Esta página ainda não está disponível no idioma selecionado. Estamos trabalhando para adicionar mais opções de idiomas. Agradecemos sua compreensão.
Situation Awareness
Situation Awareness
- Service Overview
- User Guide
-
FAQs
-
Product Consulting
- What Does SA Do?
- Why Is There No Attack Data or Only A Small Amount of Attack Data?
- What Is the Data Source of Situation Awareness?
- How Do I Get Information About the Most Vulnerable Assets?
- What Are the Dependencies and Differences Between SA and Other Security Services?
- What Are the Differences Between SA and HSS?
- Why Cannot the Total ECS Quota Be Less Than the Number of Existing ECSs?
- Can SA Be Used Across Accounts?
- How Do I Update My Security Score?
- How Do I Handle a Brute-force Attack?
- How Do I Assign Operation Permissions to an Account?
- How Do I Handle the 403 forbidden Error Reported by SA?
- Why Is the Event Data in SA Inconsistent with That in WAF and HSS?
- What Are Differences Between SA and SecMaster?
- Purchase Consulting
- Regions and AZs
-
Product Consulting
- General Reference
On this page
Help Center/
Situation Awareness/
FAQs/
Product Consulting/
What Are the Differences Between SA and HSS?
Copied.
What Are the Differences Between SA and HSS?
Service Positioning
- Situation Awareness (SA) is a GUI-based security management platform for threat detection and analysis. SA focuses on the security threat attack posture of all your cloud assets. By aggregating detection results or events from many security products and analyzing threat data and cloud security threats, it helps you build a security system covering all your cloud assets.
- Host Security Service (HSS) is designed to protect server workloads in hybrid clouds and multi-cloud data centers. It protects servers and containers and prevents web pages from malicious modifications.
In short, SA presents the comprehensive view of security posture, and HSS secures servers and containers.
Function Differences
- SA aggregates network-wide security data (including alarm data from other security services such as HSS, WAF, and Anti-DDoS) and uses analysis technologies such as big data, AI, and machine learning to display asset security posture by asset, threat alarm, and baseline inspection.
- HSS uses technologies such as AI, machine learning, and deep algorithms to analyze server risks through agents installed on protected servers. It delivers inspection and protection tasks through the console. Through the HSS console, you can manage the security information reported by the agent.
Function |
Common Function |
Difference |
|
---|---|---|---|
Asset security |
Servers |
Both can display the overall security posture of servers. |
|
Websites |
None |
|
|
Baseline inspection |
Cloud service baseline |
None |
|
Unsafe server settings |
None |
|
Parent topic: Product Consulting
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
The system is busy. Please try again later.
For any further questions, feel free to contact us through the chatbot.
Chatbot