هذه الصفحة غير متوفرة حاليًا بلغتك المحلية. نحن نعمل جاهدين على إضافة المزيد من اللغات. شاكرين تفهمك ودعمك المستمر لنا.
- Service Overview
- User Guide
-
FAQs
-
Product Consulting
- What Does SA Do?
- Why Is There No Attack Data or Only A Small Amount of Attack Data?
- What Is the Data Source of Situation Awareness?
- How Do I Get Information About the Most Vulnerable Assets?
- What Are the Dependencies and Differences Between SA and Other Security Services?
- What Are the Differences Between SA and HSS?
- Why Cannot the Total ECS Quota Be Less Than the Number of Existing ECSs?
- Can SA Be Used Across Accounts?
- How Do I Update My Security Score?
- How Do I Handle a Brute-force Attack?
- How Do I Assign Operation Permissions to an Account?
- How Do I Handle the 403 forbidden Error Reported by SA?
- Why Is the Event Data in SA Inconsistent with That in WAF and HSS?
- What Are Differences Between SA and SecMaster?
- Purchase Consulting
- Regions and AZs
-
Product Consulting
- General Reference
Show all
Copied.
What Are the Dependencies and Differences Between SA and Other Security Services?
SA can work with other security services such as WAF, HSS, Anti-DDoS, and DBSS.
- How SA Works With Other Services
SA is a security management service that depends on other security services to provide threat detection data so that it can analyze security threat risks, display the global security threat posture, and provide informed suggestions.
Other security services report detected threats to SA and SA aggregates the received data to display the global security posture.
- Differences Between SA and Other Security Services
SA: It is only a visualized threat detection and analysis platform and does not implement any specific protective actions. It must be used together with other security services.
Other security services display the event data detected by themselves only. They can take specific protective actions, but cannot display global threat posture.
Table 1 summarizes SA and other security services.
Service Name |
Service Category |
Dependency and Difference |
Protected Object |
Function Details |
---|---|---|---|---|
SA |
Security management |
SA displays the global security situation, analyzes threat data from other security services and cloud security threats, and provides protection suggestions. |
Global security situation |
|
Anti-DDoS |
Network security |
Anti-DDoS detects and defends against DDoS attacks. It synchronizes attack logs and protection data to SA. |
Service stability |
|
Host Security Service (HSS) |
Host security |
HSS detects server risks and protects servers with protection policies. It synchronizes alarms and protection data to SA. |
Servers |
|
WAF |
Application security |
WAF detects and protects website service traffic in multiple dimensions to defend against common attacks and block threats. It synchronizes intrusion logs and alarm data to SA so that SA can display the network-wide security posture. |
Web applications |
|
DBSS |
Data security |
DBSS protects and audits database access behavior. It synchronizes audit logs and alarm data to SA. |
Cloud databases |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot