• Xinchao Media is a technology-based media innovation enterprise that combines traditional media and the Internet. The company is valued at more than US$2 billion. Xinchao Media is a community media platform focusing on middle-class family consumption. The company has deployed 650,000 elevator advertising screens in 105 cities across China, covering 45,000 communities and 200 million middle-class families every day. It has become a common choice of more than 23,000 customers.

    [Product] Situation Awareness (SA), Host Security Service (HSS), and Container Security Service (CGS)

    Xinchao Media is a technology-based media innovation enterprise that combines traditional media and the Internet. The company is valued at more than US$2 billion. Xinchao Media is a community media platform focusing on middle-class family consumption. The company has deployed 650,000 elevator advertising screens in 105 cities across China, covering 45,000 communities and 200 million middle-class families every day. It has become a common choice of more than 23,000 customers.

    [Product] Situation Awareness (SA), Host Security Service (HSS), and Container Security Service (CGS)

Situation awareness services did not suffice for digital management and security O&M

  • Digital management risks hidden in service expansion

    The digital transformation and atomic cloud services of Xinchao Media resulted in difficult network asset management, complex topologies, and heavy security O&M workload.

    As business grew, an increasing number of cloud resources were used. The attack surface became larger.

    Cloud security issues increased, including asset risks, baseline compliance, and vulnerabilities.

    The digital transformation and atomic cloud services of Xinchao Media resulted in difficult network asset management, complex topologies, and heavy security O&M workload.

    As business grew, an increasing number of cloud resources were used. The attack surface became larger.

    Cloud security issues increased, including asset risks, baseline compliance, and vulnerabilities.

  • Massive concurrent service requests made secure operations difficult

    Server resources needed to be better utilized to cope with high concurrency.

    Security risks and vulnerabilities in atomic, virtualized, and containerized services would possibly be exploited for interception, intrusion, privilege escalation, escape, malware implantation, and ransomware.

    Multi-cloud collaboration on the enterprise platform made it difficult for the security team to accurately defend against and handle risks in dynamic environments.

    Server resources needed to be better utilized to cope with high concurrency.

    Security risks and vulnerabilities in atomic, virtualized, and containerized services would possibly be exploited for interception, intrusion, privilege escalation, escape, malware implantation, and ransomware.

    Multi-cloud collaboration on the enterprise platform made it difficult for the security team to accurately defend against and handle risks in dynamic environments.

  • Situation awareness services cannot meet security O&M requirements in cross-platform collaboration

    The broad use of mobile devices made cloud computing services available anytime, anywhere, on any network. Diverse, personalized smart office features facilitated the transition and upgrade of the data center architecture and blurred the network security boundaries.

    Professional security teams did not have enough manpower for timely request handling, threat locating, or identification.

    There were a wide range of cloud security threats, resulting in fragmented O&M. The overall security situation must be managed in a unified manner.

    The broad use of mobile devices made cloud computing services available anytime, anywhere, on any network. Diverse, personalized smart office features facilitated the transition and upgrade of the data center architecture and blurred the network security boundaries.

    Professional security teams did not have enough manpower for timely request handling, threat locating, or identification.

    There were a wide range of cloud security threats, resulting in fragmented O&M. The overall security situation must be managed in a unified manner.

Xinchao Media uses Huawei Cloud SA, HSS, and CGS services to protect network nodes

  • Adaptive risk identification solution

    Huawei Cloud HSS, CGS, and SA comprise a comprehensive risk identification solution. The services can identify assets on servers, containers, and cloud services; check baselines; and scan for vulnerabilities. Users can easily identify critical risks and reduce attack surfaces.

    Huawei Cloud HSS, CGS, and SA comprise a comprehensive risk identification solution. The services can identify assets on servers, containers, and cloud services; check baselines; and scan for vulnerabilities. Users can easily identify critical risks and reduce attack surfaces.

  • Intelligent detection & proactive defense

    The Huawei Cloud intelligent detection & proactive defense solution can detect the entire attack chain on the server layer, including abnormal logins, brute-force attacks, Trojans, privilege escalations, abnormal processes, escapes, and file tampering. An in-depth defense system is implemented at the container layer to provide an entire set of container security capabilities, including image scan, intrusion detection, escape detection, and security policies. The Build-Ship-Run lifecycle and the entire container DevOps process are protected by login authentication, whitelist, virus scan and killing, ransomware prevention, and file protection. The proactive defense capability and efficiency of the platform are improved.

    The Huawei Cloud intelligent detection & proactive defense solution can detect the entire attack chain on the server layer, including abnormal logins, brute-force attacks, Trojans, privilege escalations, abnormal processes, escapes, and file tampering. An in-depth defense system is implemented at the container layer to provide an entire set of container security capabilities, including image scan, intrusion detection, escape detection, and security policies. The Build-Ship-Run lifecycle and the entire container DevOps process are protected by login authentication, whitelist, virus scan and killing, ransomware prevention, and file protection. The proactive defense capability and efficiency of the platform are improved.

  • Alarm response and visualized situational awareness

    Huawei Cloud SA collects network-wide traffic data, service alarms, and logs to detect security risks on the cloud, displaying threat severity in real time. HSS centrally aggregates, analyzes, reports, and handles a range of events on the cloud to help users track security issues until they are cleared. SA can work with HSS and CGS to show the overall network security status and situation, helping users manage cloud security and eliminate risks in a unified manner.

    Huawei Cloud SA collects network-wide traffic data, service alarms, and logs to detect security risks on the cloud, displaying threat severity in real time. HSS centrally aggregates, analyzes, reports, and handles a range of events on the cloud to help users track security issues until they are cleared. SA can work with HSS and CGS to show the overall network security status and situation, helping users manage cloud security and eliminate risks in a unified manner.

We use Huawei Cloud SA, HSS, and CGS to protect our nodes. Huawei Cloud is committed to building the most trustworthy enterprise service platform, helping good products reach hundreds of millions of families.

Fan Wenyin Head of Xinchao Media Security


Fan Wenyin
Head of Xinchao Media Security

We use Huawei Cloud SA, HSS, and CGS to protect our nodes. Huawei Cloud is committed to building the most trustworthy enterprise service platform, helping good products reach hundreds of millions of families.