Products

Product Overview

ZTE ElasticNet UME SMC - Endogenous Security Management Center

As an endogenous security management center, ZTE ElasticNet UME SMC achieves unified collection, processing, storage, and comprehensive analysis of network-wide security data through the deployment of endogenous security agents. The system provides asset fingerprint data analysis capabilities, combining vulnerability databases and security event logs to enable intelligent identification of vulnerable and abnormal assets. SMC can assess and analyze the impact scope of vulnerabilities (including network elements, network management, and infrastructure), issue timely alerts, and update the risk status of network-wide assets in real time.

Main Features

1. Attack Detection Capability

SMC leverages its endogenous attack detection capability to conduct in-depth analysis of logs and security events reported across the entire network (including network elements, network management, and infrastructure), identifying common attack behaviors such as brute force attacks and reverse shells, and presenting a comprehensive security posture at the network level. Additionally, the system continuously monitors critical operations such as file lists, process lists, permission changes, and file read/write activities, promptly detecting abnormal activities across the network to achieve precise security risk awareness.

2. Virus Detection Capability

SMC is equipped with endogenous virus detection capabilities, supporting malicious code scanning for files on network element virtual machines and cloud hosts. It identifies various types of malware, including trojans, worms, botnets, backdoors, ransomware, and mining programs. The system supports dynamic updates of virus databases and optimization of detection strategies, continuously improving detection accuracy and coverage to ensure proactive defense capabilities.

3. Micro-Segmentation Functionality

SMC's micro-segmentation system, based on a combination of autonomous learning and manual configuration, automatically identifies asset information and establishes traffic baselines by learning asset relationships or known service access rules. Upon detecting abnormal traffic that deviates from the baseline, SMC immediately flags potential threat sources and their impact scope, isolates suspicious compromised hosts within designated zones, and monitors threat propagation in real time. It triggers alerts and logs all relevant events to provide a basis for subsequent traceability.

 

Product Highlights

1. Full Asset Visibility: Comprehensive identification and monitoring of all assets within the core network domain, enabling unified management of asset status and risks.

2. Behavior-Based Baseline Protection: Constructs a dynamic protection system based on behavior analysis and threat modeling, delivering all-round security for core network systems.

3. Secure and Efficient Protection: Deeply adapted to the service characteristics of core network elements, effectively reducing false positives and providing high-precision, high-quality security protection.