Cloud Security Service

Cloud Security Service

Get in touch


FET is integrated with IDC (Internet Data Center) and provides information security equipment to protect FW(Firewall), IDS (Intrusion Detection System)/ IPS (Intrusion Prevention System) and AV (Anti Virus). With professional technology, clients are able to resist cloud (Internet) attacks, all-day security monitoring 7X24X365 is incorporated to protect clients' Internet equipment and servers. The coverage of Security Mechanism provides the services of security policy co-location, event monitoring, cross analysis and online emergency response and handling. With a complete analysis of database, the enterprise can maintain a highly secure network environment.

Application Types

The enterprises that is in demand of information security service feel burdensome about the cost of establishing information security mechanism.
Enterprises with limited budget and personnel for information security.
The enterprises whose clients have extremely high level of information security demands.
In formation saved in computer equipment is very important and valuable.
The capacity of information security service agent is limited, but a 24-hour all day professional information security monitoring is in demand.

Service Advantage

FET Telecommunication Application Cloud Technology is integrated with SOC (Security Operation Center) for the purpose of reducing the cost of establishing information security equipment and unpredictable risks and burden, and its Service Privilege include:

Professional SOC 7 x 24 x 365 All-Day Information Security Monitoring

Proactively monitor the internal behaviors of illegal access that violate security policy, Internet abuse or conditions of misuses.
Real-time mastery of viruses evading enterprise internal network or high-risky attacks.
Host Computer Protection: Pre-alert of suspicious attacks.
Block DDOS/DOS attacks.

Information Security Consultation and Suggestion

Once a suspicious Internet activity (event) is found and confirmed, within 30 minutes after the discovery, the liaison personnel will be notified and provided with appropriate handing suggestions
If a suspicious information security incident is found by the client, our engineers are reachable at any time to give descriptions of the incident as well as suggestions of handling solutions
Within 30 minutes after the discovery of information security incident, the clients will be notified and provided with complete incident description and suggested solutions

Within 2 hours (5X8) the adjustment of monitoring policy can be complete

Policy Adjustment Service: Once the adjustment request is confirmed with the client, within 5x8 working days or on the designated day, the setups can be completed within 2 hours
Proactively Protection Policy Adjustment: After the information security incident is detected and identified as a major incident and the emergent handling should be processed immediately, the setup of protective measures to block the threat can be done right after the client is consent

Update the Attack Database within 8 hours

Within 8 hours, the original attack database will be updated for the clients

Chinese Version Pre-Alert Message Service

Real-time mastery of global Internet risk status and the most updated security information
The message will be sent to the designate accounts (a maximum of 5 accounts)
Within 4 hours after the global information security status is released, the Chinese Version Pre-Alert Message will be sent out

Chinese Localized Information Security Management System

Real-time mastery of global Internet risk status and the most updated security information will be sent by email to the designate accounts (a maximum of 5 accounts)
Chinese/English version information security Web monitoring interface is available for inquiring information security incidents and weak-point database

Long-Term Information Security Status Analysis Report

Monthly/Quarterly Incident Reports: The statistic analysis made accordingly with information security incidents including the source of attack, attack target, attack incidents
Monthly statistics of information security incidents and the report of alert notification and handling records

Regularly Scheduled Backups of Incident Information

The original incident information will be kept for 6 months. The statistics of information security incidents and the reports of alert notifications and handling records will be made every month.

Tariff Contents

Service Type
Service Contents
Enterprise Service Listed Price/
Monthly
Applicable
Bandwidth
Advance Service Listed Price/
Monthly
Applicable
Bandwidth
Flagship Service Listed Price/
Monthly
Applicable
Bandwidth
Function 1 Function 2 Function 3 One-Time Setup Service Charge/ Piece
FW 2 FW+IPS FW+IPS+AV
24,000 26,000 28,000 10,000 /Piece
50Mbps 10~25Mbps 5~15Mbps
30,000 32,000 34,000 18,000 /Piece
200~300Mbs 90~100Mbps 20~50Mbps
52,000 54,000 56,000 24,000 /Piece
500~1G Mbps 300~800Mbs 80~200Mbps

Contact us, we'll provide you the solution fits your needs