CHIEFInsight
Threat intelligence includes our own intelligence and international exchange intelligence. Its own intelligence is mainly localized in Taiwan. Customers can freely choose the type of attack they need and apply it in the internal environment of the enterprise.
- Global and regional threat intelligence
- Smart classification of intelligence
- Effective prevention attacks
CHIEFViewer
Conducting correlation analysis by collecting netflow and syslog with various devices for identify malicious behaviors and detect suspicious attacks exactly. Effectively management of information security incidents and suspicious events to ensure the safety of enterprise network operations.Help IT personnel to track the entire route taken by cyberattacks and raise their visibility of lateral movements in the intranet.
- Effective detect Attacks
- Detecting Lateral Movement
- Highly Integrated Information Security Equipment
CHIEFSeeker
CHIEFSeeker Managed Detection and Response (MDR) assists companies in continuous monitoring of network and endpoint data at a generally affordable cost and analyzes, determines and tracks such data to identify all types of malicious signs. Even the smallest of warnings can help detect and eliminate risks early, providing nonstop protection for a company's precious digital assets.
- Through the service of information security forensics experts, regular provide reports to customer to help early detection and elimination of risks.
- Automatically identify malicious footprints on the network to prevent vulnerability in the organization.
- Automated alerts and instant notification of critical threat events.
- Trace the root cause and process of events, and visually identify clues of lateral movement.
CHIEFDNS
CHIEFDNS is assisting enterprises to block fraud, phishing websites, malicious links and other security issues from DNS at the first time and sparing IT administrator's time and efforts on information security management and training.
- Block malicious websites
- Detection abnormal domain connection of endpoints
- Analysis report for traffic of DNS