Directory · KR
Computer and Network Security in South Korea
A register of firms and the professionals working at them in the Computer and Network Security sector based in South Korea. Browse the public index, then filter or export on Kipplo.
Companies
76 on file
Turingsign
TuringSign Global SA is a Swiss-based, globally operating Trust Service Provider. Dedicated to advancing global digital security, we build upon a legacy rooted in trust and innovation. We specialize in delivering state-of-the-art SSL certificate services that empower businesses and individuals to navigate the digital world securely.
11 to 50 staff
Cremit
Cremit is addressing the increasingly critical challenge of non-human identity (NHI) security within modern enterprises. As digital infrastructures expand and become more complex, the management and security of non-human identities—ranging from API keys and secrets to tokens and service accounts—have emerged as a pivotal yet often neglected aspect of cybersecurity. Recognizing this gap, Cremit provides an enterprise platform dedicated to the comprehensive protection and management of these critical non-human identities. Cremit's solution is designed to fortify the digital backbone of enterprises, ensuring a secure, resilient, and trustworthy environment for their operations. With Cremit, organizations can enhance their security posture and streamline operations across their complex non-human identity landscape.
1 to 10 staff
Stealth Solution
Stealth Solutions protects businesses and organizations from various network attacks through its new proactive network defense technology. By segmenting and reducing the network's exposed attack surface, Stealth Solutions maximizes the complexity of network attacks, enabling network-connected assets to defend themselves. This introduces a new paradigm in security. Stealth Solutions offers robust network protection by blocking threats via the network and providing zero-trust security through its patented Network Moving Target Defense technology.
11 to 50 staff
Urock Inc
Digital Forensics, Incident Response, Internal Audit, R&D, Data Eraser/Wiper
11 to 50 staff
Feather It Inc
Beyond Limits.
1 to 10 staff
Businessh4c B4c
11 to 50 staff
National Security Research Institute
1001 to 5000 staff
Oasis Security
‘(agatha)’ ‘(arthur)’.
1 to 10 staff
Hayyim Security
11 to 50 staff
Sysmate
Sysmate began as a Korea-based high technology startup company that specialized in providing wired communication network appliances products until middle of decade. From 2006, we have concentrated our experienced capabilities on Deep Packet Inspection (DPI). Now, our DPI solution is the open and scalable deployment of networks and carries to improve the high qualified network service. InterStream® DPI functions of identify and classify contents in the explosion of traffic environment and runs on the various range of processing applications such as network traffic monitoring, network security, Data Loss Prevention(DLP) and so on. Our high performance network adapter, called as InterStream® NA, allows 100% network traffic to be captured, scrutinized and analyzed, while resulting in ignorable host CPU slowdown. We are now on the prominent position in our domestic market and continuously exploit overseas markets. In this year we forecast our sales 12 million US dollars and will raise our product sales over 30 million US dollars in 2015. We always press on developing innovative solutions and pursue challenging tasks that give us opportunity to work on the edge of capabilities. Our vision is becoming one of worldwide leading companies in DPI packet processing field and we will maintain our efforts to enhance customer value as we drive more higher efficiency and world-leading product quality to meet increasing market demand.
11 to 50 staff
Norma Inc
Norma Inc, established in 2011, is a leader in the wireless network & IoT security field that benefits businesses and people around the world. To secure wireless local area network and Bluetooth devices, Norma provides a combination of solutions and consulting services. With expertise and technologies, Norma has been associated with many projects and also cooperated with global partners. Norma extends its business to various smart industry and brings technological innovation to empower people, business and society. For more information, visit Norma at
11 to 50 staff
Ahnlab, Inc
Founded in 1995, AhnLab, Inc, the global cybersecurity company, delivers comprehensive protection for endpoints, networks, transactions, and essential services. AhnLab delivers best-of-breed threat prevention that scales easily for high-speed networks by combining cloud analysis with endpoint and server resources. AhnLab's multidimensional approach combines with exceptional service to create truly global protection against attacks that evade traditional security defenses. That’s why more than organizations rely on AhnLab’s award-winning products and services to make the internet safe and reliable for their business operations.
