Built on Huawei’s mature commercial big data platform — FusionInsight — HiSec Insight (formerly CIS) performs multi-dimensional correlation analysis of massive data based on an Artificial Intelligence (AI) detection algorithm. It proactively detects a wide range of security threat events in real-time, tracing the attack behavior of the entire Advanced Persistent Threat (APT) attack chain. The system also collects and stores multiple types of network information, helping users detect threats, conduct forensics, and ultimately eliminate threats.

Huawei HiSec Insight is designed for threat detection, threat blocking, forensics, source tracing, and threat response and handling, enabling full-process, closed-loop threat handling.

Huawei HiSec Insight Security Situation Awareness System

Built on Huawei’s mature commercial big data platform — FusionInsight — HiSec Insight (formerly CIS) performs multi-dimensional correlation analysis of massive data based on an Artificial Intelligence (AI) detection algorithm. It proactively detects a wide range of security threat events in real-time, tracing the attack behavior of the entire Advanced Persistent Threat (APT) attack chain. The system also collects and stores multiple types of network information, helping users detect threats, conduct forensics, and ultimately eliminate threats.

Huawei HiSec Insight is designed for threat detection, threat blocking, forensics, source tracing, and threat response and handling, enabling full-process, closed-loop threat handling.

  • Situation Awareness Self-evolving AI-powered threat detection engine accurately detects more than 95% of threats.   
  • Simplified O&MThreat knowledge graph-based inference analysis and visualized policy orchestration slash Operating Expenditure (OPEX) by 30%.   
  • 72 guangfan yingyongApplication AdaptationOpen digital security base enables rapid application development.

Specifications*

Product ModelHiSec Insight
Functions and Features
Big Data PlatformSupports the Hadoop commercial platform and encrypts HBase and Hive data based on customer requirements.
Traffic CollectionParses common protocols such as TLS, ICMP, HTTP, mail protocol, DNS, FTP, NFS, and SMB, restores files, and captures packets based on rules.
Log CollectionCollects syslogs from third-party systems and security devices, and NetFlow logs from network devices and security devices.
C&C Anomaly DetectionDetects DGA domain names and malicious C&C flows.
Encrypted Communication Analytics (ECA)Supports encrypted traffic detection without decryption, such as C&C communication detection and penetration scanning.
Event Correlation AnalysisProvides predefined rules for logs and allows users to define correlation rules and sub-rules.
Traffic Baseline Anomaly DetectionAllows users to configure traffic control rules and supports vertical and horizontal scanning.
Traffic Anomaly DetectionDetects unauthorized access, threshold-exceeding traffic rates, and threshold-exceeding access frequency.
Mail Anomaly DetectionAnalyzes mail sending servers, senders, and recipients, allows users to define the mail whitelist and blacklist, and detects mail attachments.
Covert Channel DetectionPerforms Ping Tunnel, DNS Tunnel, and file anti-evasion detection.
Web Application Attack DetectionDetects attacks on web applications.
Asset Risk ManagementAllows users to add assets, divide asset groups, and query the asset risk list.
Security Policy Control ServiceObtains environment information from the environment awareness service, comprehensively determines risks together with other risk information, and dynamically delivers instructions to the trusted proxy control service based on the decision result.
Security CollaborationCollaborates with security devices, network devices, and EDRs to handle threats.
SOAROrchestrates the manual threat handling actions through the predefined or user-defined playbook to implement automatic investigation and evidence collection as well as attack containment, effectively improving event handling and O&M efficiency.
Reputation ManagementSupports local IP reputation query, DNS reputation generation, and file reputation query.
Attack Path VisualizationDisplays attack transmission paths, including attacks from the Internet to the intranet, transmission within the intranet, and C&C connections from the intranet to the Internet.
Network-Wide Threat SituationDisplays the comprehensive situation, intranet threat situation, website security situation, asset security situation, vulnerability situation, and threat event situation.

For inquiries, email us at info@agdinfotech.com

Source: https://e.huawei.com/en/products/enterprise-networking/security/bigdata-apt/cis

#

No responses yet

Leave a Reply

Your email address will not be published. Required fields are marked *