Products

Cyber Security 長亭科技 ChangTing

Chaitin Tech is a world leading and technology driven cyber security solution provider, who focuses on providing intelligent and simple next gen security solutions to enterprises, covering many fields such as Internet finance, e-commerce, and banking. It established in 2014 and set up Beijing headquartered. The founder and the company's famous attack red team "Blue Lotus" (藍蓮花戰隊) are from Tsinghua University, which have won the first place in national competitions and top three in international competitions many times.
 
PRODUCT HIGHLIGHTS
 
 
SafeLine (雷池)
Next-Generation Web Application Firewall
 
The world's first next-generation web application firewall based on intelligent semantic analysis engine and it was nominated by Gartner in Magic Quadrant of Web Application Firewall. The independently developed semantic engine can restore the attack vector after layers of camouflage and deformation, identify and judge the harm degree from the coding level, and have natural resistance to unknown threats.
 
 

 

 
 
  • NO.1 Protection Capability – 100% protect exciting environment, 70% protect future attack
Chaitin Technology adheres to technology-oriented, and debuts an irregular computing engine based on semantic analysis in the world, subverting the security protection principle of the traditional Web application layer. This innovation brings faster, more accurate and more intelligent products and services to enterprise users.
 
  • All-In-One Solution
It is a real closed-loop Web security full link manufacturer. It provides All-In-One Web security solution, including: WAF, BOT, API, with API level management and control capabilities, with a complete protection scheme from application to data.
 
  • Diversification of deployment modes
There is no more than 3 international vendors have Kubernetes deployment and Chaitin is one of vendors provide that. It offers the largest and most mature deployment solutions in China, and provides a variety of deployment modes offline and cloud, including: transparent bridge, transparent agent, embedded, server drainage, K8S, etc.
 
 
X-Ray (洞鑒)
Vulnerability Scanner
 
X-Ray is a security assessment system that integrates web vulnerability scanning, host service vulnerability scanning, and baseline compliance check from the perspective of assets, which can realize dual closed-loop management of assets and vulnerabilities. It can integrate asset identification and vulnerability verification and detect and remediate the vulnerabilities before attacker exploit them.
 
  • Multi-perspective Scanning
Equipped with multiple scanning engines, X-Ray provides a range of multi-dimensional heuristic and common vulnerability scanning methods, depth mining system vulnerabilities.
 
  • Zero false alarm
X-Ray is not limited to scan and find out the vulnerabilities. All the vulnerabilities are verified by semantic analysis and innovative detection technology to avoid massive false positives affecting business module, and saving security resources at the same time.
 
  • High emergency response efficiency
X-Ray has developed a complete emergency response process to ensure that every 0day/1day vulnerability breakout, it can quickly give timely response and updated product detection solutions. The speed of vulnerability response in several real scenarios has been maintained within 24 hours, which greatly shortens the time of emergency response and decision-making, and effectively responds to regulatory needs.
 
Cloud Atlas (雲圖)
Attract Surface Management Platform
 
From the perspective of attackers, Could Atlas establishes a continuous security inspection plan, which can help enterprises automatically assess the security baseline and understand the most critical risk issues in a timely manner. In the daily inspection, Could Atlas also provides flexible configuration, custom development of rules and linkage of early warning processes, improving the efficiency of the enterprise risk management process.
 
  • Attacker Perspective Assessment
Based on Chaitin's professional security service team, Could Atlas can cover a broad risk searching area. Through attack path correlation analysis, Could Atlas help customers sort out a complete attack plan from the attacker's perspective, quickly find the attack path and efficiently react for the case.
 
  • Billions of intelligence accumulation and accurate scanning
The asset data center backed by Could Atlas has more than 10 years of white hat penetration testing experience, which accumulated hundreds of millions of DNS subdomain exhaustion dictionaries, domain transfer vulnerability plug-ins, and third-party data API interfaces. Through rich accumulated experience and data center integration, Cloud Atlas is good at asset discovery and management in massive and complex scenarios.
 
  • Adaptive and elastic expansion capabilities
The subscription plan provides customers with flexible deployment and purchase models. In addition, Could Atlas relies on the cloud's global multi-node computing resources and has adaptive and elastic expansion capabilities, which can easily cope with various high-traffic scenarios of customers, reducing costs and improving efficiency.
 
Learn more details @ https://www.chaitin.cn/zh/