Hybrid Service

The nation's only organization to provide End-to-End cloud services.

Public Cloud Private Cloud Infrastructure Transformation Infra Management Security Dynamic Workplace
KR EN
Security

Services for all cyber security areas

With enterprises adopting the cloud as part of their digital transformation journey, cloud security is a real concern due to emerging threats, such as ransomware and hacking. Therefore, a security strategy that can respond to cyber threats and security incidents is essential for enterprises to introduce and utilize cloud safely. Metanet Tplatform offers a more advanced cyber security response system by covering cyber security, ranging from security consulting to operation and global security solution.

Overview of Metanet Tplatform’s security service

Metanet Tplatform provides the service of security strategy establishment and system development optimized for customer's business strategy and environment. Metanet Tplatform builds a GRC (Government, Risk, Compliance) framework for business risk management, and provides consulting about the suitability of the information security management system developed and operated by the enterprise itself to prevent the leak of major information assets in advance, and provide a cyber threat intelligence platform.

  • Provides information security governance, compliance, risk, and enterprise security process definition on a single platform.

    Security GRC consulting

    Developing a security work and compliance management solution

    Developing a risk management system

  • Most suitable for the enterprise by providing the consulting service to protect the enterprise assets from various cyber threats, based on expert security knowledge.

    Compliance consulting

    Consulting about information security management systems

    Cloud security consulting

    Consulting about information security architecture creation

  • Providing an integrated security control platform based on intelligence to protect assets from security threats that are becoming intelligent.

    Building an intelligence-based SOC platform

    Designing an analysis architecture based on the big data platform

    Developing a vulnerability-based risk management system

Service by security area

    Adding multiple control or point solutions is not needed for enterprise cloud security. A new approach is needed to ensure the security of workloads on the cloud. Enterprises need complementary cloud-native control and the integration of new solutions, and existing technologies and procedures for a hybrid multi-cloud security program.

  • Cloud security strategy

    The journey of the cloud begins with a complete cloud security strategy, governance, and readiness plan.

  • Data protection

    Important data is discovered, classified, protected, and managed regardless of data location.

  • Workload protection

    The security workload planned to place the security workload is created, deployed, and managed.

  • ID and access management

    It is important to identify and manage the user who is authorized to access the workload and system in a hybrid multi-cloud environment.

  • Differentiated cloud security
  • Solution

    IBM Security

    Open technologies, such as Linux and Kubernetes, offer the flexibility to quickly innovate and respond to changing market and client demands. IBM Security works with Red Hat® solutions, including Red Hat Enterprise Linux and Red Hat OpenShift Container Platform, to help you detect threats, protect data and safeguard privacy on open platforms — so you can propel your business forward with speed and control. Learn more
  • Securing network visibility

    Internal security requires securing the flow and visibility of communication between terminals.

    Cisco Stealthwatch

    You can improve the visibility and security of event detection by enabling netflow and introducing the Stealthwatch server installed on the Cisco router/switch/firewall.

    Providing an e-mail quarantine function based on sender reputation using advanced analytics.

    Removing unnecessary e-mails through spam mail quarantine.

    Providing a virus quarantine engine for attached files.

    Executing a sandbox for unknown virus files.

    Filtering gray mails.

    Filtering an attempt to access a dangerous URL.


    RSA NetWitness Network

    Eliminating blind spots by providing real-time visibility into all network traffic. Enabling the high probability detection of high-risk threats easily and quickly from network data.

    Enabling the quick detection, investigation, reporting, and management of all network data. This is enabled through data management and analysis throughout the entire distributed virtualized environment.

    Significantly speeding up notification creation and analysis by dynamically analyzing and supplementing network data at the time of capture and generating session metadata.

    Supporting forensic investigations by combining the in-depth investigation function for hundreds of protocols with a powerful integrated toolkit.

    Supports decryption by integrating with third-party vendor’s solutions and encryption support.

  • Security Framework

    Providing a security framework to conforms with legislation related to information security, such as the Personal Information Protection Act, Information and Communication Network Act, legislation related to national secret protection, Electronic Financial Supervision Regulations, and GDPR.

  • GRC
    (Governance, Risk management & Compliance)

    GRC delivers value such as decision-making improvements, optimization of IT investments, and variance reduction among departments, by taking a structural approach that enables IT to align with business goals, manage possible risks efficiently, and meet regulatory requirements.

    Governance : Making sure that organization's activities are composed in such a way that business goals can be supported.

    Risk Management : Making sure that risks related to an organization's activities are identified and countermeasures are prepared.

    Compliance : Making sure that organization's activities are performed by complying with relevant regulations and rules.


    RSA Archer Platform

    RSA Archer Platform provides comprehensive and integrated risk information by integrating and analyzing enterprise risk data.

