Meet Metanet Tplatform Experts
Contact usThe nation's only organization to provide End-to-End cloud services.
Hybrid Services
Professional Service
Consulting Migration Managed ServicesIT Infra
Public Cloud Private Cloud Infrastructure Transformation Infra Management Security Dynamic WorkplaceData & AI
Heterogeneous DB Migration Big Data & AI E2E Data Management SolutionsPlatform
Microsoft
Azure O365/M365Red Hat
Red Hat OpenStack Red Hat OpenShiftVMware
VMware Cloud Foundation Vmware HCIIBM
Private Cloud Server & StorageComputing/NW
SDDCSolution
Resource
About us
With enterprises adopting the cloud as part of their digital transformation journey, cloud security is a real concern due to emerging threats, such as ransomware and hacking. Therefore, a security strategy that can respond to cyber threats and security incidents is essential for enterprises to introduce and utilize cloud safely. Metanet Tplatform offers a more advanced cyber security response system by covering cyber security, ranging from security consulting to operation and global security solution.
Metanet Tplatform provides the service of security strategy establishment and system development optimized for customer's business strategy and environment. Metanet Tplatform builds a GRC (Government, Risk, Compliance) framework for business risk management, and provides consulting about the suitability of the information security management system developed and operated by the enterprise itself to prevent the leak of major information assets in advance, and provide a cyber threat intelligence platform.
Security GRC consulting
Developing a security work and compliance management solution
Developing a risk management system
Compliance consulting
Consulting about information security management systems
Cloud security consulting
Consulting about information security architecture creation
Building an intelligence-based SOC platform
Designing an analysis architecture based on the big data platform
Developing a vulnerability-based risk management system
Adding multiple control or point solutions is not needed for enterprise cloud security. A new approach is needed to ensure the security of workloads on the cloud. Enterprises need complementary cloud-native control and the integration of new solutions, and existing technologies and procedures for a hybrid multi-cloud security program.
The journey of the cloud begins with a complete cloud security strategy, governance, and readiness plan.
Important data is discovered, classified, protected, and managed regardless of data location.
The security workload planned to place the security workload is created, deployed, and managed.
It is important to identify and manage the user who is authorized to access the workload and system in a hybrid multi-cloud environment.
Providing an e-mail quarantine function based on sender reputation using advanced analytics.
Removing unnecessary e-mails through spam mail quarantine.
Providing a virus quarantine engine for attached files.
Executing a sandbox for unknown virus files.
Filtering gray mails.
Filtering an attempt to access a dangerous URL.
Enabling the quick detection, investigation, reporting, and management of all network data. This is enabled through data management and analysis throughout the entire distributed virtualized environment.
Significantly speeding up notification creation and analysis by dynamically analyzing and supplementing network data at the time of capture and generating session metadata.
Supporting forensic investigations by combining the in-depth investigation function for hundreds of protocols with a powerful integrated toolkit.
Supports decryption by integrating with third-party vendor’s solutions and encryption support.
Governance : Making sure that organization's activities are composed in such a way that business goals can be supported.
Risk Management : Making sure that risks related to an organization's activities are identified and countermeasures are prepared.
Compliance : Making sure that organization's activities are performed by complying with relevant regulations and rules.
RSA Archer Platform provides comprehensive and integrated risk information by integrating and analyzing enterprise risk data.
Various governance, risk, and compliance processes can be rationalized and automated to reduce costs and improve efficiency.
The risk classification system built into RSA Archer provides a framework that supports decision-making based on information and risks by collecting actionable insight.
The RSA Archer solution enables you to create a strong enterprise-wide risk management culture by clearly defining the responsibilities of frontline managers.
Encrypting all types of data, including tape-recording, logs, images, and voice recordings
Transparent encryption – no need to modify the DB and application
Supporting all applications regardless of their structure
Minimizing downtime through quick encryption
Safe, systematized, and centralized deployment management of encryption keys
Central management system verified up to 10,000 units
Supporting all commercial operating systems such as Unix, Windows, and Linux
No data size changes before/after encryption
Managing cloud encryption support keys in various environments
A security intelligence platform combined with cognitive security for the first time in the world
Providing more than 300 types of basic parsing modules that collect real-time information about log and traffic
Providing various filters and indexes for high-speed search, such as Quick search, Filter search, and Advanced search
Detecting fraud, leakage by insiders, and advanced threat, and executing data protection policies
Normalizing events and analyzing correlations immediately using IBM X-Force Threat Intelligence
Applicable to both on-premise and cloud environment
NBAD function to detect abnormal behavior of the user and IT anomaly through machine learning
Providing a single unified view of logs, network flow, vulnerabilities, assets, and threat intelligence
Providing detailed and comprehensive visibility
Checking availability, utilization and security preparedness in real time
SOAR (Security Orchestration and Automated Response Engine) – FortiSIEM Remediation Library
Providing a single dashboard.
Data capture is enriched with real-time threat intelligence and business context so that analysts can utilize security data much more usefully during investigation.
Special algorithms are used to automatically extract threat-related metadata and reflect in more than 200 metadata fields.
Sophisticated threat detection functions are provided that detect threat elements from analysis vectors, such as rules, threat intelligence, malware analysis, and User and Entity Behavior Analytics (UEBA).
Suspicious sessions (e.g. web, FTP, email) can be reproduced and data leaked during the attack can be clearly represented.
New RSA NetWitness Orchestrator provides various functions such as comprehensive incident management, innovative interactive investigation, chatbot based on machine learning, and perfect Playbook automation.
It is composed of a single or dozens of appliances, partially/completely virtualized solutions, solutions built into the operating environment, or cloud solutions.
Collecting data from various sources, and saving and virtualizing the data in an analyzable form
Providing security intelligence for cyber analytics collaboration
Expressing a relational diagram with a focus on one reference data (account, phone number, address, person)
Analyzing time line by tracing data movement path and transaction by time zone
Quantifying the analysis result such as correlation and proximity through SNA (Social Network Analysis)
Managing response proactively with security modules, including dynamic playbook.
Automating an easy-to respond workflow with action modules, which include more than 100 security tools.
Complying with laws related to personal information with privacy modules containing evaluation tools and simulation for GDPR.
Checking incident-related artifacts and providing insights through incident virtualization.
Responding to incidents with a visual workflow that does not require any special programming or coding skills.
Meet Metanet Tplatform Experts
Contact us