>
We are always committed to building personalized and neutral SOC, providing better security solutions for our customers
User interviews and analysis of current situation, clarifying the internal needs and external driving factors of information construction, organizing and discussing by priority.
To ensure the overall security of enterprise operations, assets, personnel and information, develop security strategies, build security values, and improve security construction.





Security Technology Monitoring
Internal Threat Monitoring
Business Security
Compliance
Continuous Exposure Management
Security Operations
Flexible business model Help users improve experience, focus on different security dimensions
Time: 7x24x365 Environment: IT – OT Full-stack operations, full knowledge domain