The ancients looked up at the starry sky and wrote the song of "Bu Tian" to record the vast universe. Today, we gather information, focus on business assets, and discover potential risks for companies. DSO, the security operation service provider in the data era, focusing on customers' assets, provides security operation services based on threat intelligence data. Making complicated security management work easier and more effective is the dream of every single security practitioner. In the era of big data, with the accumulation and analysis for risk monitoring data, DSO is trying to build a security management system to solve the problem of security management that is hard to be quantifiable. This is our goal, and with the goal, we are committed to make security management easier with you together.
Number of employees
Technology R&D staff proportion
Average age of members
Team members are from A-share listed security companies, IT operations and maintenance companies, internet finance startup teams, telecom operators, and national security agencies. The company have become a member of the CNVD technology group, an emergency response support unit of CNCERT, and got the security service level 1 qualification.
A member of the CNVD technology group
An emergency response support unit of CNCERT
Security service level 1 qualification
National High-Tech Enterprise
Responsible for front-end interface development of PC, web, and tablet products.
Responsible for the front page development, production and maintenance, with the background developers to achieve page, interface related functions.
Develop Java-based background services.
Responsible for the design, development, unit testing and documentation of corresponding modules.
Responsible for security technology research, as well as the support of key project penetration testing or code auditing.
Responsible for the original vulnerability mining, as well as the tracking of the 0-day vulnerability.
Responsible for corporate security services.
Responsible for vulnerability verification and writing POCs for vulnerabilities.