Strong Security System for
Blocking External Access
Web Application Firewall
This service is intended to defend the web server of customers by detecting and
blockingmalicious attacks in advance by monitoring web packets flowing into the web server.
* For details, please consult with the person in charge. Additional charges
may apply depending on the service environment or customer requirements.
Wapples | WEB Insight | Dot Defender |
Configuration Diagram
Features
Category | Web Application Firewall |
---|---|
Installation Method | Installed on the server (program installation) |
Service Method | Licensing |
Setting Time | Services can be used immediately after installation |
Updates | Automatic patches and updates |
Monitoring | Direct management is available using the program installed on the server |
Additional Costs | Additional CPUs within the same server (KRW 100,000 extra each) |
Around-the-Clock
Monitoring Service
Even if you have excellent equipment or solutions, you won’t be able to prevent an unforeseen attack without an engineer with professional expertise and skills in this area. Our engineers will actively respond to network problems and various adverse situations and help keep your services running 24/7 without any interruptions.
Category | Products |
---|---|
Integrated Event Monitoring | 2Around-the-clock monitoring for network impairments and performance |
Around-the-clock monitoring for system impairments and performance | |
Around-the-clock monitoring for security event | |
Around-the-clock impairment/failure monitoring and response | |
Proactive Response and Real-Time Response | Proactive network impairment monitoring and response |
Response to intrusion attempts by primary and secondary response teams | |
Consistent handling from event report from the customer to completion | |
Operation of the CERT Team | Analysis of trends regarding new vulnerabilities reported daily from around the world |
Real-time change analysis (threat rate), risk levels of vulnerabilities and latest analysis report | |
Signature registration for vulnerabilities of service ports | |
Reporting Service | Monthly service reports |
Impairment handling reports | |
Help Desk | Tech support for security |
Service improvement and complaints handling |