• Products for checking and evaluating network information security: Hardware and software devices with functions for scanning, checking, analyzing configuration, current status and diary data of information systems; detecting gaps and weaknesses; making information security risk assessment;
• Network information security monitoring products: Hardware and software devices with functions for monitoring and analyzing data transmitted on information systems; collecting and analyzing log data in real time; detecting and warning abnormal events, which may cause information insecurity;
• Products to prevent attacks, intrusions: Hardware devices, software with the function of preventing attacks and intrusions into the information system.