AIStorm CloudGuard

One CWPP for Every Cloud

home > products & solutions > AIStorm CloudGuard
AIStorm CloudGuard Core Message

One CWPP for Every Cloud.
One Platform. One Agent. Every Cloud.

CloudGuard comprehensively aligns with the Cloud Workload Protection Platform (CWPP) framework. It delivers full-stack security capabilities ranging from asset discovery and vulnerability management to threat protection, building a proactive, intelligent, and defense-in-depth host security system.
Core Defensive Capabilities & Advantages
  • Anti-Virus & Ransomware Protection:
    • Multi-Engine Fusion: Leverages signatures, heuristics, machine learning, and cloud-based scanning technologies to achieve a high detection rate for brand-new, unknown samples.
    • Deep Inspection: Supports parsing of over 300 file formats, equipped with 20+ unpacking and 30+ decompression technologies to identify deeply camouflaged threats.
    • Specialized Ransomware Countermeasures: Provides targeted defense against hundreds of ransomware families and RaaS (Ransomware-as-a-Service) attack chains.
  • Virtual Patching & Vulnerability Management:
    • Virtual Patching Technology: Delivers temporary protection for high-risk vulnerabilities within hours, eliminating the need for immediate reboots or applying official patches.
    • Extensive Rule Coverage: Includes over 9,000 virtual patch rules, covering trending high-risk RCE vulnerabilities from the past three years.
    • Closed-Loop Management: Establishes a complete cycle of "Temporary Protection → Impact Assessment → Permanent Remediation."
  • Lightweight "N-in-One" Agent Architecture:
    • High Integration: A single agent integrates Firewall, IPS, File Protection, Account Security, and Process Control capabilities.
    • Superior Performance: Configurable CPU usage peak (e.g., <5%) with adaptive circuit-breaking mechanisms to ensure zero impact on business operations.
    • Strong Scalability: Plugin-based architecture allows for feature expansion without upgrading the underlying base agent.
  • Intelligent Risk Governance:
    • Granular Asset Inventory: Collects information on over 1,300 types of software assets.
    • Integrated Intelligence: Built-in massive threat intelligence supporting one-click searches and anomalous change analysis.
Version Specifications & Feature Matrix

The product is available in three editions: CloudGuard Standard, CloudGuard Advanced, and CloudGuard Enterprise. Feature differentiation is as follows:

  • Included in All Editions (Standard / Advanced / Enterprise):
    • Host Asset Management
    • Host Security Health Check (Vulnerabilities, Patches, Weak Passwords)
    • Host Baseline Configuration Inspection
    • Host Virus & Trojan Detection/Protection
  • Added in Advanced & Enterprise Editions:
    • Host Security Threat Monitoring & Response
    • Host Process Whitelisting
    • Host File & Registry Protection
    • Host Account Security Protection
  • Exclusive to Enterprise Edition:
    • Host Firewall
    • Virtual Patching
Product Positioning & Background
Driven by the evolution of Cloud Computing and AI technologies, CloudGuard is designed to meet the security demands of cloud workloads (primarily hosts). It comprehensively covers the requirements of the CWPP model, dedicated to building a proactive, intelligent, and defense-in-depth host security system.
Key Functional Areas
  • Threat Protection
    Offers multi-engine malicious code inspection, behavior-based anomaly detection, and intrusion prevention.
  • Asset Management
    Enables automated asset discovery and inventory, real-time monitoring of asset changes, and minute-level localization of risky assets.
  • Vulnerability Lifecycle Management
    Provides full-scale vulnerability scanning assessment and a closed-loop virtual patching mechanism.
Application Scenarios
Unified Security Management for Hybrid Cloud

Pain Point: Resolving issues of unclear assets and inconsistent policies across mixed environments (VMware, Huawei, H3C, ZTE, etc.).

Solution: Provides a unified asset view, centralized management of cross-cloud hosts, and one-click synchronization of standardized security policies.

Specialized Ransomware Protection
Solution:
  • Pre-attack Prevention: Vulnerability hardening + Least privilege control.
  • During-attack Blocking: Behavioral detection + Real-time interception.
  • Post-attack Recovery: Attack tracing/forensics + Rapid remediation.
Vulnerability Defense & Virtual Patching

Pain Point: Lengthy patching cycles (exposure window risks), difficulty scheduling downtime for critical services, and unpatched End-of-Support (EOS) systems.

Solution:

  • Reboot-free Protection: Intercepts exploit the network layer without requiring server reboots.
  • Automated Adaptation: Automatically matches policies to the environment to achieve "Protection upon Discovery."
  • Post-attack Recovery: Attack tracing/forensics + Rapid remediation.