- Cloud Computing
- Information Security
- Intelligent Operation & Maintenance
With the increasing complexity of network and information security and the diversification of attack methods in recent years, higher requirements have been posed for the capabilities of protecting network and information security。 Many customers have created a whole set of security protection systems through Web application firewall, intrusion prevention system, Anti-DDoS system, next-generation firewall and other security protection systems。 However, if all kinds of security protection systems are deployed independently without a unified log management and analysis system at the company level, they cannot timely detect various abnormal behavior events, thus bringing great security risks to the overall security and availability of information systems。
Therefore, it is necessary to collect, index and utilize machine data generated by all applications, servers or network devices, including operating systems, virtualization, applications, databases and networking data, by deploying the big-data analysis platform。 Through search, alarm, report and knowledge base, we can correlatively analyze complex events across several systems, quickly locate security events, investigate security risks and timely detect security threats, and improve the overall intelligence of IT business。
ECCOM Big Data Analysis
ECCOM's next-generation closed-loop monitoring and management model for security operation and maintenance is based on ECCOM's mature data acquisition experience, introducing powerful data mining and association analysis capabilities of the big data analysis platform to build an agile and efficient closed-loop model of monitoring and management.
By ECCOM's mature methods of data collection, the configuration data, asset data, performance data, traffic data, log data and message data are collected as a whole. Then, the correlation analysis and data mining across data sources are carried out through the big data analysis platform. Finally, the unified operation and maintenance portal and the automated operation and maintenance module of ECCOM are combined. While the analysis results are presented in a multi-dimensional way, and the automatic responsecan be implemented in time after the intelligent warning and trend prediction are issued by machine learning, thus greatly improving the overall efficiency of operation and maintenance.
● Real-time monitoring and configuration management
Based on CMDB and IT configuration management, events and performance of IT infrastructure are collected。 Based on the definition of monitoring strategy and presentation view, active alarm mechanism is realized to ensure timely failure recovery and stable business operation。
● Automated management of operation and maintenance
Daily tasks are automated, labor costs and potential risks of misoperation are reduced, and a series of operational automation scenarios close to clients' actual circumstances is established to improve efficiency。
● Management of network and business performance
By deploying monitoring methods at each key node, we can not only locate faults quickly and detect potential risks in time to realize active operation and maintenance, but also initiate access from the client, through multi-node network devices and network links, to end-to-end access relationships and main performance indicators in the server area, all of which is presented in a visualized and unified way。
● Big data management of safe operation and maintenance
From the visualization of big data for security operation and maintenance, a vast amount of machine data in different formats from different data sources are collected, stored, searched, analyzed and visualized, and presenting as a whole on a unified platform. At the same time, rules are defined, contexts are enriched, association analysis is carried out, events are investigated and responses are coordinated on the basis of this big data analysis platform, ultimately preparing for mitigating and responding to security events and risks.
ECCOM can provide enterprises with an integrated cloud security solution that protects cloud infrastructure and applications in every respect.
Tel : 400-820-5-820,800-820-5-820
mail : TAC@amonika.com
web : www.ECCOM.NET.CN
ECCOM Smart Service
360° Comprehensive Lifecycle Services