Scroll Top
Server Guard
A software security host system that provides functions such as detecting vulnerable host, doing baseline check, virus scanning and elimination, and integrated asset management

Server Guard enhances the security of Elastic Compute Service (ECS) instances by offering features like vulnerability management, baseline checks, intrusion detection, and asset management. This module employs operations such as log monitoring, file analysis, and signature scanning to safeguard ECS instances.

Features
Zain Cloud offers the best performance compared to general-purpose from any of the leading public cloud vendors.
Baseline Check

Conducts security baseline checks for ECS instances to ensure compliance with enterprise server security standards.

Vulnerability Management

Scans ECS instances for software vulnerabilities, provides suggestions for fixes, and offers quick solutions for critical vulnerabilities.

Webshell Detection and Removal

Identifies and removes web shells based on specified rules, allowing manual quarantine.

Brute-force Attack Blocking

Detects and blocks brute-force attacks in real-time by monitoring system activity for suspicious behavior.

Unusual Logon Alerting

Identifies unusual logons based on approved logon settings and generates alerts.

Suspicious Server Detection

Detects suspicious activities such as reverse shells, Java processes running CMD commands, and unusual file downloads.

Asset Fingerprints

Collects up-to-date information about servers for event tracking, including ports, accounts, processes, and applications.

Log Retrieval

Centrally manages server logs for processes, networks, and system logins, aiding issue resolution.

Benefits
These Benefits can help you optimize your Compute Engine usage and benefits.
Threat Management for the Entire Network

Automatically collects diverse log data from cloud services, enabling control over identified security threats.

Multi-OS Server Guard Management

Security Center is compatible with multiple operating systems (OSs), Centralized control: You can view information and perform operations in the unified web console.

Anti-virus and Anti-ransomware

Support proactive detection and termination of various threats, including ransomware, mining programs, backdoors, worms, and trojans.

Automated attack traceability

Automatically traces the sources and causes of attacks, providing insights into intrusion threats for quick responses.