What Are the Differences Between SecMaster and HSS?
Service Positioning
- SecMaster is a next-generation cloud native security operations platform. Based on years of Huawei Cloud experience in cloud security, it enables integrated and automatic security operations through cloud asset management, security posture management, security information and incident management, security orchestration and automatic response, cloud security overview, simplified cloud security configuration, configurable defense policies, and intelligent and fast threat detection and response.
- Host Security Service (HSS) is designed to protect server workloads in hybrid clouds and multi-cloud data centers. It protects servers and containers and prevents web pages from malicious modifications.
In short, SecMaster presents the comprehensive view of security posture, and HSS secures servers and containers.
Function Differences
- SecMaster collects security data (including detection data of security services such as HSS, WAF, and Anti-DDoS) on the entire network and provides capabilities such as cloud asset management, security posture management, security information and incident management, security orchestration, and automatic response, helping you implement integrated and automatic security operations management.
- HSS uses technologies such as AI, machine learning, and deep algorithms to analyze server risks through agents installed on protected servers. It delivers inspection and protection tasks through the console. You can manage the security information reported by the Agent through the HSS console.
Item |
Common Function |
Difference |
|
---|---|---|---|
Asset security |
Server |
Both can display the overall security posture of servers. |
|
Websites |
- |
|
|
Vulnerability |
Emergency vulnerability notices |
- |
|
Server vulnerabilities |
Both can display server scanning results and support server vulnerability management. |
|
|
Baseline inspection |
Cloud service baseline |
- |
|
Unsafe settings |
- |
|
Product Consulting FAQs
- Why Is There No Attack Data or Only A Small Amount of Attack Data?
- Where Does SecMaster Obtain Its Data From?
- What Are the Dependencies and Differences Between SecMaster and Other Security Services?
- What Are the Differences Between SecMaster and HSS?
- Why Cannot the Total ECS Quota Be Less Than the Number of Existing ECSs?
- Can I Use SecMaster Across Accounts?
- How Do I Update My Security Score?
- How Do I Handle a Brute-force Attack?
- Data Synchronization and Consistency
- Troubleshooting the Agent Installation Failure
- How Do I Grant Permissions to an IAM User?
- What Are the Relationships and Differences Between SecMaster and SA?
- How Long Are Logs Stored in SecMaster?
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.
more