OUR SOLUTION
BlackBox Series is a security system of the next generation that provides overall service from
immediate monitoring/reaction to data accesses and system modifications to risk management in one platform.
> OUR SOLUTION > BlackBox Series
BlackBox Series is a solution that detects all user activities, categorizes and analyzes them using advanced AI, and presents
insights to authorized personnel - enabling organizations to quickly identify high-risk users and take immediate action to protect
vital assets. In a world where the risk of malicious users stealing sensitive company information is ever-present in daily operations,
businesses need solutions that go the extra mile beyond basic monitoring.
Monitoring
Gain comprehensive insights
on all system activities with
dynamic graphs and analytics.
Tracking
Trace suspicious behavior back to its origin and
stay ahead of insider threats.
Verification
Actively manage follow-up
actions and validate risky
behaviors.
Management
Shape the system according to your own detection
policies and customize all available indicators.
Data Board (Manager dashboard)
Provides a dashboard with graphs and data to identify data usage and signs of risks
Control monitoring
Control monitoring dashboard for integrated control of sensitive data access records
Behavior based trace
Tracking tool for tracking and identifying abnormal behavior and users(expert and normal mode provided)
Dedicated reports
Provides dedicated reports such as regular assessment reports, comprehensive assessment reports, and risk level assessment reports
User based trace (big data)
User based tracing tool using big data inquiry, trace and risk user detection to identify data breach
Inspection history and storage
Records and stores inspection history to prove periodic inspection details
> OUR SOLUTION > BlackBox Trace
BlackBox Trace aggregates every user's data request and/or modifications by collecting logs from different sources to spot and flag any abnormal entity behaviors in network devices.
How do Trace Series work?
WAS Trace
Monitors and records data usage and manipulation for web-based business systems
Transaction Trace
Monitors and records all transactions generated through the network
DB Trace
Collects and records all DB manipulations and data usage history
ITGC Trace
Application source change, etc. Monitors and records all operations
UNIX Trace
Monitors and records UNIX-based server operation
WinSrc-Trace
Monitors and records Windows-based server manipulation and data usage
Windows Trace
Monitors and records PC operation
SAS Trace
Monitors and records SAS manipulation and data use behavior
X Trace
Log collection and analysis for heterogeneous security facilities
Monitor confidential information misuse or leaks at public organizations and businesses
Protect the privacy of your users
Monitor insider threats
Monitor compromised credentials and data breach at your corporation
Able to be served as e-Discovery and GRC