1. Monitor and analyze the security status of networks, systems and applications, and find and identify potential threats and vulnerabilities.
2. Respond to and handle security incidents and emergencies, including intrusion, data leakage and malware, and take necessary measures for emergency treatment.
3. Provide security risk assessment and vulnerability scanning services to help customers better understand their own network and system security, and put forward suggestions and solutions for improvement.