Product Feature
Security Threat Detection
With the authorization of user, the traffic audit analyzes the user's EIP bi-directional HTTP traffic log in real time, identify SQL injection rapidly, XSS cross-site script, webshell backdoor upload, unauthorized access and all kinds of common web attack.
Successful Intrusion Detection
With the authorization of user, the traffic audit analyzes the user's EIP bi-directional HTTP traffic log in real time, identify SQL injection rapidly, XSS cross-site script, webshell backdoor upload, unauthorized access and all kinds of common web attack.
Original Log Storage
The traffic audit can push the user's HTTP traffic log to the user's own object storage bucket to meet the requirements of cyber security classified protection compliance, and the security analyzer can compile data analysis model based on their own business.
Tracking the Hacker Intrusion
Fully trace the whole process of hacker intrusion, provide multi-dimensional related statement display based on attack intrusion and attacked assets to reduce the reading costs of the security operation and maintenance personnel.