HiSec Endpoint
HiSec Endpoint Stands Out with Unique One-Click Recovery from Ransomware, Ensuring Robust Security with Lightweight EDR Agent.
HiSec Endpoint
Efficient detection of unknown threats
Innovative endpoint-side threat source tracing graph engine + dynamic behavior analysis, achieving > 90% unknown threat detection accuracy.
Endpoint ransomware prevention, zero data loss
Event-triggered backup: kernel-level real-time awareness of file exceptions and file backup, enabling one-click handling and rollback of ransomware events.
Lightweight deployment, zero lag on endpoints
Lightweight agent, < 4% CPU usage, < 200 MB memory usage, < 20 MB reported data per agent per day, with no impact on user experience.
Specifications
Specifications | HiSec Endpoint |
Endpoint Identification and Management | Automatic endpoint identification: provides automatic endpoint asset inventory capabilities. Endpoints can be automatically identified after having EDR Agent installed. Asset information management: automatically and centrally manages endpoint asset information such as the host list, processes, ports, and components. Endpoint security management: intelligently analyzes endpoint security and displays endpoint asset security analysis scores and risk overview. |
Threat Detection and Handling | Intrusion detection: offers endpoint behavior detection capabilities based on the behavior detection engine to detect malicious behaviors such as brute-force attacks, abnormal login, and privilege escalation. Event aggregation: aggregates discrete ransomware-related alarm events into ransomware events based on the process call chain and supports one-click handling. |
Virus Disposal | Virus scan: uses Huawei's third-generation antivirus engine to update the antivirus signature database daily, update critical viruses in real time, and offer high-quality infected file detection capabilities. Threat analysis: supports threat analysis on detected infected files and displays detailed threat information, such as virus identifiers, risk values, and confidence levels. |
Proactive Defense | Bait capture: places bait files based on ransomware signatures to detect and report abnormal behaviors in real time. File anti-tampering: performs access permission control and real-time detection on key files to detect tampering in a timely manner. Real-time protection: scans all directories in real time, identifies malware files in a timely manner, and blocks their transmission. |
Traceability Analysis | Forensic analysis: collects and stores endpoint information, and performs forensic analysis on threat events through data mining and correlation analysis. Attack visualization: The EDR digital modeling and source tracing inference algorithm are used to visualize attacks and accurately restore attack chains. |
Ransomware Encrypted File One-click Recovery | Event-triggered backup: Kernel-level real-time awareness of file exceptions and file backup enable one-click handling and rollback of ransomware events. |