Traffic Security Monitoring

Detect various attacks and unusual activities in real time and coordinate with other protection modules to implement defenses
content

The Traffic Security Monitoring module is an Apsara Stack Security service that can detect attacks within milliseconds. By performing in-depth analysis on the traffic packets mirrored by the Apsara Stack network ingress, this module can detect various attacks and unusual activities in real time and coordinate with other protection modules to implement defenses. The Traffic Security Monitoring module provides a wealth of information and basic data support for the entire Apsara Stack Security defense system. Flou BSS/CMP will provide this 'traffic security monitoring' as a product in Flou

Features

Flou offers the best performance compared to general-purpose from any of the leading public cloud vendors

Flow statistical analysis

Flow statistical analysis

Through the way of flow mirroring, the bypass makes statistics on the flow in and out of the interconnection switch (ISW) and generates a flow graph

Malicious host identification

Malicious host identification

Detect the attacks launched by malicious hosts inside the VPC, and find the internal cloud servers that have been controlled

Abnormal flow detection

Abnormal flow detection

Through the flow mirroring mode, the bypass detects the abnormal flow that exceeds the threshold

Web application attack protection

Web application attack protection

According to the default web application attack detection rules, bypass blocking technology is used to intercept common web application attacks at the network layer

Benefits

These recommendations can help you optimize your Compute Engine usage and benefits

Complete output of security capabilities of top Internet enterprises

Complete output of security capabilities of top Internet enterprises

Group has accumulated a lot of intelligence capabilities in the process of fighting against hacker attacks, timely discovering popular Internet attacks and 0-day attack means, and providing users with complete security capabilities

Study and judge in advance and predict the risk outbreak

Study and judge in advance and predict the risk outbreak

Be able to analyze major vulnerabilities and major security incidents and respond in time to avoid the outbreak of security problems

Security big data modeling and analysis

Security big data modeling and analysis

Through big data modeling and analysis, the security threats of the whole network are found and the security situation is fully displayed. The model contains more than 30 algorithm models, combining historical data, network data and host data to achieve real situational awareness

Elastic expansion, decoupling with hardware

Elastic expansion, decoupling with hardware

Hardware decoupling: it adopts cloud architecture design, and all functional modules are based on the general x86 hardware platform, which is independent of hardware

Elastic capacity expansion

Elastic capacity expansion

when the performance is insufficient, there is no need to transform the network structure, and the number of hardware can be directly and smoothly expanded

Systematic construction and joint detection response

Systematic construction and joint detection response

It provides complete network, host, application, data and identity protection capabilities, and all protection components realize linkage response and intelligence sharing through automated operation

Compatible with all IDC environments and decoupled from cloud platforms

Compatible with all IDC environments and decoupled from cloud platforms

Adopt the architecture of ""network exit detection + server operating system linkage""; Use data analysis to find security threats. Through this architecture and method, it avoids the complex network structure inside IDC and is fully compatible with all IDC environments

Success Stories

See how our customers leveraging FLOU Cloud to grow and expand their business

Try Flou for Free

Empower your business with our trending products

Coba Sekarang

Sale Support
consult with our sales team anytime

Hubungi Penjualan

FLOU Cloud Services off beyond
to meet your expectations

Pelajari Lebih Lanjut

Flexible billing option to fit all your Needs

billing

Subscription Billing

This purchase option charges you based on your subscription period or usage package for the products you purchased. Subject to any applicable Terms, you will have unlimited usage of your product during the prepaid period

billing

Pay as You Go

This purchase option charges you based on the products or services you have utilized from Flou

Do you have any question about Traffic Security Monitoring?

Get in Touch

If you have any questions or queries, our Flou experts will help you to find the best solution. Feel free to contact us.

Our Offices


Graha Telkomsigma BSD City

Jl. Boulevard BSD Tim, Lengkong Gudang, Serpong Sub-District, South Tangerang City

Banten 15321


Phone: 62.21. 538 8538

Fax: 62.21. 538 8505

Get Our Newsletter

Already a member?

Sign in Here