Meet Metanet Tplatform Experts
Contact usWe present the best solution with our allied global vendors.
Hybrid Services
Professional Service
Consulting Migration Managed ServicesIT Infra
Public Cloud Private Cloud Infrastructure Transformation Infra Management Security Dynamic WorkplaceData & AI
Heterogeneous DB Migration Big Data & AI E2E Data Management SolutionsPlatform
Microsoft
Azure O365/M365Red Hat
Red Hat OpenStack Red Hat OpenShiftVMware
VMware Cloud Foundation Vmware HCIIBM
Private Cloud Server & StorageComputing/NW
SDDCSolution
Resource
About us
Cyber threats are also becoming more intelligent and sophisticated through repeated changes and developments. The customer’s approach to security can be dramatically changed by selecting Cisco SecureX, a cybersecurity platform that conveniently maintains security. Cisco is the industry-leading security solution provider as selected by all Fortune 100 companies. Cisco protects the end-to-end infrastructure of customers with the best product in its class in an open and integrated platform. Customers can build effective security to prevent ever-evolving threats by introducing the Cisco platform that applies the best threat intelligence and a Zero Trust approach, which is the best in its class.
Cisco Firepower®, a next-generation firewall (NGFW) and next-generation intrusion prevention system (NGIPS), is a solution that provides customized security optimized for the various enterprise challenges, using diverse industry-leading intrusion prevention technologies and the latest threat information collected from worldwide CISCO infrastructure. Firepower provides intelligent threat containment functions in all attack phases - before, middle, and after.
Preventing the latest threats using the latest security intelligence (CISCO TALOS) in the industry
Effectively blocks 99.7% of threats according to the intrusion detection system test by NSS Labs
Automatically applying optimized policies by mapping complex IPS rules with the vulnerability information of internal assets
Detecting and blocking malicious files using CISCO AMP (Advanced Malware Protection)
Regressively analyzing malicious code injections
Analyzing the malicious behavior of unknown files through dynamic analysis
Providing threat indicators through internal asset analysis
Providing a perfect integrated environment with heterogeneous security systems using REST-API
Umbrella is the first cloud SIG (security Internet gate) in the industry that enhances the security of all users in minutes. Umbrella can respond to attacks through the web without installing an agent using the DNS and provides various statistical data on Internet usage and threats.
Visibility and protection without any limitation on the place and company-wide application within a few minutes
Block phishing, web, callback, exploit kit in DNS before the occurrence of an actual session (beginning of the attack)
Blocking threat domains using the real-time DGA (domain generation algorithm) detection function
Detecting and blocking threat domains using an algorithm of simultaneous DNS query generation
Detecting and blocking 5threat domains using an algorithm of analyzing DNS request traffic (SPRank)
Detecting and blocking threat domains using the differences in DNS queries of infected and clean clients
No impact on major business services such as Internet banking
CISCO® AMP (Advanced Malware Protection) for Endpoints provides security visibility at the terminal by recording all behavior of various terminals using the multiple security detection methods and recall regression analysis and providing a tracking function over time.
Updating the latest global security threat information collected on CISCO products
Equipped with various latest threat detection engines such as machine learning, hashing, anti-virus, and fuzzy fingerprinting
Holding active preemptive defense technologies that provide information on the rate of vulnerable software and executable file occurrence
Providing the visibility of all process behavior, including malware, using regression analysis
Checking the introduced file continually according to changes in status
Providing all security functions using a single agent
Automatically blocking the encryption behavior of ransomware
Providing automatic IOC (Indicators of Compromise) investigation function by integrating TALOS and third-party threat information – CTR
The CISCO Threat Grid supports interpretation with other CISCO solutions by providing a correlation engine, rather than a simple sandbox, that analyses the overall situation of the attack to define and prevent emergent threats.
Providing both on-premise and cloud type
Minimizing false positives using more than 1,000 self-behavior indicators
Disabling sandbox-evading technology such as virtual drive detection, analysis environment detection, and sleep, using proprietary analysis technology
Global correlation analysis between each sample and the definition of past malware
Threat scoring with a proprietary analysis algorithm, considering reliability and severity based on collected information
Providing videos, artifacts, packets, original files
Visualizing the process of analyzed contents
Supporting integration and automation using the REST API
CISCO Cloud Lock is a cloud-native CASB and cybersecurity platform for the secure use of cloud applications and infrastructures, which protects users, data, and applications across SaaS, IaaS, and PaaS.
A perfect cloud-native solution that supports deployment in 5 minutes and minimizes user impact
Providing UEBA (User and Entity Behavior Analytics) using machine learning algorithms
Continuous monitoring, and sensitive information detection and protection with the customized policy of the cloud DLP function
Mitigating risks with automatic response measures such as end-user notification, file-level encryption, ownership transfer, and isolation
Checking the cloud application using Apps Firewall and providing its reliability
Creating a whitelist based on the risk profile and access scope and providing use cancellation for all users
CISCO Stealthwatch is a network traffic security analysis solution that provides comprehensive visibility using the enterprise network information (telemetry) of the existing network infrastructure. CISCO Stealthwatch can detect and respond to advanced threats using machine learning and behavior modeling and detects and blocks malware by analyzing encrypted traffic without decryption.
Recording the abnormal behavior of the network in real time and analyzing it continuously
Detecting, analyzing, and alarming anomaly based on the baseline of network security
Detecting abnormal behavior such as CnC attack, APT, ransomware, DDoS, unknown malware, and insider threats
Supporting more than 100 security events such as BPS, PPS, new floor, number of received SYN, and RESET occurrence rate
Minimizing false positives through multi-layer machine learning such as trust, entity, and relationship modeling
Conducting a forensics investigation by analyzing network audit trails
Providing visibility into encrypted traffic without a decryption process (ETA)
Cisco ESA (appliance)/CES (cloud) provides in-depth quarantine of the URLs, reputation, and attached file, besides the phrase in the e-mail message, which can prevent phishing, security breaches of business e-mail, ransomware, and spam, and can enhance e-mail security.
Providing an e-mail quarantine function based on a sender’s reputation using big data
Removing unnecessary e-mails through spam mail quarantine
Providing a virus quarantine engine for attached files
Checking unknown variant virus files using a sandbox
Graymail filtering
Filtering the attempt to access a dangerous URL
CISCO ISE (Identity Services Engine) is the best security policy management platform that integrates and automates advanced security access control to access networks and network resources based on roles. Major context data is shared with partner solutions to identify, block, and correct threats quickly by providing excellent user visibility, which simplify the enterprise mobility environment, and using CISCO pxGrid (Platform Exchange Grid) technology.
Identifying all users and devices accurately
Conveniently onboarding and provisioning all devices including the guest portal environment
Managing centralized context-aware policies that control user access (who, when, what device)
Providing a robust automatic device classification function using the first integrated device profiler in the industry
Checking the end-point status evaluation of the PC and mobile device to connect.
Checking security compliance by simplifying the policy creation, visibility, and reporting of the company-wide network
Sharing the in-depth context data of users and devices with a wide range of partner solutions using pxGrid technology
Meet Metanet Tplatform Experts
Contact us