Features
Private networks 100% isolated from other tenants at Layer 2. DDoS attack protection ensures the stability and reliability of your applications
WAF HTTPS anomaly detection, SSH secret key login to ensure cloud hosting login security, database protection.
Cloud platform authentication and authorization, SSH key management, resource access role authorization, and operation auditing
Multi-replica mechanism to ensure data reliability at server-level or data center-level disasters.
Benefits
Ensure network access security with secure and reliable access protection policies
Multi-access security protection to ensure secure and stable operation of applications.
Complete user access security policy to ensure the security of cloud platform accounts.
Rapid recovery of customer data even after the most severe failure.