SecuMS
Security Vulnerability Diagnosis Solution
SecuMS
As an always-on security vulnerability management solution, SecuMS provides all-time monitoring on the security level inspection by performing automatic system security vulnerability inspections, providing solutions for detected problems, and identifying the current status of servers en bloc.
Main functions
-
Vulnerability inspection
- Meeting domestic and international compliance standards
- Supporting periodic automatic vulnerability inspection and manual inspection for emergency vulnerability
- Immediate result verification and registration for management support via portable inspected systems (offline inspections)
- Supporting user-defined scripts
-
Vulnerability management
- Providing vulnerability management process
- Handling action details and result processing for vulnerability lists
- Offering review and approval functions by upper managers after taking vulnerability actions
- Supports changing and setting vulnerability ratings
-
Exception management
- Providing exceptions for specific reasons and periods for vulnerabilities for business or service availability
- Providing a list of set exceptions
- Providing a list of items excluded from exceptions after the exception period has passed
-
Reports
- Providing detailed reports on the rating and vulnerability confirmation of inspected systems
- Daily reports showing the status and detailed information of the entire list of inspection targets
- Providing reports for the changes in vulnerabilities and statistical data over a specific period
- Providing an internal report generation function on the target system during portable (offline) inspections
Configuration diagram

Key Advantages
-
User Perspective
- Improving the productivity of persons in charge of security
- Establishing inspection and action processes clarifies the roles of security and system operators
- Enhancing technical capabilities through information sharing
- Providing a user interface that matches individual user permissions via the web
-
Manager Perspective
- Establishing a security vulnerability inspection process that matches the organization's nature
- Setting a continuous monitoring system for the current status of vulnerability management
- Integrated management of various systems
-
Functional Prospective
- No impact on business system operation due to low load operation principle
- Establishing a management system integrated with business systems (Mail, SMS, approval)
- Accumulating action history information to enable history management functionality
-
- Consulting
Checklist reflection-responding industries
(Financial, Public, Military, Business, etc.)
-
- Process
In line with the business system
Example) authorization / mail system including RSM·ESM
-
- Safety
No load on existing business system
-
- Different
Offering a detailed action guide for setting the period exclusion of multiple scheduling
Expected effects
-
Automation system
- Automated daily security inspection system
-
Process improvement
- Collective process improvement via result notification and history management on security inspection
-
Ability improvement
- Responding to security audit and strengthening business ability
-
Stable
security- Stable security management using IT security indexing