Qizhi Asset Security Management System (ASM)
Discovers security risks for all assets in the data center
Core Features
  • Automatic Asset Monitoring

    Multi-dimensional Asset Discovery; Shadow Asset Identification

    Comprehensive Asset Management; Asset Change Monitoring

  • In-depth Data Collection

    Professional O&M Collection Technology; Cross-platform Network and Host Compatibility

    Data Retrieval From Deep Risk Points; Accurate and All-round Real-time Data

  • Multi-view Ledgers

    Business System View; Association view

    Asset Type View; O&M view

  • Lifecycle Management

    Sorting of Key Assets; Precise Risk Identification

    Categorized and Classified Risk Visualization; Risk Disposal and Tracking

  • Efficient Risk Detection

    Dynamic Risk Detection; Vulnerability Management by Scanners Integration, Secure Configuration Baselines Management, and High-Risk Patches Management

    Continuous Risk Identification; Precise Positioning of Impact Scope

  • Flexible Deployment Modes

    Agent-free; Private Cloud Environment Supported

    Host Deployment; Network and Security Equipment Supported

Use Cases
  • Shadow Asset Identification

    Issue Analysis:Shadow assets are difficult to be discovered in the data center, posing a huge security risk.

    Solution: Use technologies such as network management protocols, network protocols, and host detection technology to discover unmanaged IP addresses and identify shadow assets.

    Customer Benefits:Identify shadow assets to mitigate security risks of the data center from the source.

  • Asset Ledger Sorting

    Issue Analysis:The data center contains a large number of assets that cover diverse brands and rapidly change, making it difficult to view the assets clearly.

    Solution: Use agent-less technology to collect accurate information about network, host, and software assets and synchronize IT business attributes, building an asset ledger from a business perspective.

    Customer Benefits:Obtain an accurate ledger of all IT business assets without deploying an agent.

  • Vulnerability Management by Scanners Integration

    Issue Analysis: The data center allows multiple manufacturers to scan vulnerabilities to improve coverage. However, fragmented management leads to low efficiency.

    Solution:Connect multiple vulnerability scanning APIs to centrally associate the scanning results with asset information. Display the results from the business perspective by classification and category.

    Customer Benefits:Uniformly scan, display, process, and re-test vulnerabilities to improve efficiency.

  • Compliance Baseline Verification

    Issue Analysis: A lot of compliance baselines need to be met. The data center covers various and numerous assets. The conventional local verification method is time-consuming and inefficient.

    Solution: Continuously collect data from probe points on network devices, hosts, and software. Use the asset mid-end to centrally verify configuration baselines.

    Customer Benefits:Get rid of agents. Perform automatic and rapid checks, greatly shortening the verification interruption period.