|
Main Characteristics & Implementation Description |
Application Field |
Regular Consulting |
- Regular consulting under long-term contract and measure suggestion
- For protection measure application, training, measure support, and execution check
- Separate execution by specific parts such as vulnerability diagnosis, mock hacking, and secure code review
|
- Certification maintenance such as ISMS-P
- Compliance response
- Homepage vulnerability management
|
Hardening |
- Diagnose the defense level of existing security control policies of information system or security system.
- Use major attack techniques, malignant codes, new vulnerabilities, and sociotechnological techniques.
|
- Check the responsiveness against malicious attacks.
- In-depth mock hacking
- Security system sophistication
|
Security Review |
- Implement for network, system, user, etc. respectively in separation.
- Diagnose the security level of newly opening or changed systems and change control.
- Evaluate request suitability such as compliance response, and certification criteria.
- Emergency analysis response, etc. in security breach
|
- New service/system building
- AP secure code audit
- Security breach analysis & response
|
Solution Selection |
- Criteria for selecting suitable system and solution for involved business or service characteristics
- BMT for solution selection
- Provide various attack tools and system for BMT implementation along with vulnerability diagnosis criteria
|
- New system introduction
- BMT implementation
|