Національна науково-дослідна та освітня мережа
Освітній хмарний центр оброблення даних
Рішення регіональних інформаційних мереж медзакладів
Multi-Channel HD Telemedicine
Розроблення та моделювання
Планування та аналіз
Digital Urban Rail
Retail Cloud Platform
Enterprise Data Center
Enterprise Cloud Communications
Network Management System
Buy from Huawei
If you want to get more information about your project, you can submit your information and we will contact you as soon as possible.
If your company has signed an eDeal contract with Huawei, please buy your required product/solution via the link below.
Buy from resellers
Search for a nearby reseller and get direct contact information.
Become a Partner
Resources and Support
Huawei Authorized Learning Partner
Huawei Authorized Information and Network Academy
SecoManager — a security controller developed by Huawei for a variety of security scenarios, including data centers and campuses — centrally manages security policies on the entire network, orchestrating and efficiently deploying security services.
While SecoManager automatically generates and deploys security policies based on user service partitions and application service orchestration, it deploys security services within minutes — effectively reducing security Operations & Maintenance (O&M) costs. Additionally, in collaboration with Software-defined Networking Controllers (SDNs) and the Cybersecurity Intelligence System (CIS), SecoManager effectively handles threats in mere minutes, significantly improving the threat defense capability of enterprise networks.
Automated policy orchestration based on customer business partitions and applications, deploying security services within just minutes
Dynamic policy optimization based on application visualization and mutual access analysis, reducing O&M costs by 80%
Collaborative network and security association, with closed-loop threat handling in minutes
|Specifications||SecoManager Security Controller|
|Basic NE management||
Device discovery, device management, virtual system management, configuration consistency check, and device Single Sign-On (SSO)
Resource pool management
Resource pool adding, deletion, modification, and query
Address, service, application, and network partition management
Security policy, Virtual Private Cloud (VPC) policy, security service, and task deployment
Big Data security collaboration
Receiving threat handling requests from the Big Data security analysis system and sending them to threat blocking devices
Network topology awareness and service chain-based traffic diversion policy delivery
|Policy orchestration||Automatic delivery of security policies based on network partitions, application mutual access relationships, security services, and VPCs|
|Policy tuning||Policy tuning based on redundancy analysis results|
|Policy simulation||Analysis of policy change impacts on application services based on simulation results before policy changes|
Share link to：