Free Download

Please fill in the following information for free trial.

  • Company

    *
  • Name

    *
  • Post

    *
  • E-mail

    *
  • Phone

    *
  • Code

    Get code

Download

Please click the Download button to download the resources.

Down

Products & Solutions

Big data analysis

Solution Overview

With the increasing complexity of network and information security and the diversification of attack methods in recent years, higher requirements have been posed for the capabilities of protecting network and information security。 Many customers have created a whole set of security protection systems through Web application firewall, intrusion prevention system, Anti-DDoS system, next-generation firewall and other security protection systems。 However, if all kinds of security protection systems are deployed independently without a unified log management and analysis system at the company level, they cannot timely detect various abnormal behavior events, thus bringing great security risks to the overall security and availability of information systems。

 

Therefore, it is necessary to collect, index and utilize machine data generated by all applications, servers or network devices, including operating systems, virtualization, applications, databases and networking data, by deploying the big-data analysis platform。 Through search, alarm, report and knowledge base, we can correlatively analyze complex events across several systems, quickly locate security events, investigate security risks and timely detect security threats, and improve the overall intelligence of IT business。

 

 

ECCOM Big Data Analysis

 

 

ECCOM's next-generation closed-loop monitoring and management model for security operation and maintenance is based on ECCOM's mature data acquisition experience, introducing powerful data mining and association analysis capabilities of the big data analysis platform to build an agile and efficient closed-loop model of monitoring and management.

 

By ECCOM's mature methods of data collection, the configuration data, asset data, performance data, traffic data, log data and message data are collected as a whole. Then, the correlation analysis and data mining across data sources are carried out through the big data analysis platform. Finally, the unified operation and maintenance portal and the automated operation and maintenance module of ECCOM are combined. While the analysis results are presented in a multi-dimensional way, and the automatic responsecan be implemented in time after the intelligent warning and trend prediction are issued by machine learning, thus greatly improving the overall efficiency of operation and maintenance.

 

 

Solution Strength

● Real-time monitoring and configuration management

Based on CMDB and IT configuration management, events and performance of IT infrastructure are collected。 Based on the definition of monitoring strategy and presentation view, active alarm mechanism is realized to ensure timely failure recovery and stable business operation。

 

● Automated management of operation and maintenance 

Daily tasks are automated, labor costs and potential risks of misoperation are reduced, and a series of operational automation scenarios close to clients' actual circumstances is established to improve efficiency。

 

● Management of network and business performance 

By deploying monitoring methods at each key node, we can not only locate faults quickly and detect potential risks in time to realize active operation and maintenance, but also initiate access from the client, through multi-node network devices and network links, to end-to-end access relationships and main performance indicators in the server area, all of which is presented in a visualized and unified way。

 

● Big data management of safe operation and maintenance 

From the visualization of big data for security operation and maintenance, a vast amount of machine data in different formats from different data sources are collected, stored, searched, analyzed and visualized, and presenting as a whole on a unified platform. At the same time, rules are defined, contexts are enriched, association analysis is carried out, events are investigated and responses are coordinated on the basis of this big data analysis platform, ultimately preparing for mitigating and responding to security events and risks.

 

 

Relevant Content

ECCOM can provide enterprises with an integrated cloud security solution that protects cloud infrastructure and applications in every respect.

Cloud Security Solution

 

 

TAC

Tel    : 400-820-5-820,800-820-5-820
mail  : TAC@amonika.com
web  : www.ECCOM.NET.CN


Services

Services

ECCOM Smart Service
360° Comprehensive Lifecycle Services

More >


Contact Us

Shanghai

TEL:021-61372888

Nanjing Office

TEL: 025-84677650

Hangzhou Office

TEL: 0571-26890266

Beijing-Yintai Centre

TEL: 010-85216999

Beijing-Shoudong Centre

TEL:010-87224666

Jinan Office

TEL:0531-67880519

Xi'an Office

TEL:029-89384503

Shenzhen-Futian Office

TEL: 0755-33966800

Guangzhou Office

TEL: 020-28059288

Xiamen Office

TEL: 0592-5376000-92020

Fuzhou Office

TEL:

Chengdu Office

TEL: 028-65533878

Chongqing Office

TEL:023-88280080

Kunming Office

TEL:0871-3602050

Wuhan Office

TEL:027-87267899

Xianggang Office

TEL:+852 39735958


Contact Us

Shanghai

TEL:021-61372888

Nanjing Office

TEL:025-84677650

Hangzhou Office

TEL:0571-26890266

Beijing Branch

TEL:010-85216999

Ji'nan Office

TEL:0531-83186508

Xi'an Office

TEL:029-88178595

Shenzhen Branch

TEL:0755-33966800

Guangzhou Branch

TEL:020-28059288

Xiamen Office

TEL:0592-5376000-90213

Fuzhou Office

TEL:0591-38160599

Chengdu Office

TEL: 028-65533878

Chongqing Branch

TEL:023-88280080

Kunming Office

TEL:0871-63602050

Wuhan Office

TEL:027-87267899

Nanchang Office

TEL:0791-88228229

Hong Kong Branch

TEL:+852 39994888

江苏福彩 甘肃快三 甘肃快3 甘肃快三 甘肃快三 江苏福彩 甘肃快三 江苏福彩 江苏福彩 江苏福彩