Strong Security System for Blocking External Access

IPS/IDS

01

This is a system that detects and analyzes a wide range of illegal intrusions into the network in real time and automatically blocks abnormal packets.

* For details, please consult with the person in charge. Additional charges may apply depending on the service environment or customer requirements.

Wins Sniper IPS Series IBM GX Series
Wins Sniper IPS Series IBM GX Series

Configuration Diagram

02
KINX IPS/IDC Configuration Diagram

Features

03
  • Lease and exclusive use of national CC-certified equipment
  • Around-the-clock real-time intrusion detection and blocking
  • Intrusion event analysis and regular reports (upon occurrence and request)
  • Control of network packets entering inside
  • Self-learning and behavior-based detection
  • Blocking through the access control function in case of inflow of similar traffic
  • Flexible configuration without the need to change the network configuration and packets

Around-the-Clock
Monitoring Service

03

Even if you have excellent equipment or solutions, you won’t be able to prevent an unforeseen attack without an engineer with professional expertise and skills in this area. Our engineers will actively respond to network problems and various adverse situations and help keep your services running 24/7 without any interruptions.

Category Products
Integrated Event Monitoring 2Around-the-clock monitoring for network impairments and performance
Around-the-clock monitoring for system impairments and performance
Around-the-clock monitoring for security event
Around-the-clock impairment/failure monitoring and response
Proactive Response and Real-Time Response Proactive network impairment monitoring and response
Response to intrusion attempts by primary and secondary response teams
Consistent handling from event report from the customer to completion
Operation of the CERT Team Analysis of trends regarding new vulnerabilities reported daily from around the world
Real-time change analysis (threat rate), risk levels of vulnerabilities and latest analysis report
Signature registration for vulnerabilities of service ports
Reporting Service Monthly service reports
Impairment handling reports
Help Desk Tech support for security
Service improvement and complaints handling