Go to Main Menu Go to Contents
Managed Security Service We protect customers’ IT assets 24/7!
S-1’s customized security control service

S-1 provides customized managed security service tailored to the size, environment and security needs of the
workplace from security equipment rental to 24-hour managed security service.

Key services

Security equipment rental

Security equipment rental

Network security equipment rental (FW, VPN, UTM, WAF, etc.)

Monitoring normal system operations

Status Monitoring of security equipment

Security equipment operational status notification service (text-message notification if operation stops)

Real-time operation monitoring

Real-time operation monitoring

Stable maintenance of the IT infrastructure

Real-time intrusion monitoring

Real-time intrusion monitoring

Monitors and responds to signs of intrusion and operation of security equipment (policy settings, patches, etc.)

Additional services

Website protection

Website protection

Controls for website forgery, alteration and insertion (hacking) of malicious code

Convergence control

Convergence control

Access control and information leak monitoring linked to SECOM access control and PC security solutions

Monthly report

Monthly report

Provision of periodic reports

※ For customers using operation monitoring and intrusion monitoring service

SECOM system interface

SECOM system interface

Blocks network when linked to the SECOM guard system

Response to attacks

Response to attacks

Uses behavior-based analysis to block unknown malicious codes

Vulnerability diagnosis

Vulnerability diagnosis

Checks security status of servers/web and presents improvement plans

Device keeper

Device keeper

Cloud network access control service that can identify and control devices connecting to the Internet

Components of the service

Components of the service
Worksite
  • User PC
  • Server
N/W
  • SECOM manager
  • Secure access
SECOM
  • Security equipment
  • Internet
S-1 control center
  • Log collection server
  • Detection & analysis server Confirmation by professional
Detection data provided to customers

Managed security service is recommended for the following

Customers who want to
purchase only the
equipment without initial
investment costs

Customers who want to
check the operating
status of the system in
real time

Customers who want to
stably maintain their IT
infrastructure