Detect and respond quickly to anomalies and known/unknown threats using collected raw packets, metadata, session data, and original file and body content data.

Signature-based Intrusion Detection
Detects known attacks occurring on the network using Signature-based Intrusion Detection (SID) technology, detects standardized attack behaviors with high accuracy, and highlights detected patterns on the low packet analysis screen to provide intuitive confirmation of detection validity.

Behavior-based Anomaly Detection
By using user behavior-based detection (BAD, Behavior-based Anomaly Detection) technology, users' network activities are converted into metadata, usage frequency is analyzed and databased, and based on this, violations of regulations and internal abnormalities are quickly identified.
Patent application KR 10-2024-0107499Patent application KR 10-2024-0143546Patent application KR 10-2024-0157865

Content Analysis-Based Threat Detection
Using Content Threat Detection (CTD) technology, data transmitted through the network is stored and analyzed, various user behaviors are identified, and the original files and contents are restored, and then malware is detected and important internal data is leaked externally.
Patent application KR 10-2024-0143546