Service Types

Service Types

Apply a proven methodology by consultants based on plenty of practical experience and specialized technique to implement information security consulting

Service types

You can scroll horizontally.

Service types

Consulting-Specialized Service

You can scroll horizontally.

Main Characteristics & Implementation Description Application Field
Regular Consulting
  • Regular consulting under long-term contract and measure suggestion
  • For protection measure application, training, measure support, and execution check
  • Separate execution by specific parts such as vulnerability diagnosis, mock hacking, and secure code review
  • Certification maintenance such as ISMS-P
  • Compliance response
  • Homepage vulnerability management
Hardening
  • Diagnose the defense level of existing security control policies of information system or security system.
  • Use major attack techniques, malignant codes, new vulnerabilities, and sociotechnological techniques.
  • Check the responsiveness against malicious attacks.
  • In-depth mock hacking
  • Security system sophistication
Security Review
  • Implement for network, system, user, etc. respectively in separation.
  • Diagnose the security level of newly opening or changed systems and change control.
  • Evaluate request suitability such as compliance response, and certification criteria.
  • Emergency analysis response, etc. in security breach
  • New service/system building
  • AP secure code audit
  • Security breach analysis & response
Solution Selection
  • Criteria for selecting suitable system and solution for involved business or service characteristics
  • BMT for solution selection
  • Provide various attack tools and system for BMT implementation along with vulnerability diagnosis criteria
  • New system introduction
  • BMT implementation