Security protection designed for cloud services and serving right from the cloud.

Chief Telecom’s cloud computing platform service not only takes care of the security of physical and network infrastructure levels and hypervisor, but also strengthens cloud VM’s information security and verification mechanisms, so as to protect customers’ OS, applications and data on the cloud. EBPMS_Deep Security Service provides speedy deployment process and eliminates information security breaches, protecting system workload as well as maintaining flexibility.

Chief Cloud Security as a Service offers all the required protection functions, which spares enterprises of the heavy management work and makes them able to focus on their core business.

The service supports public clouds, hybrid clouds and multi clouds, and safeguards all platforms. Through the installation of Agents, enterprises can monitor and protect their server farm no matter it is located inside the HQ, datacenters, or even the VM on Chief Telecom IaaS platform. The structure is as below:

Cloud VM Information Security Protection

Protection against Malware (A)

  • Information security related work optimized; avoid antivirus chaos during whole-system scanning and virus definition upgrades.
  • ISeparation of malware and malware protection to prevent protection being tampered by malware attacks in the virtualized environment.

Unified Monitoring (L)

  • Monitor and track physical authorization and unauthorized changes; real-time detection and alert on malicious and non-expected changes.
  • Use tags for trustworthy events to replicate reactions for similar events and reduce management workload.

Web Reputation Service (N)

  • In cooperation with TrendMicro Smart Protection Network™ to provide Web Reputation Service (WRS) and avoid risks from communication with hacked servers.

Intrusion Prevention System (N)

  • Prevent known breaches from being unlimitedly attacked and counter known and zero-day attacks.
  • Inspect all inbound and outbound traffic for protocol errors, security breaches, or suspicious contents similar to attacks.
  • Auto-updated security policies which will protect newly found breaches within just hours.
  • Protect web applications and the data they are dealing with in compliance with PCI DSS 6.6.
  • Protect against SQL injection, cross-site scripting and attacks on other web application vulnerabilities.
  • Protect against attacks on vulnerabilities before the application patch is completed.
  • Support mainstream OS and more than 100 applications including servers of database, webpages, e-mails, and FTP by default.
  • Detailed inspection and monitoring on all internet-accessing applications.

Two-way Status Sensing Firewall (N)

  • Narrow down the side being attacked of each VM; set up a firewall border to intercept attacks; limit communication on specific ports and protocols.
  • Keep firewall policies under centralized management and include templates of general server types.
  • Prevent DDoS attacks by inspective scanning.

Log Checkup (L)

  • Collect and analyze the logs of OS and applications of all instances, and look for possible suspicious activities, information security incidents, and system management incidents, etc.
  • In compliance with PCI DSS 10.6 so it is easier to find out important security incidents hidden in multiple records.
  • Incidents and events will be transmitted to SIEM system or central log server for correlation analysis, reports and archives.
Service Features

Maximize the benefits of saving from operating costs

  • Implement directly on Chief Telecom cloud platform and save the costs of installation and hardware.
  • Single package of security solutions to reduce manpower on deployment and management of several independent solutions.
  • Auto-identification of newly added instances and reduce management burden.
  • Protect vulnerabilities and temporarily delay security patches of codes to reduce costs on non-routine patches.
  • Automatize repetitive and manpower-consuming security work to reduce management costs and false alarms, and realize incident response workflow.

Prevent from data leakage and business interruption

  • Activate real-time inspection and remove malware with minimum computing resource.
  • Intercept malwares that try to remove or sabotage information security software to avoid inspection.
  • Make sure the systems in communication with cloud servers are known ones to avoid being attacked.
  • Protect known and unknown vulnerabilities.
  • Inspect suspicious or malicious incidents and trigger alerts and proactively take prevention actions.
  • Use Web Reputation Service to monitor communication of servers at domain level.

In compliance with regulations and cost effectiveness

  • Deploy a package of integrated and cost-effective solutions to comply with regulations such as PCI 2.0, HIPAA, NIST, and SAS 70.
  • Provide detailed reports available for audit, prevented attacks records, and compliance status for checkup.
  • Reduce time and manpower required for audit.
  • Support internal compliance project and improve internal network activities visibility.
  • Deploy techniques which pass Common Criteria EAL 4+ certification.