Product
Features

Integrated Internet Connection Management Solution
Provides the largest URL DB in Korea
Business Efficiency Solutions
Get visibility into SSL traffic
HTTPS Site Control

SSL Visibility Delivery Solution
TST file port TLS/SSL files
Gain visibility
Configure existing networks with 5-Tuple retention
Interlinkable without change

Next Generation Security Solutions Based on Virtualization
First time in Korea to apply VMI technology
Next Generation Hypervisor Security Solutions
Information protection security solutions for multiple industries

Non-business Site Blocking Solution
Top Public Institution Share, Choice of 1,000 Customers
Korea's largest DB delivery
Non-business/hazardous site control and integrated management
Road-Map and Key Lineups
-
- - Small Scale Network
- - Medium Scale Network
- - Large Scale Network
Network Type Appliance
Internet access control systems are dedicated hardware-integrated equipment that has been tested for performance and
reliability without changing existing network configurations.

SEA-1000
(Total : 1.2Gbps / SSL : 300Mbps)
SEA-1100
(Total : 1.2Gbps / SSL : 600Mbps)
SEA-2000
(Total : 10Gbps / SSL : 2Gbps)
SEA-2100
(Total : 15Gbps / SSL : 4Gbps)
SEA-3000
(Total : 20Gbps / SSL : 6Gbps)
SEA-3100
(Total : 20Gbps / SSL : 10Gbps)
eWalker
SWG V9
Performance
-
- - Differentiated Benefits
- - 상세기능
1 Differentiated Benefits
Malicious code site control
Prevention of security threats such as malicious code
Malicious code pre-detection
Korea's largest DB delivery
Delivering the nation's largest DB of quality
Operate professional search personnel and programs by field
Operation of URL and IP information through DB update
Internet access control
and integrated management
Block access to non-business/hazardous sites and manage integrated
Full traffic monitoring and log support
Provide SSL traffic visibility
Gain full network visibility
Clearing the Security Blind Spot for SSL Traffic
Works with existing
security equipment
Configuring a Decryption Zone for SSL Traffi
Provides decrypted traffic to existing security equipment
Building a Secure Internet Network Environment
Support for various
Rule Base policies
Provides a variety of policy setting environments
Support for blocking, content, exceptions, log policies, etc
2 Advanced Features
-

Decoding
-
Control over encrypted traffic (decryption, blocking, mirroring, logging, etc.)
Block Site bypass access programs
Support for handling decryption exceptions for specific users
5 tuple retention provides cryptographic traffic transparency
Provide private certificates for re-encryption
Support for automatic/manual certificate distribution
Support for installing private certificates through multi-browser
Interworking of other security equipment by converting decrypted traffic to plaintext
Enable user transfer of blocking messages from interlocking equipment
TLS 1.0, TLS 1.1, TLS 1.2, TLS 1.3 및 SSL 3 Encryption을 지원
RSA supports DH-based public key algorithms
Symmetric key support for AES, 3DES, DES, RC4 methods
2048/4096/8192bits RSA keys supported
Supports IPv6 and VLAN tagging (802.1Q)
POP3S, SMTPS, FTPS, IMAPS, HSTS, QUIC을 지원
Support for the above protocols when using any port other than the default port
-

Configuration
and H/W -
Supports equipment redundancy configuration and bypass (including S/W bypass) functionality
LLCF support and successfully switch to backup line in case of failure
Send packets to an inline connected security system even in bypass situations
Equipment power redundancy support
Active (inline) and passive (mirror) configurations with a single appliance
-

Database
-
URL DB List 10 million, default 148+ categories
Support for public key-based license information entry modules to prevent denial of update servers
-

Block
-
Keyword blocking
Block Site bypass access programs
Block Web Mail From and From
Services such as HTS Securities, torrents, messengers, videos, games, web hard, P2P, messenger, remote control, etc., and screening control functions by app
HTTPS Service Screening Control, Google-Gmail, Docs, Drive, and more
Distribution of malicious code and blocking of waypoints
Blocking harmful substances provided by the Korea Communications Standards Commission
Provides country-specific blocking (selective country blocking)
Block exception policy enforcement features
-

Management
and reporting -
Register Client with PC Information Automatically
Set permissions by account, administrator audit function
Account lock function if password fails more than 5 times
Encrypting storage of critical system information
Rule Base Policy
Client-specific exception policy settings
Detailed Report
Support for various types of reporting output including Excel, CSV, PDF, etc
-

Monitoring
-
Real-time monitoring screen allows you to check the status of real-time servers
(Server status: CPU, Memory, HDD usage, network traffic)
Real-time monitoring of full, encrypted, and decrypted traffic
Monitor hardware health and NIC, external equipment interworking mode
.jpg)