
Overview
- Build a centralized security log management platform to generate an overview of the global security situation through multi-source log collection, correlation analysis and visualization technology.
- Based on the concept of in-depth defense, security devices such as firewalls and IDS/IPS are systematically configured to build a hierarchical protection system.
- Formulate standardized incident management procedures, clarify incident classification, handling standards and division of responsibilities, and ensure efficient response standards.
- Set up a professional security operation team to implement 7×24 hour uninterrupted monitoring and duty to ensure immediate response to security incidents.
- Regularly review security logs and events and evaluate trends to dynamically optimize protection strategies.
- Establish a closed loop of “prevention, detection, response, and improvement” security operations, and continuously improve the enterprise's cyber security proactive defense and emergency response capabilities.
Sold by | NTT China Limted |
Categories | |
Fulfillment method | Professional Services |
Pricing Information
This service is priced based on the scope of your request. Please contact seller for pricing details.
Support
Support Service 1. After-sales support information: Email: MS_AWS@global.ntt Hotline: 4001021695