1001 to 5000 staff
Pnpsecure
We Secure the Core. PNPSECURE helps protect critical IT infrastructure with integrated access control and identity management solutions. From Korea’s No.1 DBSAFER, to our all-in-one platform Unified-IAM, and Zero Trust facial authentication with FaceLocker — we’re building smarter, sustainable security. Since 2003, we've supported over customers across finance, government, and enterprise. Industry: IT & Services Founded: 2003 HQ: Seoul, South Korea Key Products: DBSAFER, Unified-IAM, FaceLocker, INFOSAFER Website:
201 to 500 staff
D'cent Wallet
Founded by IoTrust in 2018, D’CENT is a secure and user-friendly crypto wallet platform offering both hardware and mobile app wallet to help people manage, grow, and use digital assets with confidence. We introduced the world’s first biometric hardware wallet, combining Secure Element (SE) and Trusted Execution Environment (TEE) technologies for bank-grade protection. Today, D’CENT offers both hardware and card wallets, along with a powerful mobile app that makes it easy to track portfolios, swap tokens, buy crypto, and access Web3 services, all in one place. Trusted in over 220 countries, D’CENT makes self-custody simple and secure, whether you're new to crypto or a seasoned Web3 user.
11 to 50 staff
3rdeyesystem
3RDEYESYSTEM is a top-tier information technology infrastructure company, founded by engineers with backgrounds in game development and streaming broadcasting. With 9 years of experience, we specialize in providing CLOUD Consulting, CLOUD Managed Service, and Migration services as a premium partner of NAVER CLOUD.
1 to 10 staff
Cluml
AI can evolve. Clumit Security AI, Clumit Security.
11 to 50 staff
Joe Black Security
The bad guys are getting smarter and more and more money is being poured into illicit ventures that effect numerous companies across the globe everyday. Reacting to these threats is simply no longer an option. Your organization is too valuable to take the chance of becoming the next Sony or Adobe breach. An aggressive and proactive approach is needed, which not only checks your organization's security posture, but also tests its people, procedures, policies, and products against real world attacks. From Standard Pentests to Code review, RedTeams to BlackTeams, we do it all. Let us show you where you're vulnerable before the bad guys do. We will also show you how to fix it and how to prevent it from happening again in the future. Because really, how much damage can one person do? Care to find out?
1 to 10 staff
Softfreak
i-SeMOS v3.0’, API, ‘’.
11 to 50 staff
Somma, Inc
We are developing highly optimized real-time event collection agent and cloud-based analysis services for threat hunting. Contect Us : support@somma.kr
11 to 50 staff
Ahope
The development of ICT(Information and Communication Technologies) has driven the growth and development of IT services industry. Industrial environment has gradually transformed to be based on mobile device, therefore, has been dependent on mobile platform. As a result, multiple vulnerabilities and attacks on mobile platform has increased. It is now inevitable requirement to protect client’s private data from various security risks. We’ve continuously provided various solutions, such as mobile platform protection, framework of a secure corporate network, and security consulting (penetration test) in order to help customers fulfill these obligations. We will do our best to provide a secure business environment as a mobile network security expert group. Our work area is as follow: • Cryptography and PKI systems development, network-related security system development • Security and system development for mobile platforms • Distributed processing-based system integration business
11 to 50 staff
Aj2 Co., Ltd
AJ2 & J2C provides iris recognition devices, optical components, and software.
1 to 10 staff
Axgate
We are always thinking and striving for Network Security. Provide 'Reasonable cost with high quality' Network Security solutions.
51 to 200 staff
Coontec
COONTEC provides security solutions and consulting to respond to evolving cybersecurity threats to completely prevent malicious attacks from occurring. COONTEC's security solutions, consulting, training, and other security services can be applied to virtualization for embedded software development and validation, multi-platform binary verification, ICS/OT security monitoring, open-source integration management, cyber-deception-based APT response, encryption key and application security, malware collection and analytics. COONTEC also builds a portfolio of data science across data collection, processing, machine learning, analysis, and sharing based on an AI-based integrated management platform and an all-in-one data survey platform for systematic data analysis and utilization.
51 to 200 staff
Patikle Inc
PATIKLE inc. is a leader in personal security and finance data analysis for consumer, industrial, and government markets.
1 to 10 staff