Service Overview

desc
desc

ThreatBook

Cyber Security Services

OneCare

Security Assessment

  • Attack Surface Assessment
  • Penetration Testing

Advanced Intelligence Analysis

  • Quick Assessment Analysis
  • Detailed In-depth Analysis

Threat Detection And Response

  • Threat Detection And Analysis
  • Managed Detection And Response
  • Incident Response

Scenario-based Service

  • Security Assurances For Major Events
  • On-site Security Operations
  • Actual Offensive and Defensive
  • Threat Hunting
  • Incident Response
  • Log Analysis
  • Intelligence Analysis
  • APT Confrontation
  • Trojan Forensics
  • Traceability
  • Vulnerability Research
  • Sample Analysis

Service Overview

Security Assessment

  • Attack Surface Assessment
  • Penetration Testing

Advanced Intelligence Analysis

  • Quick Assessment Analysis
  • Detailed In-depth Analysis

Threat Detection And Response

  • Threat Detection And Analysis
  • Managed Detection And Response
  • Incident Response

Scenario-based Service

  • Security Assurances For Major Events
  • On-site Security Operations

8 Security Services in 4 Categories

8 Security Services in 4 Categories

Threat Detection And Response

Threat Detection and Analysis Service

  • Performs an in-depth analysis on the incidents detected by ThreatBook security devices remotely or on-site and offers response suggestions.
  • Professional analysis / Full perspective / Reduce operating pressure

Managed Detection & Response(MDR)

  • Continuously monitors and analyzes the threats detected by ThreatBook security devices through remote managed security operations and offers response suggestions.
  • 24/7 service / Response in minutes / High-level professional / Save time and effort

Incident Response

  • Offers prompt and professional emergency forensics, pinpoint, response, and tracing services to help enterprises deal with emergent and serious security incidents.
  • Advanced threat response / Attack path analysis / Attack source tracing

Advanced Intelligence Analysis

Quick Assessment Analysis

  • Deliver analysis results within 2-4 hours, enabling enterprises to rapidly understand and respond to security threats.

    Detailed In-depth Analysis

    • Deliver a comprehensive threat analysis report including extracted hacker profiles within 2-3 days.
    • Cloud-based security analysts / Multi-dimensional and rich intelligence / Continuous enrichment of threat actor profiles / Insight into attack intent

    Security Assessment

    Attack Surface Assessment Service

    • Performs an all-around detection and collating on an enterprise's assets and risks from the external perspective and identifies the overall attack surface.
    • External asset assessment / Vulnerability scanning / Data leakage monitoring

    Penetration Testing Service

    • Performs in-depth vulnerability detection on the target system by imitating hacker attacks, fully discovers system vulnerabilities, and offers response suggestions.
    • Comprehensive vulnerability detection / Advanced attack techniques / Multi-dimensional scenarios

    Scenario-based Service

    Security Assurances For Major Events

    • Provides customers with full-process security guarantee service during an important event or meeting.
    • Entire process / TI empowered / Professional services and tools

    On-site Security Operations

    • Assigns experienced security engineers to offer routine security operation service on-site for long.
    • Daily device operation / Attentive service / Remote support by 2nd-line expert team

    Service Advantages

    Tools

    • Portable Traffic Detection Device
    • Intelligence Community - X
    • Cloud Sandbox - S
    • "Weitu" Cyberspace Mapping System
    • Vulnerability Scanning System
    • Emergency Response Toolkit

    Teams

    • ThreatBook Intelligence Office
    • Emergency Response Team
    • Vulnerability Response Team
    • Advanced Threat Tracking Team
    • A security service and analysis team that is composed of over a hundred specialists

    Cases

    • The only comprehensive security service provider of one of the top 3 global giants in China.
    • One of the service providers in response to a large central enterprise's "OceanLotus" APT Defense Event.
    • Independently detected and responded to dozens of Winnti's supply chain attacks.
    • Detected and blocked Bitter's data theft attacks for one of China's ministries.

    Qualifications & Honors

    • Cyber Security Emergency Response Services Support Unit of CNCERT (Provincial level)
    • Information security service qualification certified by CCRC (emergency response/risk assessment/security O&M)
    • Outstanding Security Support Unit of 2022 Beijing Winter Olympics
    • Specially-hired Security Unit of 2017-2019 Summer Davos Forum
    • Specially-hired Cyber Security Unit of 2018-2021 China International Import Expo

    Tools

    • Portable Traffic Detection Device
    • Intelligence Community - X
    • Cloud Sandbox - S
    • "Weitu" Cyberspace Mapping System
    • Vulnerability Scanning System
    • Emergency Response Toolkit

    Teams

    • ThreatBook Intelligence Office
    • Emergency Response Team
    • Vulnerability Response Team
    • Advanced Threat Tracking Team
    • A security service and analysis team that is composed of over a hundred specialists

    Cases

    • The only comprehensive security service provider of one of the top 3 global giants in China.
    • One of the service providers in response to a large central enterprise's "OceanLotus" APT Defense Event.
    • Independently detected and responded to dozens of Winnti's supply chain attacks.
    • Detected and blocked Bitter's data theft attacks for one of China's ministries.

    Qualifications & Honors

    • Cyber Security Emergency Response Services Support Unit of CNCERT (Provincial level)
    • Information security service qualification certified by CCRC (emergency response/risk assessment/security O&M)
    • Outstanding Security Support Unit of 2022 Beijing Winter Olympics
    • Specially-hired Security Unit of 2017-2019 Summer Davos Forum
    • Specially-hired Cyber Security Unit of 2018-2021 China International Import Expo

    Start your free trial now

    Experience precise, efficient and intelligent threat detection and response

    Free Trial