Product Advantages

  • Multidimensional Analysis

    You can scan for web application, host, and middleware vulnerabilities, or weak passwords.
    You can scan for web application, host, and middleware vulnerabilities, or weak passwords.
  • Automatic Monitoring

    Detection rules are updated immediately as new vulnerabilities are discovered, and your scans are adjusted in real time, so your assets are kept safe.
    Detection rules are updated immediately as new vulnerabilities are discovered, and your scans are adjusted in real time, so your assets are kept safe.
  • Intelligent Scanning

    Scan scheduling is adjusted dynamically to ensure that scans to not interfere with ongoing services. Correlative analyses of scan results are produced automatically.
    Scan scheduling is adjusted dynamically to ensure that scans to not interfere with ongoing services. Correlative analyses of scan results are produced automatically.
  • Compliance Checks

    Configurations are thoroughly examined for weaknesses and checked against Huawei and Center for Internet Security (CIS) benchmarks to make sure your system is in compliance.
    Configurations are thoroughly examined for weaknesses and checked against Huawei and Center for Internet Security (CIS) benchmarks to make sure your system is in compliance.

Application Scenarios

  • Website Vulnerability Scan

  • Host Vulnerability Scan

  • Weak Password Scan

  • Middleware Scan

Website Vulnerability Scan

Website Vulnerability Scan

Website vulnerabilities can cripple your business. They can results in tremendous financial losses if not discovered and addressed quickly.

VSS

Scans for Common Vulnerabilities

All types of websites are scanned based on an extensive vulnerability library, and comprehensive, professional reports are produced.

Scans for Most Recent Critical Vulnerabilities

Security experts are constantly analyzing the latest critical vulnerabilities and updating scan rules to provide the fastest and most-complete CVE vulnerability scan possible.

Related Services

Host Vulnerability Scan

Host Vulnerability Scan (Coming Soon)

Critical services may be at risk if they are running on insecure or improperly configured hosts.

VSS Provides:

Deep Scans
Multi-dimensional OS vulnerability scans are performed and configurations verified.
Intranet Scanning
Custom scans can be designed to adapt to the special requirements of enterprise networks.

Related Services

Weak Password Scan

Weak Password Scan

Attackers often scan networks for hosts or middleware with weak passwords and remote login supported. 

VSS

Adapts to a Wide Range of Scenarios

Scans for standard web services, all OSs, and 90% of all middleware, including databases, are supported.

Comes with a Weak Password Library Built In
The built-in library of weak passwords can be used to simulate password hacking attempts, or you can import your own library to do the same.

Related Services

Middleware Scan

Middleware Scan (Coming Soon)

Middleware helps developers integrate complex application software flexibly and efficiently,  but it also can introduce vulnerabilities that a hacker can exploit. Middleware vulnerabilities can compromise the security of the layers above and below the middleware.

VSS Provides:

Diverse Applications

Frontend development frameworks, and background microservices can both be scanned for vulnerabilities, and configurations scanned for compliance with security standards.

Multiple Scanning Methods
You can perform a standard scan, but you can also create custom scans based on the specific middleware and its version on the server.

Related Services

Functions

  • Vulnerability Scan

    You can scan for weak passwords and for vulnerabilities in assets, like web applications, hosts, and middleware.
    You can scan for weak passwords and for vulnerabilities in assets, like web applications, hosts, and middleware.
  • Intelligent Scanning

    Scan scheduling is adjusted dynamically as needed, and the latest network vulnerabilities are monitored 24/7 and responded to in real time.
    Scan scheduling is adjusted dynamically as needed, and the latest network vulnerabilities are monitored 24/7 and responded to in real time.
  • Comprehensive Reports

    Comprehensive reports are generated, with detected vulnerabilities sorted into categories and suggestions provided to help you improve site defense.
    Comprehensive reports are generated, with detected vulnerabilities sorted into categories and suggestions provided to help you improve site defense.
  • Custom Scans

    You can customize scan rules, such as scan strength, to meet various service requirements.
    You can customize scan rules, such as scan strength, to meet various service requirements.

Provides Scalable, On-demand Computing Resources

Learn More