Features
100% Layer 2 isolation from other tenants, DDoS attack protection ensures the stability and reliability of your applications
WAF HTTPS anomaly detection, SSH secret key login to ensure cloud hosting login security, database protection
Cloud platform authentication and authorization, SSH key management, resource access role authorization, and operation auditing
Multi-replica mechanism to ensure data reliability against server-level or data center-level failures
Benefits
Ensure network access security with secure and reliable access protection policies
Multi-access security protection to ensure secure and stable operation of applications
Complete user access security policy to ensure the security of cloud platform accounts
Rapid recovery of customer data even after the most severe failure