Include tests to vulnerabilities of operating system, database, application system, etc. Provide tests to the Security Configuration such as operating system configuration, application system configuration, network system configuration.
Security of ports, processes, important files, account status and other key information can be detected.
Provide users with rich and careful present status index and analysis about security vulnerability and provide an analysis report. Security reinforcement suggestions will be provided to users according to results of the report, ensuring the user’s reinforcement scheme is feasible and giving no influence to stable operation of original business.