Host Security Service (HSS)
Take advantage of our consulting services!
Our experts will be happy to help you.
Hotline: 24 hours a day, seven days a week
Host Security Service (HSS)
With Host Security Service (HSS), you can manage server and container risks and facilitate compliance with cybersecurity standards. Combat attacks such as ransomware, mining, infiltration and container escapes.
HSS is designed to protect server workloads in hybrid clouds and multi-cloud data centers. It provides host security features, container security features, and Web Tamper Protection (WTP).
The service can help you monitor and manage your servers and containers in a unified way, protect the integrity of your system, increase application security, monitor user operations, and detect intrusions.
HSS can detect fingerprints, vulnerabilities and insecure baselines on your servers and containers and will generate alerts in mere seconds. Fix vulnerabilities and basic problems with one click and isolate viruses automatically within seconds.
More than 99% of known ransomware can be detected. The accuracy of web shell and mining detection is over 99%. HSS runs stably with an average CPU utilization of less than 2% and a low impact on services.
You can use HSS on VMs, physical machines and containers in public clouds, private clouds, third-party clouds and data centers around the world.
HSS protects servers and containers throughout their lifecycle, helping you manage resources, remediate vulnerabilities, check baseline settings, scan for and remove viruses, and detect intrusions.
HSS can count the processes, ports, middleware and other assets on your servers and containers and visualize the statistics for you.
Detect weak passwords and insecure configurations and identify general security risks on all cloud servers.
Scan for more than 200,000 vulnerabilities in your operating system and software with HSS and fix them with one click.
HSS provides more than 400 threat detection models to detect intrusions in real time, including brute force attacks, reverse shells, penetrations and container escapes, in real time.
Protect your data with our end-to-end solution that includes vulnerability detection, virus isolation, dynamic honeypots, backup and recovery.
Protect the files on your servers, databases and shared hard disks from tampering and restore files within minutes if they have been maliciously modified.
Perform security assessments on all your servers and quickly remove any risks (accounts, open ports, software vulnerabilities, weak passwords, etc.) that exist throughout the system.
Scan and manage all your resources in one place. Easily monitor software, directories, processes, ports, and accounts on cloud servers.
Detect and fix vulnerabilities based on the extensive and regularly updated Vulnerability Library.
Secure logins with two-factor authentication (2FA), block brute force attacks, and detect remote logins, changes to system files, and the execution of malicious programs, malware and viruses.
Detect weak passwords and insecure configurations and identify general security risks on cloud servers.
HSS uses ransomware detection engines and dynamic honeypots to prevent ransomware from entering your system, encrypting data, or spreading to other devices. Known ransomware can be blocked in real time. Unknown ransomware can be detected and removed in seconds. You can also configure backup policies so that data can be restored from a backup if a ransomware attack ever gets through.
HSS can prevent known ransomware families. It protects servers, containers and applications from intrusion, malicious encryption, and virus propagation and fights ransomware at every stage of its kill chain.
HSS can quickly block and isolate ransomware processes and files to prevent malicious encryption and its spread.
* Voucher can be redeemed until December 31, 2024. Please contact us when using the voucher for booking. The discount is only valid for customers with a billing address in Germany and expires two months after conclusion of the contract. The credit is deducted according to the valid list prices as per the service description. Payment of the credit in cash is excluded.