We can build network-specific security products to respond against various threats from inside and outside, and provide a sophisticated integrated security management environment to create a secure corporate environment from external attacks.
Cognition-based Control of Application/User/Device
Signature-based Threat Blocking
Authentication/control of app, user ID, device.
Provides virtualized cloud network security.
Integrated security platform for wired/wireless IT infra environment.
Easy interworking with 3rd party products through RestAPI.
Responds to the latest security threats.
Controls and detects by app unit.
Checks encrypted traffic in both directions.
Swift response by interlocking with SECUI Infringement Response Center.
Detects and blocks wireless infra which produces security threats.
Controls unauthorized wireless networks.
Management through wireless infra visualization and identifying location.
Provides wireless infra security environment based on the latest WiFi-6.
Sandbox-based Behavior Analysis
Unknown Attack Prevention using Machine Running
Client Management System
Collects and analyzes malware contents and abnormal system behavior.
Detects ransomeware/pharming behavior.
Detects abnormal/unauthorized process.
Prevents unknown new attacks using behavior-based analysis.
Blocks attacks using various global analysis engines.
Device and Log Integrated Setting/Monitoring/Management
Real Time Analysis of Massive Data
Threat Management System
Provides integrated threat response platform.
Collects threat log and analyzes multidimensional threats.
Analyzes and automates security policy based on threat analysis information.
Analyzes threats and policies for response in real time.
Log Management System
Applies big data-based technology. (Up to 400 thousand EP)
Supports log and network packet analysis.
Supports both SQL/No-SQL.
Supports log parsing and tagging.
Service Configuration Diagram
BLUEMAX Network Security Architecture
Sophisticated Security Level Provides highest level of security through virtualized cloud network security, integrated security platform for wired/wireless IT infrastructure environment, traffic analysis using AI engine, and so forth. It proactively and quickly responds to the latest security threats, and prevents your internal information leakage.
Integrated Security Environment Provides integrated security environment of BLUEMAX network security architecture. You can integrally operate solutions such as wireless security, AI threat detection, internal information leakage prevention, anti-DDos, and policy analysis.
Cost Savings Business-specific products are available in three solution lineups. You can save money on security management by choosing AIbased threat detection, TMS, policy analysis, and anti-DDoS as the model that suits your business size.
Expected Service Effects
Analyzes threat information and automates security policy validation. You can plan and run security policies in the long term thanks to improved manageability.
Systematic Security Budget Management
You can choose the right products for your business size by solution area, reducing security management cost and forming more efficient budget plans.
Improved Business Performance
Why don’t you prevent sophisticated security threats and advanced attacks through access control, threat detection and security management solutions? We build a safe environment where you can focus only on your business.