Portable SecuMS
Mobile Security Vulnerability Diagnosis
Portable SecuMS
Portable SecuMS can be utilized in situations where system inspection and network connection are vulnerable due to network separation of information systems (servers, networks, DBMS, WEB·WAS) or security policies that prevent connection with the Manager.
It inspects for security vulnerabilities and provides solutions to discovered issues during diagnostics of affiliated or subordinate institutions by superior institutions.
It is a diagnostic solution that can comprehensively identify the vulnerability status of information systems
and monitor security vulnerabilities by integrating with the agent method.
Main functions
-
Vulnerability inspection
- Meeting domestic and international compliance standards
- Vulnerability diagnosis tool operable in network-separated environments, such as closed networks
- Simplifying installation and diagnostic procedures with simple command input, enhancing administrator convenience
- Immediate result verification on inspected systems and registration for management support
- Supporting user-defined scripts
-
Vulnerability management
- Providing vulnerability management process
- Handling action details and result processing for vulnerability lists
- Offering review and approval functions by upper managers after taking vulnerability actions
- Supports changing and setting vulnerability ratings
-
Exception management
- Providing exceptions for specific reasons and periods for vulnerabilities for business or service availability
- Providing a list of set exceptions
- Providing a list of items excluded from exceptions after the exception period has passed
-
Reports
- Providing detailed reports on the rating and vulnerability confirmation of inspected systems
- Daily reports showing the status and detailed information of the entire list of inspection targets
- Providing reports for the changes in vulnerabilities and statistical data over a specific period
- Providing an internal report generation function on the target system during portable (offline) inspections
Configuration diagram

Key Advantages
-
User Perspective
- Improving the productivity of persons in charge of security
- Establishing inspection and action processes clarifies the roles of security and system operators
- Enhancing technical capabilities through information sharing
- Providing a user interface that matches individual user permissions via the web
-
Manager Perspective
- Establishing a security vulnerability inspection process that matches the organization's nature
- Setting a continuous monitoring system for the current status of vulnerability management
- Integrated management of various systems
-
Functional Prospective
- No impact on business system operation due to low load operation principle
- Establishing a management system integrated with business systems (Mail, SMS, approval)
- Accumulating action history information to enable history management functionality Differentiation
Differentiation

-
Professional experienced personnel
- Deployment of internal personnel from our company, a specialized information security service provider, for professional operation and development of security system methodologies
- Deployment of personnel with experience in successfully executing similar projects for stable business execution
-
Performance and features
- Integrated management of network-separated/offline systems through portable inspection functionality
- Providing inspection policies based on user scripts for rapid response to the organization's existing scripts or new vulnerabilities
-
Stability Reliability
- Ensuring similarity and stability of work with solutions already supplied to the public
- Providing operational stability by monitoring and limiting system load
- Performing diagnostics with minimal changes to the operation system
-
Operational Convenience
- Efficiency enhancement through integrated management of security vulnerabilities
- Providing diagnostic status and action status taken for targeted vulnerabilities
- Strengthening capabilities with information and action guides for vulnerabilities
-
Scalability and Compatibility
- Providing optimal vulnerability inspection policies for adding information assets and responding to cyber threats through agent
- Offering exception handling processes for business characteristics and service availability