Go to Main Menu Go to Sub Menu Go to Contents

BUSINESS

Security Control

homeBUSINESSInformation SecuritySecurity Control
IT assets are protected 24/7!
S-1‘s Customized Security Control
Services

Customized security control services are provided based on the volume
site situation : needs and the environment. A wide range of services from
security device rental to 24/7 remote control are available.

Service Features

  • Professionals
    Professionals
    • Control centers specializing in IT security
    • Professionals with security control know-how
  • Economical monthly pay
    Economical monthly pay
    • Balancing out first payment burden by spreading out to monthly
    • Selective services allows unnesassary service pay
  • Selective customized service
    Selective customized service
    • Customized network security services provided from A to Z
    • Selective specialized services, e.g. website protection, APT attack response and convergence control
  • Easy security management
    Easy security management
    • 24-hour remote security operation management (policy setting, patches, etc.)
    • Provides periodical reports (optional)

System Diagram

  1. Customer

    1. user PC
    2. SERVER
    3. N/W
    4. Security equipment
    1. Alarm Monitoring Service manager
    2. Entrance guard
    3. Alarm
      Monitoring
      Service
    4. Security equipment
  2. Internet
  3. S-1

    1. Log collection
      SERVER
    2. detection analysis
      SERVER
    3. Confirmation by professional crew
  4. Information on detection
    areas provided to customers

Key Services

  • Security equipment rental Image
    Security equipment rental

    For customers who want to receive security services without initial investment costs

    Network security equipment rental service (FW, VPN, UTM, WAF, etc.)

  • Monitoring normal operation of the system Image
    Monitoring normal operation of the system

    For customers who want to check the operational status of their system

    Security equipment operation status notification service (a text message is sent if operation is interrupted)

  • Real-time trouble monitoring Image
    Real-time trouble monitoring

    For customers to whom stability of the IT infrastructure is critical

    Monitors equipment resources/service and security operations (policy settings, patches, etc.)

  • Real-time intrusion monitoring Image
    Real-time intrusion monitoring

    For customers who need professional security control

    Monitors for signs of intrusion and handles security equipment responses (policy settings, patches, etc.)

Additional services

  • Homepage protection

    Customers operating homepages

    Controls tampering and destruction
    of homepage and malicious codes on the web

  • Convergence control

    Customers who need advanced
    security control

    Controls access and monitoring information leakage in connection with Alarm Monitoring Service access control, PC security solutions

  • Monthly report

    Providing regular reports
    (Service.2 or higher)

  • Interfacing alarm
    monitoring service system

    Customers who want to block networks at the
    source by interfacing with the Alarm Monitoring Service system.
    Blocking networks when the security system is activated through interfacing with the SECOM security system

  • Responding to attacks

    Customers who want to get feedback from latest security threats

    A behavior-based analysis system that blocks
    unknown malicious codes

  • Diagnosis of
    vulnerabilities

    Customers who want to receive professional diagnosis legally or politically

    Checking the security status of the server/web
    and proposing improvement plans

CEO YOOK HYUN-PYO 25, SEJONG-DAERO 7-GIL, JUNG-GU, SEOUL

COPYRIGHT © 2013 BY S-1 CORPORATION. ALL RIGHTS RESERVED.