본문 바로가기

IPS8

Part 2 (middle level). Leverage network security equipment (firewall UTM next generation firewall) NFV and what happens to firewalls in the cloud environment? Hello, I'm security defender PR. We have unified the basic functions and terminology of firewalls through Part 1 Firewall (UTM). I hope you watch the first episode. Where are your important data? Not the USB. We're security defender. You're on your office NAS? You have a DB server in IDC and you're going to duplicate it with backup? And now you use clouds like Amazon, MS, and KT? This critical i.. 2020. 5. 29.
What about the Anti-DDoS attack? What keeps happening? Hello, I'm security defender PR. Although DDoS attacks seem to have decreased a lot recently, they have not been reported in the media since the '17 Armada Collective' financial DDoS attacks, and DDoS attacks are ongoing.​​ Why are you attacking DDoS today? Are you constantly coming in? We'd like to take some time to learn about what it's used for. What is a DDoS attack? Distributed Denial of Se.. 2020. 5. 29.
How does a security control company detect and defend hacking? (feat.IDS, IPS, NGIPS, SIEM) Hello, I'm security guard PR. There are many security control companies in Korea. Let's look at how multiple security equipment and solutions know and respond to network intrusions. There are a lot of detection solutions, but network security is the most important thing to do ➤ Respond to real-time monitoring and attacks with IDS/IPS + SIEM (ESM). [Real-time Attack Detection Process] 1. Setting .. 2020. 5. 29.
Information Security Specialist's Annual Salary Disclosure!!! Hello, I'm security defender PR. Many companies in Korea need information protection specialists. Just search the job site as 'Information Protection' and you'll see how many information protection professionals companies need. About 10,000 people are working as information protection experts in Korea, but the reality is that they are still lacking a lot. So, what is the most curious annual sala.. 2020. 5. 29.
What does a security expert do? What is security? Services that monitor and respond to customers' IT assets in real time from a security perspective For those of you who dream of becoming a security expert, I'd like to post what security controls are and what specs are needed for this. I have worked at a security control company for 15 years, and I have been both controlling and CERT, and I am currently working on security/net.. 2020. 5. 29.
Do I have to use a security switch? What would be good to have? Internal security is becoming increasingly important as attacks on access networks (ARP Spoofing, zombie PCs, Floating, external C&C communications attempts, etc.) and internal endpoints have recently increased. This is not easy even with an Outgoing policy (internal → external) to detect/block from network security equipment designed to defend incoming attack traffic (UTM, IPS, WAF, etc.). Toda.. 2020. 5. 29.
(Section 2) What is the best way to respond to an Anti-DDoS attack? DDoS attacks are also fashionable. Generation 1 - An attack that avoids analysis and delays tracking by modulating IP, such as SYN, UDP, and ICMP flushing. ◈ SMUP, Ping of death, and Teardop are available, but DDoS-specific equipment or security equipment (UTM, IPS, network equipment ACL) can be blocked. Generation 2 - Activate attack tools with overload attacks ◈ Attack that disables open ports.. 2020. 5. 28.
(Section 1) What is the best way to respond to an Anti-DDoS attack? Hello, I'm security defender PR. DDoS attacks seem to have decreased a lot recently. 'After the 17-year Armada Collective financial DDoS attack, DDoS attacks often come in, but they're not being reported in the media, and DDoS attacks are ongoing. 'In 2017, I provided technical support for Anti-DDoS equipment in KT's Clean Zone service and was busy expanding DDoS equipment capacity. The manufact.. 2020. 5. 28.