    Various governance, risk, and compliance processes can be rationalized and automated to reduce costs and improve efficiency.

    The risk classification system built into RSA Archer provides a framework that supports decision-making based on information and risks by collecting actionable insight.

    The RSA Archer solution enables you to create a strong enterprise-wide risk management culture by clearly defining the responsibilities of frontline managers.

  • Security strategy solutions to
    respond to ransomware

    An in-depth defense system is required at all control points to prevent ransomware attacks, which encrypts victim’s data files to block access.

  • Data Security

    Data abuse and misuse by the administrator are prevented, and sensitive data within the database is encrypted, and data security regulations in the cloud are assured to meet increasing encryption and security regulatory requirements in various systems and environments.

    Vormetric Data Security Platform

    Encrypting all types of data, including tape-recording, logs, images, and voice recordings

    Transparent encryption – no need to modify the DB and application

    Supporting all applications regardless of their structure

    Minimizing downtime through quick encryption

    Safe, systematized, and centralized deployment management of encryption keys

    Central management system verified up to 10,000 units

    Supporting all commercial operating systems such as Unix, Windows, and Linux

    No data size changes before/after encryption

    Managing cloud encryption support keys in various environments

  • SIEM
    (Security Information and Event Management)

    Security threats can be accurately detected and quickly responded to minimize the impact, by integrating log events and network flow data generated by all systems and endpoint applications in the organization to correlate various information and aggregate related events on a single path.

    IBM QRadar

    A security intelligence platform combined with cognitive security for the first time in the world

    Providing more than 300 types of basic parsing modules that collect real-time information about log and traffic

    Providing various filters and indexes for high-speed search, such as Quick search, Filter search, and Advanced search

    Detecting fraud, leakage by insiders, and advanced threat, and executing data protection policies

    Normalizing events and analyzing correlations immediately using IBM X-Force Threat Intelligence

    Applicable to both on-premise and cloud environment

    NBAD function to detect abnormal behavior of the user and IT anomaly through machine learning

    Providing a single unified view of logs, network flow, vulnerabilities, assets, and threat intelligence


    Fortinet FortiSIEM

    Providing detailed and comprehensive visibility

    Checking availability, utilization and security preparedness in real time

    SOAR (Security Orchestration and Automated Response Engine) – FortiSIEM Remediation Library

    Providing a single dashboard.


    RSA NetWitness Platform Evolved SIEM

    Data capture is enriched with real-time threat intelligence and business context so that analysts can utilize security data much more usefully during investigation.

    Special algorithms are used to automatically extract threat-related metadata and reflect in more than 200 metadata fields.

    Sophisticated threat detection functions are provided that detect threat elements from analysis vectors, such as rules, threat intelligence, malware analysis, and User and Entity Behavior Analytics (UEBA).

    Suspicious sessions (e.g. web, FTP, email) can be reproduced and data leaked during the attack can be clearly represented.

    New RSA NetWitness Orchestrator provides various functions such as comprehensive incident management, innovative interactive investigation, chatbot based on machine learning, and perfect Playbook automation.

    It is composed of a single or dozens of appliances, partially/completely virtualized solutions, solutions built into the operating environment, or cloud solutions.

  • Threat analysis and response

    Meaningful patterns and relations can be analyzed by integrating various types of data and analyzing the relationship between data through visualization in various ways. Numerous suspected threat information can be identified and determined automatically, and agility, intelligence, and advanced technology can be provided that are needed to block complex attacks.

    IBM i2

    IBM i2 discovers hidden networks/organizations and relationships, as well as meaningful patterns by applying various visualization analysis on the relationship between data, and integrating and analyzing various types of data such as logs, e-mails, and call records.

    Collecting data from various sources, and saving and virtualizing the data in an analyzable form

    Providing security intelligence for cyber analytics collaboration

    Expressing a relational diagram with a focus on one reference data (account, phone number, address, person)

    Analyzing time line by tracing data movement path and transaction by time zone

    Quantifying the analysis result such as correlation and proximity through SNA (Social Network Analysis)


    IBM Resilient

    IBM Resilient Incident Response Platform (IRP) is the leading platform for orchestrating and automating incident response processes. IBM Resilient IRP quickly and easily integrates with your organization’s existing security and IT investments. It makes security alerts instantly actionable, provides valuable intelligence and incident context, and enables adaptive response to complex cyber threats.

    Managing response proactively with security modules, including dynamic playbook.

    Automating an easy-to respond workflow with action modules, which include more than 100 security tools.

    Complying with laws related to personal information with privacy modules containing evaluation tools and simulation for GDPR.

    Checking incident-related artifacts and providing insights through incident virtualization.

    Responding to incidents with a visual workflow that does not require any special programming or coding skills.

Meet Metanet Tplatform Experts

Contact us