Solution

We present the best solution with our allied global vendors.

Cisco Fire Eye Fortinet IBM Security RSA Thales
KR EN

IBM Security provides intelligent enterprise security solutions and services.

IBM Open technologies, such as Linux and Kubernetes, offer the flexibility to quickly innovate and respond to changing market and client demands. IBM Security works with Red Hat® solutions, including Red Hat Enterprise Linux and Red Hat OpenShift Container Platform, helping you detect threats, protect data and safeguard privacy on open platforms — so you can propel your business forward with speed and control.

SIEM (Security Information and Event Management) IBM QRadar

Data is normalized, correlations between data are clarified, and security attacks that need an investigation are identified, using the IBM Sense Analytics engine after integrating log events and network flow data from thousands of devices, endpoints, and applications distributed across the network.

  • Features

    A world-first security intelligence platform integrating cognitive security

    More than 300 types of basic parsing modules that collect real-time information on traffic logs

    Providing various filters and indexes for high-speed search, such as quick search, filter search, and advanced search

    Detecting fraud, insider leakage, and advanced threat, and implementing data protection policies

    Normalizing events and analyzing correlations immediately using IBM X-Force Threat Intelligence

    Applicable to both on-premise and cloud environment

    NBAD function to detect abnormal behavior of the user and IT anomaly through machine learning

    Providing a single unified view of the log, network flow, vulnerability, asset, and threat intelligence

Enterprise intelligence analysis tool IBM i2

IBM i2 discovers hidden networks/organizations and relationships, as well as meaningful patterns by applying various visualization analysis on the relationship between data and integrating and analyzing various types of data such as logs, e-mails, and call records.

  • Features

    Collecting data from various sources, and saving and virtualizing the data in an analyzable form

    Providing security intelligence for cyber analytics collaboration

    Expressing a relational diagram with a focus on one reference data (account, phone number, address, person)

    Analyzing timeline by tracing data movement path and transaction by time zone

    Quantifying the analysis result such as correlation and proximity through SNA (Social Network Analysis)

SOAR (Security Orchestration, Automation and Response) IBM Resilient

IBM Resilient IRP (Incident Response Platform) is the leading platform for orchestrating and automating incident response processes. IBM Resilient IRP quickly and easily integrates with your organization’s existing security and IT investments. It makes security alerts instantly actionable, provides valuable intelligence and incident context, and enables adaptive response to complex cyber threats.

  • Value of IBM Resilient

    Managing response proactively with security modules including Dynamic Playbook

    Automating an easy-to respond workflow with action modules, which include more than 100 security tools

    Complying with laws related to personal information with privacy modules containing evaluation tools and simulation for GDPR

    Checking artifacts related to incidents and providing insights into incidents through incident virtualization

    Responding to incidents with a visual workflow that does not require any special programming or coding skills

Next-generation server access and password management IBM Secret Server

IBM Security Secret Server is a solution that searches, controls, manages, and protects privileged accounts in the organization. This solution protects major accounts safe from hackers and internal threats using Secure Vault, automates password reset, removal, and monitoring, and enables management through policy-based control. 

  • Value of IBM Secret Server

    All major unknown accounts can be searched

    Saving sensitive accounts in Secret Server and automatic change of the password periodically when used

    Recording and monitoring major session activities for audits and forensics

    Supporting the implementation of the minimum rights policy and the prevention of major account abuse at the endpoint

    Setting up a user-defined workflow for access rights

    Supporting reports for certifying enterprise compliance

    Managing internal servers, virtual machines, cloud servers, SSH, and RDP without an agent

Fraud analysis technology using machine learning IBM Trusteer

IBM Trusteer is a fraud detection solution that analyzes anomalies through the user's mouse and keyboard usage patterns and applies proprietary machine learning technology to analyze new threats.

  • Value of IBM Trusteer

    Assessing risks based on behavior analysis, access device, session, and network attributes

    Preventing real-time pharming, memory hacking, forgery and alteration, and overlay attack on mobile devices and PC

    Applying differential additional authentication to low-risk and high-risk users

    Supporting intelligence such as machine learning, new X-Force patterns, and global real-time threat data

    A scalable cloud platform that supports flexible integration and fast deployment

    Protecting more than 500 customers and 40 million endpoints throughout the world

    Processing 40 billion application connections and 1 billion user sessions every month

Unified endpoint management (UEM) IBM MaaS360

With Watson™, MaaS360 is the only platform that delivers an AI approach to unified endpoint management (UEM) to enable endpoints (e.g., smartphones, tablets, laptops, desktops, wearables, and the Internet of Things (IoT)), and end-users, and everything in between — including apps, content, and data. MaaS360 is an open platform that enables flexible integration and quick deployment.

  • Value of the IBM Maa S360

    Managing device registration, automation, and disposal, and applying security policies automatically

    Separating the personal data area and workspace when accessing corporate resources

    Supporting contents deployment and data leakage prevention (SharePoint, Box, Google Drive, OneDrive)

    Managing gateways to support Internet access

    Detecting mobile malicious code and damaged device, and detecting and correcting jailbreak and rooting forcibly

    GDRP compliance for endpoints and mobile devices

Data security management solution IBM Guardium Data Protection

IBM Guardium Data Protection is a monitoring and access control solution for the use of data, such as the database, big data, and file (unstructured data). This solution can manage information risks by analyzing the abnormal behavior of data access based on machine learning.

  • Value of IBM Guardium Data Protection

    Databases, big data, and files (unstructured data) can be managed and controlled centrally, based on the same policy template, using one solution.

    Minimizing system load without system delay by applying patented S-TAP technology and file unit encryption technology

    Reducing time and costs by assigning minimum development personnel without modifying the existing application to a large extent

    Omni-directional database monitoring and block in real-time, without a bypass.

Meet Metanet Tplatform Experts

Contact us