Home

Normally Detect Anomaly!

Working with the Best Cyber Threat Analysists & Responders

Products & Services

Threatsift

The Engine Designed for Insightful Investigation
Extensive and Automated Analysis on Resources Abused in Cyber Breach and Effective Historical Data Management, Linkage Analysis.

Trapwall

Traffic collection and analysis system
Advance prevention of intruder attack through managing reconnaissance traffic of local network intruder.

Trapnet

Integrated Honeynet Appliance Technology
Honeynet technology to spy out the purpose of intrusion and analyze inducement of actual attacks with relation to hacking attempt.

ForeTarget

Multi-Dimensional View for Proactivity
Predictive analysis of cyber infringement and resuting proactive corresponding information.

iStrings

Multilingual Intelligence for Global-Scale Security
A technology to acquire analytical points and judge malicious elements through extraction and analysis on binary code character strings.

Whoiser

Domain Whois Information Standardization Module
Global threat domain registration information acquisition and standardization to secure the ability to respond to intrusion.

ASTA

Innovative Platform for Advanced Security Training Academy
Advanced security education and training through building next-generation security technology education system

And More

Whatever you imagine, you will see beyond your imagination

Competences & Capabilities

Performance

Dig deep to find the best solutions, attack problems with difference perspectives.

Integrity

Prohibit immorality such as conflicts of interest, corruption, bribery and fraud.

People

Embrace the value of collaboration to exceed and eliminate the impossible.

Idea

Believe that there is always a track to do something better or new.

Customers & Partners

Beautifully crafted with technical excellence
and exceptional attention to detail.

 

Location Contact

Milestones & Nominations