Typical Scenarios
Industries with High Compliance Requirements
Industries that require strict compliance with specific security standards, such as finance, hotel, and aviation.
Companies with High Security Requirements
Companies that require strong defense capabilities and hope to develop security capabilities based on professional guidance rather spending significantly on self-funded R&D.
Enterprises with Cross-border Business
Chinese enterprises with overseas presence or international enterprises expanding to China that must comply with the security requirements of the target region.
Main Advantages
Rich Security Expertise Accumulated over the Years
From securing Taobao and Tmall to perfecting our security services, Alibaba Cloud has accumulated rich practical experience and technical know-how in security management.
Proficiency in Conventional Laws and Regulations
Well-versed in conventional security laws and regulations, such as ISO9001 and General Data Protection Regulation (GDPR), Alibaba Cloud can help you achieve compliance requirements more efficiently.
End-to-End Monitoring and Proactive Alerting
During the service period, security inspection reports are produced on a daily, weekly, and monthly basis. Alerts and notifications are automatically sent when risky events are identified.
Service Content
Solution Consultation
Provide consulting services on solution optimization, service features, and protection policy tuning for purchased security services based on specific business requirements. Deliver the Security Service Solution Design Report in writing. Supported services include
Anti-DDoS Pro,
Web Application Firewall,
Cloud Firewall,
Security Center,
and
Bastionhost.
Policies and Configurations of Continuous Optimization
Provide targeted consulting services on security protection policies and practical configuration support based on the requirements for cloud security in a specific period of time.
Data Reporting
Provide multi-dimensional reporting solutions to analyze risks and demonstrate how they are mitigated as report-based security monitoring is an indispensable part of daily operations. Implement specific configurations on behalf of you with authorization or simply provide consulting services on reporting solutions.
Support for Product Integration
Configure security products to integrate them with your business systems on behalf of you with authorization, or simply provide guidance and assistance on products configurations. In the latter case, configurations can be done by customer.
End-to-End Monitoring, Inspection, and Alerting
Regularly inspect the services, policies, security event alerts, and logs to determine the availability and effectiveness of security services and the effectiveness of security protection policies. Implement real-time monitoring on and send DingTalk group notifications for high-risk security events, such as the running of mining applications and the occurrence of viruses and web shells.
Service Solution Upgrade
In cases where you need to upgrade a solution to respond to changes in the security environment, provide consulting services on and implementation support for solution optimization. This ensures that security services can defend against attacks in a timely and effective manner to maintain business stability.
Regular Service Reports
Deliver every month a Security Service Operation and Usage Report, which covers the operation and usage of the relevant security service and suggestions on architecture optimization.
Solution Consultation
Provide consulting services on solution optimization, service features, and protection policy tuning for purchased security services based on specific business requirements. Deliver the Security Service Solution Design Report in writing. Supported services include
Anti-DDoS Pro,
Web Application Firewall,
Cloud Firewall,
Security Center,
and
Bastionhost.
Policies and Configurations of Continuous Optimization
Provide targeted consulting services on security protection policies and practical configuration support based on the requirements for cloud security in a specific period of time.
Data Reporting
Provide multi-dimensional reporting solutions to analyze risks and demonstrate how they are mitigated as report-based security monitoring is an indispensable part of daily operations. Implement specific configurations on behalf of you with authorization or simply provide consulting services on reporting solutions.
Support for Product Integration
Configure security products to integrate them with your business systems on behalf of you with authorization, or simply provide guidance and assistance on products configurations. In the latter case, configurations can be done by customer.
End-to-End Monitoring, Inspection, and Alerting
Regularly inspect the services, policies, security event alerts, and logs to determine the availability and effectiveness of security services and the effectiveness of security protection policies. Implement real-time monitoring on and send DingTalk group notifications for high-risk security events, such as the running of mining applications and the occurrence of viruses and web shells.
Service Solution Upgrade
In cases where you need to upgrade a solution to respond to changes in the security environment, provide consulting services on and implementation support for solution optimization. This ensures that security services can defend against attacks in a timely and effective manner to maintain business stability.
Regular Service Reports
Deliver every month a Security Service Operation and Usage Report, which covers the operation and usage of the relevant security service and suggestions on architecture optimization.
Service Acceptance Criteria
The improvement in security capability during the service period (before the expiration of the order) must reach the standards agreed upon by both parties. Alibaba Cloud shall deliver a Security Service Operation and Usage Report each month on time. The report shall cover an analysis on the operation of the relevant security services and a summary on the relevant security protection solutions.
Service Delivery Process
Both parties reach an agreement on the goals of the relevant security services
Customer completes the payment both for the orders of the services and related security products
those of solution consultation
Customer
Confirm that the solution meets your requirements.
Alibaba Cloud
Deliver the Security Service Solution Design Report.
Customer
Enable the additional features of the services and specify the persons responsible for service integration and apply for the necessary permissions and changes.
Alibaba Cloud
Provide solution consultation and support for security services, such as the support for service integration, protection policies, data reports, end-to-end inspection, and alerting.
Customer
Confirm that the service goals are achieved.
Alibaba Cloud
Deliver the Security Service Operation and Usage Report.
Service Pricing
Service Pack Type
8/5 Security Product Consultation and Support Service
24/7 Security Product Consultation and Support Service
Pricing Instructions
Provide consulting services and support 5 days a week, 8 hours a day (9:00 to 17:00 on weekdays).
Bills are generated based on the selected security services and the number of instances that require technical support. Different security services have different billing policies. The final price is the combined price that is displayed on the buy page.
Provide consulting services and support 7 days a week, 24 hours a day.
Bills are generated based on the selected security services and the number of instances that require technical support. Different security services have different billing policies. The final price is the combined price that is displayed on the buy page.
Service Pack Type
8/5 Security Product Consultation and Support Service
Provide consulting services and support 5 days a week, 8 hours a day (9:00 to 17:00 on weekdays).
Bills are generated based on the selected security services and the number of instances that require technical support. Different security services have different billing policies. The final price is the combined price that is displayed on the buy page.
From
$3000
24/7 Security Product Consultation and Support Service
Provide consulting services and support 7 days a week, 24 hours a day.
Bills are generated based on the selected security services and the number of instances that require technical support. Different security services have different billing policies. The final price is the combined price that is displayed on the buy page.
From
$5500