Top menu shortcut Go to Body Body Submenu Shortcut Bottom
Solution

SecuMS

Security Vulnerability Diagnosis Solution

As an always-on security vulnerability management solution, SecuMS provides all-time monitoring on the security level inspection by performing automatic system security vulnerability inspections, providing solutions for detected problems, and identifying the current status of servers en bloc.

Main functions

  • Vulnerability inspection

    Vulnerability inspection

    • Meeting domestic and international compliance standards
    • Supporting periodic automatic vulnerability inspection and manual inspection for emergency vulnerability
    • Immediate result verification and registration for management support via portable inspected systems (offline inspections)
    • Supporting user-defined scripts
  • Vulnerability management

    Vulnerability management

    • Providing vulnerability management process
    • Handling action details and result processing for vulnerability lists
    • Offering review and approval functions by upper managers after taking vulnerability actions
    • Supports changing and setting vulnerability ratings
  • Exception management

    Exception management

    • Providing exceptions for specific reasons and periods for vulnerabilities for business or service availability
    • Providing a list of set exceptions
    • Providing a list of items excluded from exceptions after the exception period has passed
  • Reports

    Reports

    • Providing detailed reports on the rating and vulnerability confirmation of inspected systems
    • Daily reports showing the status and detailed information of the entire list of inspection targets
    • Providing reports for the changes in vulnerabilities and statistical data over a specific period
    • Providing an internal report generation function on the target system during portable (offline) inspections

Configuration diagram

SecuMS Configuration diagram

Key Advantages

  • User Perspective

    User Perspective
    • Improving the productivity of persons in charge of security
    • Establishing inspection and action processes clarifies the roles of security and system operators
    • Enhancing technical capabilities through information sharing
    • Providing a user interface that matches individual user permissions via the web
  • Manager Perspective

    SecuMS Key Advantages Manager Perspectiv
    • Establishing a security vulnerability inspection process that matches the organization's nature
    • Setting a continuous monitoring system for the current status of vulnerability management
    • Integrated management of various systems
  • Functional Prospective

    SecuMS Key Advantages Functional Prospective
    • No impact on business system operation due to low load operation principle
    • Establishing a management system integrated with business systems (Mail, SMS, approval)
    • Accumulating action history information to enable history management functionality
  • SecuMS Key Advantages Consulting
    Consulting

    Checklist reflection-responding industries
    (Financial, Public, Military, Business, etc.)

  • SecuMS Key Advantages Process
    Process

    In line with the business system
    Example) authorization / mail system including RSM·ESM

  • SecuMS Key Advantages Safety
    Safety

    No load on existing business system

  • SecuMS Key Advantages Different
    Different

    Offering a detailed action guide for setting the period exclusion of multiple scheduling

Expected effects

  • SecuMS Expected effects Automation system
    Automation system
    • Automated daily security inspection system
  • SecuMS Expected effects Process Improvement
    Process improvement
    • Collective process improvement via result notification and history management on security inspection
  • SecuMS Expected effects Ability improvement
    Ability improvement
    • Responding to security audit and strengthening business ability
  • SecuMS Expected effects Stable security
    Stable
    security
    • Stable security management using IT security indexing