TECH INSIGHT Archives | Page 4 of 5 | MONITORAPP

Zero Trust (ZTNA) – An Enhanced Security Strategy Beyond VPN

  Before the advent of Zero Trust, traditional network security models implicitly trusted internal users. Therefore, employees inside the company’s network perimeter and users accessing from outside via VPN, etc. were able to freely access the company’s application. However, this approach was vulnerable to critical threats such as insider collusion, attacks by authorized users, and Read more about Zero Trust (ZTNA) – An Enhanced Security Strategy Beyond VPN[…]

About SASE & AISASE’s Architecture

       MONITORAPP’s deputy director of R&D: Donghan Kim In a world of mobile devices, cloud security has been rising in demand. MONITORAPP develops and provides not only security appliances but solutions through cloud delivery. AISASE platform is built and serviced to enable global delivery of AIONCLOUD, internally developed SECaaS platform. This article will Read more about About SASE & AISASE’s Architecture[…]

Web Breach Incident Analysis and Countermeasures

   MONITORAPP’s Business Division Pilyong Yoon- Deputy Manager Due to smartphones, internet access is now easier than ever and with the internet, the web, shopping, delivery, and banking are easily accessible. However, with this convenience comes the risk of hacking. This article will look at how to analyze web incidents and how to deal with Read more about Web Breach Incident Analysis and Countermeasures[…]

What is Threat Intelligence?

Monitorapp R&D Director Hyunmok Kim Threat Intelligence or CTI(Cyber Threat Intelligence) is an emerging topic when it comes to security threats and responses. In this article, we will discuss the basic concepts, needs, and how to find and respond to threats in two parts. ᅳ       Part1 Concepts, backgrounds, and needs Types of threat intelligence Threat Read more about What is Threat Intelligence?[…]

Security tactics for safe online conferences

Monitorapp Threat analysis Myunghoon Chea With the spread of COVID-19, changes have been happening in society, including work, education, and even social life. As the usage of video meeting programs is increasing in companies and schools, the attempts from cyber attackers targeting vulnerabilities of video meeting programs have been increasing rapidly. Thus, we look at Read more about Security tactics for safe online conferences[…]

Issues of Sequential Search Pattern Matching & Pattern Matching Method for Improve performance

R&D Deputy Director: Seung-il Song To protect internal resources from external attacks, the internet environment utilizes various systems as a security measure. One of the most frequently used methods is called pattern matching. As attacks diversify, the number of patterns to respond to them continues to increase. Such an increase causes a decrease in system Read more about Issues of Sequential Search Pattern Matching & Pattern Matching Method for Improve performance[…]

Machine Learning-Based Information Security Technology

Threat Intelligence Youngjoong Kim | Senior Researcher As cybersecurity threats evolve with more information being available, machine learning-based information security technology, which can proactively predict and respond to emerging cybersecurity threats, is gaining attention. Machine learning gives you the ability to quickly analyze and respond to advanced cybersecurity threats in a security environment that lacks Read more about Machine Learning-Based Information Security Technology[…]

Container Orchestration Part 1

         MONITORAPP R&D Cloud Team Lead: Semin Kwon 2020 is the era of virtualization. With the synergy of cloud market growth, the virtualization market and its technologies are developing more efficiently and conveniently than before. Several big players in the IT market are introducing their industry-leading cloud and virtualization platforms and other Read more about Container Orchestration Part 1[…]

Cloud Era, IT Infrastructure Changes, and Security Services Paradigm Shift

MONITORAPP Overseas Department Simon Kwon From 1995, when the establishment of the internet infrastructure system was booming around the world, the infrastructure environment has changed rapidly.  Many IT infrastructures are being transferred to cloud network environments, and the demand for SaaS is increasing.  This article will introduce the environmental change of IT infrastructure and how Read more about Cloud Era, IT Infrastructure Changes, and Security Services Paradigm Shift[…]

A Guide to a Safer HTTPS Environment

MONITORAPP Product Management Division Senior General Manager: Hocheol Park   The web has become a part of everyday life and can be used anytime, anywhere. However, it is open to the public and popular websites become easy targets because they have the potential to infect many visitors. Typical technical measures to protect the web servers Read more about A Guide to a Safer HTTPS Environment[…]

Scroll Up