cloud Reconnaissance System solves the security problem of finding customers' local websites through the cloud, and relies on 360 powerful cloud resources to cover the country's access areas to monitor the viability of enterprises' local websites, including website viability, page viability, website access response time and other dimensions, to solve the problem of insufficient coverage of traditional scanner monitoring.