Cookies and the protection of your data

We use cookies to improve the functionality of the website, to offer you a better website experience and to provide social media features. You give your consent by clicking on “Accept all Cookies” or as part of your individual settings. Please find detailed information on the use of cookies on this website in our Data Privacy Statement.

Functional Cookies

These cookies are necessary for the operation of the site and enable security-relevant functions. In addition, we determine whether you want to remain logged in and to make our services available to you when you change between this and other websites.

Statistical Cookies

These cookies are used for analyzing user behavior on our website with the aim of improving user navigation. All data collected is evaluated anonymously. Further information is available on our data protection site.

Marketing Cookies

These cookies are used to deliver relevant advertising or to limit how many times you see an ad. Marketing cookies can share that information with the advertiser (third-party cookies). The legal basis for the data processing is the consent of the user.

Alibaba Cloud Security Center - The Eye of Horus
Alibaba Cloud Security Center - The Eye of Horus
Alibaba Cloud Security Center - The Eye of Horus
Alibaba Cloud Security Center - The Eye of Horus
Alibaba Cloud Security Center - The Eye of Horus
Alibaba Cloud Security Center - The Eye of Horus
Alibaba Cloud Security Center - The Eye of Horus
Alibaba Cloud Security Center - The Eye of Horus
Alibaba Cloud Security Center - The Eye of Horus
Alibaba Cloud Security Center - The Eye of Horus
2021

Share:

Alibaba Cloud Security Center - The Eye of Horus

IT security management console

Alibaba Cloud Inc.

Alibaba Cloud Security Center is designed for individuals and enterprises with zero to top IT skills to help them detect, analyze, and defend aginst cyber attacks from different locations and various levels of scale and complexity. The whole security management scene is visualized, from the user's real network topography, cloud assets, risk tracing, to cyber risk situational awareness. The developers took a design-centered approach, reducing the inherent security management complexity through 3D interaction and the back-end technology to empower users to adopt the best security strategy for their needs.

Date of Launch
2019
Development Time
up to 12 months
Target Regions
Asia, Australia / Oceania, Europe
Target Groups
Consumer / User, Trade / Industry, Public Sector Government, Other target groups: Mainly targets enterprises

RELATED PROJECTS