Host Security

Tencent Host Security (HS) offers various security protection services such as intrusion detection and vulnerability monitoring.

Overview

Leveraging massive threat data accumulated by Tencent Security and machine learning, Tencent Host Security (HS) offers a complete set of security protection services such as intrusion detection and advance vulnerability warning. These mainly include security functions like password protection, abnormal login notification, trojan file scanning and removal and high-risk vulnerability detection. With the aid of HS, you can build a sound server security protection system to eliminate major network security risks facing your current servers and prevent data leakage.

Benefits

AI-based Detection Engine

The AI-based WebShell detection engine effectively combats encrypted variants of malicious scripts.

Ten-billion Sample Resources

The HS backend integrates the next-gen TAV anti-virus engine and Tencent Hubble Analysis system, allowing it to respond rapidly to unknown risks; Tencent PC Manager enables HS to detect a vast number of malicious sample resources.

Rapid Response to Vulnerabilities

Based on Tencent's vulnerability response process, new vulnerability evaluation and repair plan development can be completed within 24 hours; Based on the component identification function, Internet-wide asset risk statistics can be collected in a short time.

Internet-wide Threat Intelligence

Leveraging Tencent Cloud's Internet-wide threat intelligence data sources, hacking attacks can be detected in real time.

Low Resource Consumption

With Tencent's proprietary lightweight Agents, most computing and protection operations are performed in the cloud, thus reducing server resource consumption.

Features

Trojan File Detection
Machine learning-enabled detection can scan for a wide range of malicious files, including various types of WebShell backdoors and binary trojans, and perform access control and isolation operations on the detected malicious files to prevent their re-use.

Scenarios

Hacking Detection

Applicable Scenario:
A company with Internet-based business is faced with daily intrusions by professional hackers and automated malicious attacks; however, its failure to implement effective advance warning and response has led to corporate data loss or service interruption.

Host Security Solution:
The intrusion detection of HS can quickly detect intrusions and scanning actions of hackers on the company’s servers and provide advance warning of such attacks.

Contingency Response to Security Vulnerabilities

Applicable Scenario:
A company worries about intrusion but lacks a professional security team to evaluate new vulnerabilities when they emerge.

Host Security Solution:
The vulnerability detection of HS helps the company monitor the impact of new vulnerabilities as soon as they emerge, and provides effective repair plans and security support for vulnerability elimination.

Business Asset Component Checking

Applicable Scenario:
A company’s business grows rapidly, with its service software offered in different types and versions, but it cannot quickly comprehend the impact of new vulnerabilities.

Host Security Solution:
With the aid of the component management of HS, the server components can be quickly identified and grouped, helping create company asset component panoramas to improve the efficiency of contingency response.