Help Center/ Situation Awareness/ User Guide (ME-Abu Dhabi Region)/ FAQs/ Product Consulting/ What Are the Dependencies and Differences Between SA and Other Security Services?
Updated on 2023-06-09 GMT+08:00

What Are the Dependencies and Differences Between SA and Other Security Services?

SA can work with other security services such as WAF, HSS, Anti-DDoS, and DBSS.

  • How SA Works With Other Services

    SA is a security management service that depends on other security services to provide threat detection data so that it can analyze security threat risks, display the global security threat posture, and provide informed suggestions.

    Other security services report detected threats to SA and SA aggregates the received data to display the global security posture.

  • Differences Between SA and Other Security Services

    SA: It is only a visualized threat detection and analysis platform and does not implement any specific protective actions. It must be used together with other security services.

    Other security services display the event data detected by themselves only. They can take specific protective actions, but cannot display global threat posture.

Table 1 summarizes SA and other security services.

Table 1 Differences between SA and other services

Service Name

Service Category

Dependency and Difference

Protected Object

SA

Security management

SA displays the global security situation, analyzes threat data from other security services and cloud security threats, and provides protection suggestions.

Global security situation

Anti-DDoS

Network security

Anti-DDoS detects and defends against DDoS attacks.

It synchronizes attack logs and protection data to SA.

Service stability

HSS

Host security

HSS detects server risks and protects servers with protection policies.

It synchronizes alarms and protection data to SA.

Servers

WAF

Application security

WAF detects and protects website service traffic in multiple dimensions to defend against common attacks and block threats.

It synchronizes intrusion logs and alarm data to SA so that SA can display the network-wide security posture.

Web applications

DBSS

Data security

DBSS protects and audits database access behavior.

It synchronizes audit logs and alarm data to SA.

Cloud databases