Product Overview

Vulnerability scanning service

Vulnerability scanningis the first step of enterprise website information security. Using this service, through the online vulnerability scanning system, we can actively detect the possible security problems of the target WEB website, find the vulnerability under the condition of comprehensively covering CVE and OWASP vulnerability types, and sort it into an effective vulnerability report document, giving the vulnerability location, vulnerability description, vulnerability description, and vulnerability repair handling opinions.

Security crowd testing service

Crowd testing service is a comprehensive security testing service based on the integrity of the target conducted by security inspectors. It is different from vulnerability scanning in that it can find logical vulnerabilities that cannot be found through vulnerability scanning, and these logical vulnerabilities often cause more serious harm and loss to the website, The security crowd test is more about the team with security technology capability or the security white hat with ultra-high technology to provide targeted public test reports on authorization and feedback to the crowd test customers. The same will also give the vulnerability location, vulnerability description, vulnerability description, vulnerability repair handling opinions, etc.

Vulnerability repair service

Vulnerability repairis to provide protective repair services for medium and low risk vulnerabilities given in the report on the premise that there is a vulnerability report. It needs to rely on security research and development personnel with rich security problem handling managers, not only have a clear understanding of the location, principle, process, consequences and other aspects of vulnerabilities, but also need to have methods and measures to know how to prevent security vulnerabilities, After processing, we can ensure that the fixed vulnerabilities will no longer cause serious worries to the website.

Our advantages

Professional and high-quality staffing

Professional security experts and business support personnel follow up the whole process,
To provide you with the best service.

Long standby working time

7×24 security monitoring, rapid and timely response to security events,
Avoid customer security risks.

Flexible working mode

Without any preparation, security experts can operate remotely,
Provide on-site service for users with high data confidentiality.

Timely threat intelligence

Security network intelligence covers the world, and any loophole
We will find out in time now.

Intuitive and effective analysis report

Output data from safety monitoring data to customers
Analyze the report and provide customized security services to customers
And targeted solutions.

Confidentiality of customer data

We promise never to disclose customer information to third parties,
The safety information in the monitoring process is only for analysis.

Quotation List of Safety Service Items

Projectunitcost (yuan)project descriptionpermission remarks
Malicious code removal/site/time300clean up the malicious code inserted maliciously on the whole sitethe authority of the whole site
Detection of illegal words on the website/site/time150detect the content of the website according to the general illegal words and prohibited words published by the Advertising Lawthe website is accessible
Find and remove Trojan horse malicious files in the station/site/time500clean up the Trojan horse program put in after the whole station is hackedthe authority of the whole station
Website directory file security settings/site/time300according to application requirements folder read and write separation settingsserver permissions
Complete IIS dynamic and static script reading and execution permission separation settings/ station / time200according to the application type script reading and execution settingsserver permissions
Open source code upload vulnerability repair/site/time500repair the vulnerability caused by the online upload function of the websitethe whole site authority
Commonly used site building system security patch processing/ site / time500according to the official security announcement to patch in timethe entire site authority
Website anti-injection WAF code deployment/site/time500add waf filtering function code according to program typewhole site authority
Website security vulnerability scan/site/time300give a security scan report according to the authorized domain nameauthorized
Website security public testing service/site/time30000according to the authorized white hat to conduct public testing services and report to meauthorized
Website security report vulnerability list processing/vulnerability/times200modify vulnerability issues according to security vulnerability report fileswhole site/server authority
Website hacked traceability analysis/station/timeon-demand quotationwebsite hacked analysis to find out attack methods and entrancesserver permissions
Server system security processing/set/time3000system-level security protection setting processingincluding installation of protection softwareserver permissions
Accurate website maintenance/ site / year3000according to the website maintenance requirements and rules to implement the maintenance plan and reportthe whole site authority
Accurate server maintenance/set/year10000perform maintenance plans and reports according to server maintenance requirements and rulesserver permissions
Application security framework and plan and executionone/timequote according to demandcommunicate and confirm relevant needs and detailsmake plan and assist in executionand connect with special personnel
Server system environment configuration/set/time1000configure the system operating environment according to customer needsserver permissions
Server software environment configuration/set/time1000configure service software environment according to customer needsserver permissions
Server website site configuration/site/time200configure server internal website service according to customer needsserver permissions
Server website proxy node configuration/ station / time300configure reverse proxy node service according to customer needsserver authority
Server HTTPS certificate configuration/station/time500configure HTTPS access service according to customer needs and certificate providedserver authority
Server file log system standard processing/set/time1000on-demand processingserver authority
Server file data backup management configuration/set/time1000on-demand processingserver authority
Troubleshooting and resolution of server service problemsper station/time1500 casesdeal with the actual situationserver authority

Service process

Call Now Button24小时服务热线