Customize data vaults, provide total care for data security, ensure rational and compliant access to sensitive data, minimize data breach risk.
Deliver innovative cyber security solutions for cloud-based services, shield your cloud resources with indispensible protection.
About The Company
As a new-generation security company, Beijing LeTour Technology Inc. is dedicated to product development and professional service in data security and cloud security. The company follows the philosophy of integrity, innovation and efficiency, in pursuit of craftsman's spirit.
Founded in 2009, LeTour Technology is headquartered in Beijing with branches in Guangzhou, Hangzhou, Kunming, Urumqi and Hong Kong. The company has an elite team of R&D and security consultants with telecom background, who are seasoned and knowledgeable in both cyber security and customers' business. LeTour Technology is certified by Beijing Municipal Government as a high-tech. enterprise, holding independent intellectual property rights and patents.
Cyber security is the leading market in the whole IT industry, while data security is the leading field in the leading market. During its growth, LeTour Technology has chosen the most sophisticated field through its perseverance and inner seeking, striving for perfection. Employing big data processing and artificial intelligence technologies, the company has polished its best-in-class product lines.
Highly efficient, easy-to-use, conformance management system that controls hundreds of multi-vendor firewalls in large networks.
- Firewall Policy Analysis
- Firewall Configuration Auditing
Analyze the validity and efficiency of the complete policy set. For each firewall, identify its related services and audit the logic behind each policy. For all the firewalls in the network, analyze their policies in compliance with security zones.
Audit configuration compliance with industry regulations.
- WEB Security Detection
- WEB Security Operation
Provide comprehensive detection of web vulnerabilities and thorough verification of vulnerability effectiveness.
Intercept newly discovered vulnerabilities, advise customers to wipe out vulnerabilities, assist customers to investigate website failures and provide solutions.
- Sensitive Data Recognition
- Sensitive Data Auditing
Analyze the usage of sensitive data in customer's production systems, evaluate sensitive data breach risk.
Audit sensitive operations on core databases, file and host systems, alert non-compliant behaviors.
Integrating different cloud security devices, Cloud Security Service Platform (C2SP) provides comprehensive cloud security services.
- Cloud security services such as vulnerability scanning, WAF protection, anti-DDoS and authentication
- Complete analysis of cloud events
- Expert-mode active security detection