This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>

Recherche

  • Overview
  • Features
  • Application Scenario
  • Specifications
  • Case Studies
  • News and Events
  • Expert Insight
  • Resources
HiSec Endpoint

HiSec Endpoint

HiSec Endpoint is a comprehensive endpoint security protection product. Using the client software deployed on enterprise endpoints, HiSec Endpoint can detect abnormal endpoint behavior in real time, detect and identify potential security threats from multiple dimensions, automatically handle threat events, intelligently trace intrusion paths, and roll back ransomware encrypted files. All of this helps enterprises safeguard core endpoint assets. As verified by an authoritative third-party organization, HiSec Endpoint can detect 100% of known ransomware and so is ideal for defending against ransomware threats.

Why Huawei Xinghe AI Network Security?

Full Score in AV-TEST's Advanced Threat Prevention Test
Full Score in AV-TEST's Advanced Threat Prevention Test

HiSec Endpoint Intelligent Endpoint Security System

Top Product certification by Tolly
Top Product certification by Tolly

HiSec Endpoint Intelligent Endpoint Security System

Tolly certification test
Tolly certification test

HiSec Endpoint security system is recognized as a Top Product

Huawei HiSec Endpoint EDR AntiMalware Test Certificate
Huawei HiSec Endpoint EDR AntiMalware Test Certificate

HiSec Endpoint Security System

Three Reasons for Choosing Huawei Xinghe AI Network Security

High Unknown Threat Detection Rate — Keeping Threats Out

High Unknown Threat Detection Rate — Keeping Threats Out

• Endpoint security: The third-generation Content-based Detection Engine (CDE), combined with Huawei's proprietary Graph Streaming Process (GSP) engine, performs dynamic behavior analysis. This enables a 95% detection rate for unknown threats.
• Access security: Unified zero-trust access and control across internal and external networks ensures compliant and manageable intranet access. It also enables secure zero-trust remote work connectivity.

One-Click Ransomware Recovery — No Data Loss

One-Click Ransomware Recovery — No Data Loss

• Event-triggered backup: Kernel-level real-time detection of ransomware behavior enables immediate file backup. Encrypted files can be rolled back with a single click, ensuring data security.
• Dual backup: Huawei's exclusive dual backup and recovery mechanism, combining local backup and cloud storage backup, achieves recovery speeds five times faster than competition.

Global Active Tracing in Seconds — Pinpointing the Source

Global Active Tracing in Seconds — Pinpointing the Source

• Accurate source tracing: Huawei's endpoint-cloud collaborative tracing graph engine supports deep tracing across up to 100 network hops, with full visibility into 100% of processes. This enables accurate identification of the "patient zero" host.
• Endpoint-network-security collaboration: By integrating Endpoint Detection and Response (EDR) with firewalls and other devices, Huawei enables coordinated network defense, minimizing threat propagation risks.

Application Scenario

Endpoint Detection and Response

Real-time detection of endpoint anomalies, multi-dimensional detection of potential threats, and prompt threat mitigation actions such as isolating malicious files, terminating suspicious processes, and eliminating viruses, ensuring robust endpoint security for enterprises.

Endpoint Detection and Response

Secure Campus Access

20 periodic security compliance baseline check items, dynamic real-time threat assessment and risk analysis, and strict control over endpoint access, ensuring secure access to enterprise campuses.

Secure Campus Access

ZTNA for Remote Working

Zero-trust least-privilege access control for all services, multi-factor authentication, and fine-grained access policy configuration ensure secure remote working.

ZTNA for Remote Working

Specifications

Specifications HiSec Endpoint
Endpoint Identification and Management Automatic endpoint identification: provides automatic endpoint asset inventory capabilities. Endpoints can be automatically identified after having EDR Agent installed.
Asset information management: automatically and centrally manages endpoint asset information such as the host list, processes, ports, and components.
Endpoint security management: intelligently analyzes endpoint security and displays endpoint asset security analysis scores and risk overview.
Threat Detection and Handling Intrusion detection: offers endpoint behavior detection capabilities based on the behavior detection engine to detect malicious behaviors such as brute-force attacks, abnormal login, and privilege escalation.
Event aggregation: aggregates discrete ransomware-related alarm events into ransomware events based on the process call chain and supports one-click handling.
Virus Disposal Virus scan: uses Huawei's third-generation antivirus engine to update the antivirus signature database daily, update critical viruses in real time, and offer high-quality infected file detection capabilities.
Threat analysis: supports threat analysis on detected infected files and displays detailed threat information, such as virus identifiers, risk values, and confidence levels.
Proactive Defense Bait capture: places bait files based on ransomware signatures to detect and report abnormal behaviors in real time.
File anti-tampering: performs access permission control and real-time detection on key files to detect tampering in a timely manner.
Real-time protection: scans all directories in real time, identifies malware files in a timely manner, and blocks their transmission.
Traceability Analysis Forensic analysis: collects and stores endpoint information, and performs forensic analysis on threat events through data mining and correlation analysis.
Attack visualization: The EDR digital modeling and source tracing inference algorithm are used to visualize attacks and accurately restore attack chains.
Ransomware Encrypted File One-click Recovery Event-triggered backup: Kernel-level real-time awareness of file exceptions and file backup enable one-click handling and rollback of ransomware events.

Stories of Success

News and Events

TOP