Detect and respond quickly to anomalies and known/unknown threats using collected raw packets, metadata, session data, and original file and body content data.

Signature Intrusion Detection
Detects known attacks occurring on the network using Signature Intrusion Detection (SID) technology, detects standardized attack behaviors with high accuracy, and highlights detected patterns on the low packet analysis screen to provide intuitive confirmation of detection validity.

Behavior Anomaly Detection
By using user behavior-based detection (BAD, Behavior Anomaly Detection) technology, users' network activities are converted into metadata, usage frequency is analyzed and databased, and based on this, violations of regulations and internal abnormalities are quickly identified.
Patent application KR 10-2024-0107499Patent application KR 10-2024-0143546Patent application KR 10-2024-0157865

Content Analysis-Based Threat Detection
Using Content Threat Detection (CTD) technology, data transmitted through the network is stored and analyzed, various user behaviors are identified, and the original files and contents are restored, and then malware is detected and important internal data is leaked externally.
Patent application KR 10-2024-0143546