Strong Security System for Blocking External Access
IPS/IDS
This is a system that detects and analyzes a wide range of illegal intrusions
into the network in real time and automatically blocks abnormal packets.
* For details, please consult with the person in charge. Additional charges
may apply depending on the service environment or customer requirements.
Wins Sniper IPS Series | IBM GX Series |
Configuration Diagram
Features
- Lease and exclusive use of national CC-certified equipment
- Around-the-clock real-time intrusion detection and blocking
- Intrusion event analysis and regular reports (upon occurrence and request)
- Control of network packets entering inside
- Self-learning and behavior-based detection
- Blocking through the access control function in case of inflow of similar traffic
- Flexible configuration without the need to change the network configuration and packets
Around-the-Clock
Monitoring Service
Even if you have excellent equipment or solutions, you won’t be able to prevent an unforeseen attack without an engineer with professional expertise and skills in this area. Our engineers will actively respond to network problems and various adverse situations and help keep your services running 24/7 without any interruptions.
Category | Products |
---|---|
Integrated Event Monitoring | 2Around-the-clock monitoring for network impairments and performance |
Around-the-clock monitoring for system impairments and performance | |
Around-the-clock monitoring for security event | |
Around-the-clock impairment/failure monitoring and response | |
Proactive Response and Real-Time Response | Proactive network impairment monitoring and response |
Response to intrusion attempts by primary and secondary response teams | |
Consistent handling from event report from the customer to completion | |
Operation of the CERT Team | Analysis of trends regarding new vulnerabilities reported daily from around the world |
Real-time change analysis (threat rate), risk levels of vulnerabilities and latest analysis report | |
Signature registration for vulnerabilities of service ports | |
Reporting Service | Monthly service reports |
Impairment handling reports | |
Help Desk | Tech support for security |
Service improvement and complaints handling |