USec

Cloud Security (USec) provides you with secure and safe testing services including but not limited to: DDoS attack detection; brute force detection; remote login protection and alerts. It responds to network attacks and security vulnerabilities allowing you to handle any security dynamics and ensuring stability in all of your operations.

Advantages

Real-time monitoring

Real-time monitoring means round-the-clock monitoring of the current security situation, giving you security information at a glance, along with an intelligent analysis which provides comprehensive assessment results.

Professional Support

A year-round professional technical support team is there to escort your business security, with 24/7 professional support and security service.

Safe and Free

It is safe and free, without the need to purchase any additional equipment. After purchasing a cloud server and an external IP network, you can activate it and use it free of charge. (Currently only supported in the Beijing Data Center)

Features

Security Examination

The security examination is an overall assessment to the whole security network which provides comprehensive assessment scores to help users grasp the overall situation. Whether being attacked through DDoS, Brute-force, or an unusual remote login, all situations are displayed in real-time. Time and energy is not wasted checking each individual host, allowing you to handle security situations with ease.

DDoS Attack Detection

DDoS attack detection monitors and analyzes all of the exported traffic. Based on many years of operating experience and a lot of experience handling DDoS attacks, we can guarantee that all automated attacks will be detected, classified, and cleaned. Types of detectable attacks are: SYN Flood, ACK Flood, UDP Flood, DNS reflection attacks, NTP reflection attacks, SSDP reflection attacks, SNMP reflection attacks, HTTP Flood, Slow HTTP attacks, and HTTPS Flood type of layer 4,7 common attacks.

Brute Force Detection

Brute Force Detection detects brute force hacking behavior, which provides detailed information such as the brute force attacks' origins, source addresses, attack times, etc. You can select a targeted attack source and blacklist them to prevent damage and loss.

Remote login alerts

Remote login alerts are caused by remote logins whether through authorized access or password leakage used by hackers. Each situation can be determined by you based on your circumstance.

API Security

API Security is an open source security interface allowing you to have a flexible schedule according to your needs. Security management will be integrated into your operational management system.

UCloud lead your journey of cloud computing
Register Now
Register for free trial package