このサイトはCookieを使用しています。 サイトを閲覧し続けることで、Cookieの使用に同意したものとみなされます。プライバシーポリシーを読む>Search

検索
  • SecoManager

    SecoManagerセキュリティコントローラー

    Business-driven Policy Management, Intelligent Network-Security Collaboration

概要

  • 概要
  • 機能
  • 製品仕様
  • テクニカルサポート
  • パートナー向け
SecoManager

SecoManagerセキュリティコントローラー

SecoManager is a security controller developed by Huawei for various scenarios such as data centers and campuses. It can centrally manage security policies on the entire network, orchestrate security services, and quickly deploy security services.
SecoManager automatically generates and deploys security policies based on user service partitions and application service orchestration, deploying security services within minutes and effectively reducing security O&M costs. In addition, SecoManager can collaborate with SDN controllers and CIS to handle threats in minutes, greatly improving the threat defense capability of enterprise networks.

Automated Orchestration

Automated policy orchestration based on customer business partitions and applications, deploying security services within minutes

Intelligent O&M

Dynamic policy optimization based on application visualization and mutual access analysis, reducing O&M costs by 80%

Network-security Collaboration

Collaborative network and security association, and closed-loop threat handling within minutes

Management Platform

Log Management

Collection and storage of millions of logs, facilitating Network Address Translation (NAT) source tracing.

製品仕様

Specifications SecoManagerセキュリティコントローラー
Basic NE management
  • Device management
    Device discovery, device management, virtual system management, configuration consistency check, and device SSO

  • Resource pool management
    Resource pool adding, deletion, modification, and query

  • Object management
    Address, service, application, and network partition management

  • Policy management
    Security policy, VPC policy, security service, and task deployment
Policy collaboration
  • Big Data security collaboration
    Receiving threat handling requests from the Big Data security analysis system and sending them to threat blocking devices

  • Controller collaboration
    Network topology awareness and service chain-based traffic diversion policy delivery
Policy orchestration Automatic delivery of security policies based on network partitions, application mutual access relationships, security services, and VPCs
Policy tuning Policy tuning based on redundancy analysis results
Policy simulation Analysis of policy change impacts on application services based on simulation results before policy changes

Resources

テクニカルサポート

TOP