Technical Principle

Tridimensional Security Defense, Born For Host Security

The computer architecture determines that any data needs to be processed by the CPU, and its data needs to be stored through memory. In theory, a security solution based on monitoring CPU instruction set and memory can effectively prevent all threats.

Different from the conventional security products only running in the application layer or kernel layer, intelligent Memory Protection System can provide organic combination of three-dimensional protection in the application layer, kernel layer and hardware layer.

Technical Principle

Tridimensional Security Defense, Born For Host Security

The computer architecture determines that any data needs to be processed by the CPU, and its data needs to be stored through memory. In theory, a security solution based on monitoring CPU instruction set and memory can effectively prevent all threats.

Different from the conventional security products only running in the application layer or kernel layer, intelligent Memory Protection System can provide organic combination of three-dimensional protection in the application layer, kernel layer and hardware layer.

Core Security Protection

Zero-day attacks

Behavior analysis and memory monitoring based on machine learning can prevent a large number of enterprise level threat vulnerabilities.

Fileless attacks

Compared to the complete failure of traditional security software, the Anxin Shenjia can accurately identify and protect against fileless attacks.

Buffer overflow attacks

Efficient protection stack memory overflow, protect the security of program data.

DLL injection

The protection process is not illegally injected, effectively preventing the DLL file from being hijacked, tampering, etc.

ROP gadgets

Powerful code protection technology can accurately identify and block the construction of malicious code.

Side-channel attacks

It can protect against attacks such as Spectre and Meltdown, and avoid user data breaches.

Corruption of
configuration date

Strongly protect configuration data from tampering and avoid configuration data corruption.

Virus Trojan killing

Based on behavior to detect viruses and Trojans, Anxin has strong ability to kill and clear.

Born For The Host Security

Powerful memory data probe capability can solve deeper security problems and risks.

EDR Adaptive Security Host hardening Anxin
Born for the host security
Defense unknown/fileless attacks
No feature/rule upgrade required
Automatically run correctly
Defense zero-day attacks
No need to adapt/modify code
No hardware/system conflicts
Performance impact is ignored
File system monitoring
Low false positive rate

Support For Multiple Deployment Modes

Local Deployment

Local deployment is a common network deployment environment. It adopts a purely soft architecture and can be quickly deployed in physical machines and virtual machines to achieve efficient management of security and operation and maintenance.

Private Cloud Deployment

The private cloud deployment mode can meet the enterprise's more secure and flexible business expansion ability, and facilitate enterprise management.

Public Cloud Deployment

Public cloud deployment is lightweight and fast deployment, supporting Windows and Linux system security protection. It can be deployed in a few minutes and security is activated immediately.

Effectively ensure that the customer's core business is not
blocked and the core data is not stolen.

Copyright©️2019-2020 ANXINSEC All Rights Reserved | Beijing ICP 19024522