Attack Path Analysis Service | / | This service identifies existing or potential attack paths to determine optimal deployment locations for subsequent endpoint solutions, based on network topology, assets, threats and vulnerabilities, firewall policy and current defense posture. |
Scenario Validation Services | Single Security Product Validation | Focuses on validating the protective capabilities of individual security products across multiple dimensions, covering both internet-facing and internal network environments. |
Attack Chain Simulation Validation | Constructs complete attack paths involving multiple jump hosts to validate capabilities in monitoring/analysis of specific scenarios/events, attack path tracing, and critical node blocking. |
Internet Protection Coverage Validation | Batch-check clients’ internet-facing web assets to confirm whether they fall within the protection coverage of WAF. |
Internet Protection Effectiveness Validation | Verifies if clients’ internet-facing WAFs can defend high-risk vulnerabilities or newly discovered vulnerabilities within their protection scope. |
Email Security Gateway Validation | Specialized validation of email security gateways’ ability to defend malicious emails, including phishing links, phishing attachments, and spoofed legitimate emails. |
Custom Scenario Development Service | / | Tailors validation scenarios based on an organization’s actual needs, business operations, and assets. Converts Red Team exercises outcomes into actionable validation scenarios. |
Assisted Hardening Service | / | Addresses vulnerabilities identified during validation by collaborating with third-party teams to assist in closing the loop on hardening measures. |