Assets information structure

资产数据信息架构

Module Functions Introduction

  • Workload Discovery

    By setting detection rules, the system automatically checks the installed agent workload and if the network space is not included in the security management, it will excludes the common network equipment to ensure the normal operation of the detecting/detected workloads.

  • Application Inventory

    Automatically take inventory of the middleware, data bases, big data components, Web applications, Web frameworks, Web sites and other assets; according to the characteristic of each workload, more than 800 categories of application are identified, such as: Nginx, Apache, JBoss, Mysql, Memcache, Redis, HBase, etc. User-defined inventory objects will also be supported in the future.

  • Assets Panel

    After obtaining the assets information, forming the “Overview” and “hierarchical view” according to the business situation to show the general assets situation of the enterprise, analyze the single asset in multi-dimension, analyze the internal situation in detail, and guide customers to find some problems from the security view.

  • Fast asset retrieval

    For each type of business assets, the system provides two general dimensions called ‘workload perspective’ and ‘asset perspective’, displaying aggregated data. Customers can flexibly define their own table display. Key assets(workloads, accounts, processes, etc.) are associated in system-wide. In the future, a global search tool will also be available.

Product characteristics

  • 1

    Fine-grained construction of system internal assets.

    Inventory covers more than 10 kinds of key mainframe assets, identify over 800 categories of common business applications, and support the asset tools associated with CMDB system to effectively supplement the content of system.

  • 2

    Providing asset-correlated capabilities for risk and intrusion platform

    It has been fully associated with risk and intrusion system to view in only one click. It can also use asset API system to import relevant data.

  • 3

    Fast add workload assets, easy deployment.

    Agent deployment can be accomplished by running only one command line. With workload discovery and batch installation, enterprise security service can be rapidly deployed.

  • 4

    Unified Cross-platform management

    The centralized management mode is adopted to most mainstream Linux/Windows systems, as well as hybrid business architecture such as on-premises workloads , virtual machine (VM), and cloud environment.