Cloud Security
Cloud Security provides a complete cyber security service environment
based on the concept of zero trust by applying container-based virtualization technology in the cloud environment.
Introduce
Introductory description of the solution01Use of virtualization technology for the browser accessing the external Internet based on the cloud container's concept of zero trust.
02Removes JavaScript and phishing URL that may include external cyberattacks or viruses
03Disarms the attached file after eliminating malware and macro in the file
04ITransfers only screens with safe and proven web contents to internal users and recomposes browser screens before display based on the image streaming and DOM mirroring method
05Minimizes changes of the user's Internet experience and guarantees stable security
Strengths
Strengths of each solution-
- Outstanding design of web virtualization technology
-
- Technology that removes malware, macro, and latent virus based on AI analysis
-
- Excellent recomposition of the user’s web screens and minimizes decline in speed and data traffic
-
- Korean web service optimization technology, web application (Hangul, ERP) CDR integration
Key Features
Main solution functionsWeb contents download and running in isolation in a virtual container
Reconfiguration of safe and harmless web screens after removing potentially infected script code
Detoxication filtering of email, web contents, and downloaded files
Delivery of safe contents to users through web command and image streaming methods