1~8 item / All 8 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationContact this company
Contact Us Online1~8 item / All 8 items
You can easily enhance your security measures by simply adding it as an extension to your Chrome or Edge browser. 〇 Prevent malware infections from accessing malicious sites It analyzes sites and disconnects unauthorized sessions. Additionally, it keeps the browser secure by disabling risky browser extensions and performing version checks. 〇 Understanding rogue SaaS (visualization of SaaS) It monitors the SaaS being used by employees and identifies the use of unauthorized SaaS within the company. It can also prohibit access to SaaS applications and cloud storage that pose security concerns. 〇 Prevent user actions that violate policies (leakage of confidential information) It blocks actions such as attaching files to cloud storage or free email services, and pasting confidential or personal information into ChatGPT or translation sites, thereby preventing the leakage of confidential data to external sources. 〇 Provide a safe browsing environment It offers a safe browsing environment without compromising user experience. Moreover, it can be implemented easily and cost-effectively compared to technologies like VDI, which require changes to the overall network design.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis is a service that inspects network devices, operating systems, servers, and middleware for vulnerabilities and configuration issues. After the inspection, we conduct a presentation by our technicians based on a detailed and easy-to-understand report, proposing the inspection results and future countermeasures. Benefits of implementing the service: - Optimization of the duration and cost of security measures through accurate diagnosis by security specialists. - Reduction of risks such as personal information leaks and associated damages. - Accurate understanding of the safety of the network that serves as the foundation for operating a website, enhancing the trust of operators. - Objective identification of issues through diagnosis by an independent third party, making it effective as a report for external audits.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe 1570R Appliance is a product enhanced for the highest level of SCADA security in the industry and for harsh operating environments, achieving the protection of critical infrastructure. It enables fine-grained visualization and control of SCADA networks, as well as the implementation of SCADA-compatible threat detection and defense technologies. 【Compact yet High Performance】 Despite its compact desktop form factor, it is a fully functional appliance equipped with 10 1GbE ports, achieving a firewall throughput of 4Gbps. 【Hardened Enclosure for Harsh Environments】 With an advanced design that eliminates moving parts and features a compact form factor and fanless operation, it can operate in extreme temperature environments ranging from -40°C to 75°C. 【Wide Range of Support】 It provides extensive support for numerous ICS/SCADA-specific protocols, achieving the highest industry standards. Types of supported protocols → https://appwiki.checkpoint.com/appwikisdb/public.htm 【Compliance with Strict Standards】 It complies with the most stringent regulations, including IEC61850-3, IEEE1613, and IEC60068-2.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationBy implementing program code hardening (Guard), we protect applications from intellectual property infringement and information leakage due to reverse engineering and other threats. <Code Hardening> We perform various code hardening techniques such as debugger detection, function call obfuscation, and string encryption. <Code Obfuscation> After inline expansion, we implement highly advanced obfuscation by randomly combining obfuscation algorithms at the assembly level. <Multi-layer Defense> We can implement multi-layered defenses by applying checksums, encryption, and obfuscation multiple times within the code. Depending on the application's risk, we can intensively strengthen security and enhance its robustness to withstand attacks from national-level cracker teams.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe will inspect whether your website is secure and check for vulnerabilities in the web application. After the inspection, we will propose the inspection results and future measures based on a detailed and easy-to-understand report. <Benefits of Service Implementation> - Optimize the duration and cost of security measures through accurate diagnosis by security specialists. - Reduce the risk of personal information leakage and associated damages. - Accurately understand the safety of the website operated by the client, enhancing the trust of the operators. - Objective identification of issues through diagnosis by an independent third party, which is also effective as a report for external audits. <Two Types of Reports> The reports created as a result of the diagnosis are very important elements for confirming the identified issues. The reports from Azgent are structured in two parts: a "Summary" for administrators and "Vulnerability Details" for engineers responsible for corrections. They can be used according to the audience, and have received positive feedback for being easy to understand.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration■ 24 hours a day, 365 days a year, monitoring customer systems ■ Real-time analysis and reporting of high-risk security events ■ Maintaining the network security level in optimal condition while significantly reducing operational costs
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationIRONSCALES is an anti-phishing platform that not only detects advanced spoofing emails using machine learning but also has the capability to share information about phishing emails within the organization and isolate them from mailboxes. ■ Detects common tactics of business email fraud through AI spoofing detection ■ Automates responses after suspicious emails are reported ■ Easily integrates with Office 365 and G Suite using API ■ Consolidates essential phishing prevention features (detection, removal, notification, education) into one platform
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis is a solution that emphasizes the "possibility" that files may contain malware and sanitizes (neutralizes) all target files coming from outside the organization through various channels such as email and the web. - Sanitizes (neutralizes) all target files to block targeted attacks - Easy to implement as a SaaS cloud service - Achieves whitelist-based neutralization to respond to unknown threats
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration