SlideShare a Scribd company logo
1 of 47
Download to read offline
netand.info
How to Manage IT Infrastructure for Remote
Access in the Age of COVID-19
AP Webinar
Copyright NETAND Co., Ltd. All rights reserved.
Contents
HIWARE, an integrated IAM solution which has adopted the latest technologies such as artificial intelligence and cloud,
is the flagship product of NETAND that has developed various solutions with the best technology.
01
02
03
04
Company Introduction
Solution Overview
Product Introduction
Reference
1. Company Overview
2. Profit History
3. HIWARE History
4. Marketing Vision
1. Company Introduction
Copyright NETAND Co., Ltd. All rights reserved. 4 47
A Complete IAM(Identity and Access Management) Solution
specialized in Asia Security Standard.
Company Overview01
HQ and R&D center in Seoul, Korea
R&D center in Silicon Valley , USA
13Years
Experiences
121
Employees
1
In Korea
`1200+
Customers
Platform & Service provider for
Infrastructure Security management
Number
Copyright NETAND Co., Ltd. All rights reserved. 5 47
Company Overview01
85%
RnD
RnD
Consulting
Customers
Partners
Sales
Marketing
HQ and R&D
Seoul, Korea
R&D center in
Silicon Valley, USA
Knowledge Data
Customer Experience
Customer Needs
Tech-people
Copyright NETAND Co., Ltd. All rights reserved. 6 47
Profit History02
Revenue Net Profit
8.23%
3 years Average
8.23%
Average net
Profit for
Last 3 years
9.09%
FY 2018’
Net Profit
No. 1
In Korea
45%
6 years CAGR
(million$)USD1$=KRW1,100Won
45%
6 years CAGR
Proven of Growth and Profitability
Copyright NETAND Co., Ltd. All rights reserved. 7 47
Profit History02
License Maintenance Cloud
Cloud Service opened end of 2017’
Total: 40 customers
(million$)USD1$=KRW1,100Won
Revenue model is on premise solution, License fee and Maintenance fee
Cloud service started from end of 2017
Copyright NETAND Co., Ltd. All rights reserved.
Consistent Growth and Development
8 47
HIWARE History03
2007 Started 2009 2011
Access Management ver.1.0 Access Management ver.2.0 Identity Management ver.1.0
2012 Total IAM 2013 Entered Global 2014
Total IAM platform ver.1.0
- HIWARE 4.0
Oracle Open World San Francisco
Oracle Open World Shanghai
China Xian Samsung
HIWARE 5.0
Hyundai Motors Turkey and India
China Suzhou Samsung
2015 Southeastern Market 2016 R&D center in US
Southeast Asia Market
INT’L SOFT CHINA
Global Security Philippines Expo
Philippines Smart Communications
R&D Center in U.S
ACLEDA BANK Cambodia and Laos
Hyundai Motors Mexico
2017 Cloud Service 2018 HIWARE 6.0 for Global
Acquired 2 Patents
AWS open
HIWARE 6.0 (Global)
Acquired 3 Patents
CDIC 2018 in Thailand
PT.IONPAY Networks Indonesia
1. Background
2. Concept of IAM
3. AS-IS & TO-BE
2. Solution Overview
Copyright NETAND Co., Ltd. All rights reserved. 10 47
Security Threats in the age of COVID-19
As recently various security threats by COVID-19, the demand of telecommuting has been increasing.
As a result, it would lead for malicious users illegally to access corporate infra assets from a vulnerable remote environment.
Background01
The indicator of searching of ‘Remote Work’
SK Infosec EQST, 2020
Google Trends, 2020
9.7%
Year
2020
2019
JAN FEB MAR ¼ Average
The indicator of searching of ‘Remote Work’
Statistics of cyber attacks
Statistics of cyber attacks
Copyright NETAND Co., Ltd. All rights reserved. 11 47
Security Threats in the age of COVID-19
As recently various security threats by COVID-19, the demand of telecommuting has been increasing.
As a result, it would lead for malicious users illegally to access corporate infra assets from a vulnerable remote environment.
Background01
Examples - Information Security Incident
Insufficient use of remote working system (VPN)
Incomplete management of account and access permission for
telecommuters
No remote access monitoring
Insufficient environment for session block when the user is
absent
Impossible detection for access & work history by users
Incident
From home office
Difficulty in analyzing causes of security incidents and
slow recovery to normal operation
Copyright NETAND Co., Ltd. All rights reserved.
What is identity?
Concept of IAM02
User
SAM FILE
SAM FILE
SAM FILE
SAM FILE
Linux Server
Windows Server
AIX Server
HP Server
12 47
Copyright NETAND Co., Ltd. All rights reserved.
02 Concept of IAM
Linux Server
Windows Server
AIX Server
HP Server
Integrated ID
Database
Identity Management
Solution
User
13 47
What is identity?
Copyright NETAND Co., Ltd. All rights reserved.
02 Concept of IAM
Integrated ID
Database
AM 이미지
Identity Management
Solution
Access Management
Solution
ID/PW
Linux Server
Windows Server
AIX Server
HP Server
User
14 47
What is authentication?
Copyright NETAND Co., Ltd. All rights reserved.
02 Concept of IAM
Integrated ID
Database
AM 이미지
Identity Management
Solution
Privileged Access
Management Solution
ID/PW OTP
Linux Server
Windows Server
AIX Server
HP Server
User
IP/MAC
15 47
What is advanced authentication?
Copyright NETAND Co., Ltd. All rights reserved.
02
Manager
Developer
Illegal User
ID/PW
ID/PW
Linux Server
Windows Server
AIX Server
HP Server
Integrated ID
Database
OTP
OTP
IP/MAC
IP/MAC
Identity Management
Solution
Privileged Access
Management Solution
Concept of IAM
16 47
How to enhance security in IT infrastructure?
Copyright NETAND Co., Ltd. All rights reserved.
03 AS-IS & TO-BE
AS-IS
Windows Network
Security
devices
Unix/
Linux
Oracle
Ms-sql
Mysql
Windows
Windows
AD
ID/PWD
authentication
ID/PWD
authentication
System operators from most of customers are accessing target equipment
with basic authentication only. Passwords are also incompletely managed.
The current situation can lead to control the access and behavior of illegal
users insufficiently.
Administrator
Users
Outsourced
users
Retired
users
17 47
Copyright NETAND Co., Ltd. All rights reserved.
03 AS-IS & TO-BE
Approval server
OTP server
SMS server
HR DB
DR server
ID/PW
IP/MAC
Two
factor
External
RDP | Telnet | SSH | FTP | SFTP
Identity &AccessManagement
Windows
N/W
devices
Security
devices
Unix/
Linux
Oracle
Ms-sql
Mysql
AD
Windows
Windows
Manage ID life-cycle
Detect
Unauthorized ID
Manage password
automatically
Create
System ID
TO-BE
HIWARE is integrated IAM solution to control access to target equipment
by users and to manage ID lifecycle in operation. By HIWARE,
unauthorized users will be blocked and unclear ID can be dealt with
processing policy under ID policy. By interworking other system, work
process can be more efficient and secured.
Administrator
Users
Outsourced
users
Retired
users
Block
18 47
Copyright NETAND Co., Ltd. All rights reserved. 19 47
Success
Case
Success Case04
1000
In this case, both DBMS Privileged Access management solution and identity management solution are established together and they are integrated with
diverse authentication DBMS to strengthen security and improve stability through dualization of gateways. Also, the solutions are integrated with the client’s
existing in-house DBMSs such as HR DBMS, approval DBMS, and the server for managing automation to implement a single interface and enhance
convenience of use and efficiency at work at the same time.
User Target
device
User No. of Equipment Server 1500 / N/W 12000 / DB 500
Functionality
- IP / MAC authentication
- SMS OTP double authentication
- History management of major query
- Users’ Access authority control by DBMS account
- Controlling authorities over SU login to public
accounts based on the policy of personal account
- NT account management through AD account
management
- Simultaneous management of NT local accounts
- Manual password change of the person responsible
for public accounts
- Randomly changing root accounts at once
- Using one time passwords for root accounts
- Manual change of personal accounts
- Locking inactive accounts
- Locking ghost/broken accounts
- Locking and deleting Retired employees’ accounts
- server security configuration (Red Castle)
- NT server : Applying local security policies (IP-SEC)
Access
control
interworking
GATEWAY
HA configuration
Administrator
Users
Partners
WINDOWS server
LINUX/UNIX server
network
DR server
Gateway #1
Gateway #2
DBMS #1
DBMS #2
E-mail server SMS server AD
server
Approval
DBMS
H.R DBMS
Category
Policy of user
authentication
query control
Management
of
personal/publi
c accounts
NT account
management
Password
management
Management
of illegal
accounts
Blocking
Access
through
bypassing
AD
IP/MAC
SMS
OTP
Authentication
DBMS GATEWAY
Oracle,
Ms-sql,
MariaDB
VPN Client
VPN Client
VPN Client
VPN Client
Customer
1. Product Line-up
2. Solution Strength
3. IAM for System
4. IAM for DB
5. IM for AD
3. Product Introduction
Copyright NETAND Co., Ltd. All rights reserved. 21 47
NETAND., Ltd. of the top-tier technology and variety of experience supplies HIWARE, a package of integrated Identity and Access
Management(IAM) which consists of seven products managing security of IT infrastructure and systems of companies and institutions.
02
1. HIWARE PrivilegedAccess Management for System v6.0
2. HIWARE Identity Management for System v6.0
3. HIWARE PrivilegedAccess Management for Database v6.0
4. HIWARE Identity Management for Database v6.0
5. HIWARE Identity Management for Active Directory v6.0
6. HIWARE Mobile One Time Password v6.0
7. HIWARE ThreatAnalytics v6.0
StandardScalable
Product Line-up
Copyright NETAND Co., Ltd. All rights reserved. 22 47
Making work environment smarter and more stable
Solutions have to change, following rapidly changing business environment and IT infrastructure. HIWARE is the next Access control solution
which perfectly supports not only users’ work environment but also diverse IT infrastructure such as cloud and network segmentation.
Create a smart work environment in a rapidly changing IT environment under security threat without concerns about security.
03
User Environment
Cross browsing Multi-languages
Windows / MAC IPv6
Infrastructure
Network segmentation
Cloud environment
Work Internet
Auto-scaling, Processing Tag
Solution Strength
Copyright NETAND Co., Ltd. All rights reserved. 23 47
HIWARE is integrated IAM solution to control access to target
equipment by users and to manage ID lifecycle in operation. By
HIWARE, unauthorized users will be blocked and unclear ID can
be dealt with processing policy under ID policy. By interworking
other system, work process can be more efficient and secured.
04
HIWARE Identity Access Management for System v6.0
IAM for System Identity & Access Management for System
Access
Management Access
management
Session
Management
Command
Control
Logaudit
Basic
Multi-factor
Integration
ID/PW, IP/MAC, MOBILE OTP
SMS, OTP, Smart-card, RADIUS
LDAP *Provide API for integration
Authentication
Management
Identity
Management Life-Cycle
Management
Password
Management
Accountpolicy
Management
Detect
illegalaccount
Inter
work
Block
Administrator
Staff
Outsource
Retiredstaff
WINDOWS
server
UNIX/LINUX
server
Network
Security devices
Approval server
OTP server
SMS server
HR DB
DR server
ID/PW
IP/MAC
Two
factor
External
RBAC
Identity & Access Management Solution
RDP | Telnet | SSH | FTP | SFTP
Authority
Access
Identity
Access
Management
Identity
Management
Copyright NETAND Co., Ltd. All rights reserved.
ID/PW login
24 47
Unifying access channel
API for integrating diverse
authentication
IP/MAC address authentication
Optional additional OTP
authentication
Supporting combination of
diverse authentication types
(RSA, accredited certificate,
LDAP, etc.)
Login
2 Factor Authentication
basic
Two-factor
external
ID/PW, IP/MAC, MOBILE OTP
SMS, OTP, SSO, Smart card, RADIUS, PKI, biometrics, etc.
LDAP, etc.
*Providing api for integration
Mobile Authentication v1.0
Clientscansavethecosttoestablishasecuritysolutionsinceweprovide amobile
OTPproduct thatwedeveloped byourselves
Retired
employee
H.RDB
A user tries to
access
Retired employee’s try to
access
Integration with H.R DB
Impossible to access automatically after
retired company/ notifying the threat
IP/MAC
authentication
2 factor
authentication
Automatic login to
equipment
IAM for System04
Enhance user authentication
- Support Android/IOS - Support off-line environment
Retired
employee
management
Administrator
Retired
employee
Block Notify
Identity & Access Management for System
User
server#1
server#2
Copyright NETAND Co., Ltd. All rights reserved.
Equipment
25 47
04
Auto
Login
Auto
Login
User
FARM #1
FARM #2
FARM#1 User
FARM#2 User
Access authority control by
user
Stronger authentication (Two
Factor)
Access time control
Automatic login to system
Feature to Access by network
Support IPv6
IAM for System
System Access authority control
Basic
authentication
Two-factor
authentication
Basic
authentication
Two-factor
authentication
Identity & Access Management for System
User’ Equipment Tree Auto Login
Copyright NETAND Co., Ltd. All rights reserved. 26 47
System command control
IAM for System04
Inputting
command
prohibited command
Processing depending on command policies
Warning Massage
Not accept
command
Block if many times of
attempts to input
Notification
Access for
approval
Filling request
form
Request
approval
Administrator’s
approval
Using the command
within a period
The command is
executed.
Worker
Permitted
commands
Important
commands
Prohibited
command
Exceptions
Risky
user
Equipment
Prevent
User’s mistake
Permitted
command
Important
command
Immediately
accepted
Warning!
Bad Command!
Access Denied Administrator
Command control
(permitted/prohibited)
Monitoring/blocking
/notification of commands
Requesting approval of
important commands
Exception commands by
period
Block risky command
Command usage history
Confirmation text Accepted
User
Time
Device
Command Administrator
Possible to use
the requested
command
Identity & Access Management for System
Copyright NETAND Co., Ltd. All rights reserved. 27 47
Real-time session monitoring / control
IAM for System04
Real-time session statistics
Real-time event monitoring
Real-time session monitoring
Real-time Access monitoring
Event monitoring
Forced block user session
Real-time dashboard
Session timeout
Identity & Access Management for System
Copyright NETAND Co., Ltd. All rights reserved.
Monitoring all events after access
28 47
System log / audit
IAM for System04 Identity & Access Management for System
Logging
Auditing
Detailed history managementLogging audit information
Provide various search
filters
Access history by user
Change history by device
Usage history by
command
History of work details
Auditing variety of work details
Logging audit
information
Searching
diverse history
Logging information of
auditing work details
Diverse statistics and audit
reports
Store compressed
system logs
Various search filters
Statistics by user/
device/command
Provide saving options by
time/event
[TEXT audit] Displaying texts by
command
[Video audit] Displaying video by
command
[Dashboard] Multivariate statistics
Auditing work details in real time
device
Working
user
Copyright NETAND Co., Ltd. All rights reserved.
Automatic collection/
synchronization of accounts
29 47
ID life-cycle policy management
IAM for System04
Provisioning management
(create/change/delete)
Suspension in Implementing
policies
Handling accounts at once
Personal setting
(password / unlock)
Requesting a new
account
Providing solutions to
normalize accounts depending
on their status
Tracking down change history
by account
Limited approval
Creating/ using the
account
Setting up account
policies
Policy-based automatic
account management
Management of account modification / password
change
Monitoring Retired employees’
accounts / illegal accounts
Automatically finding/deleting /
notifying Retired employees’/
illegal accounts
Worker
Automatic
provisioning
AUTO
delete notify
Retired
employee
Equipment#1
Account takeback / Deletion Change account / password
Account creation Policy management
Administrator
Administrator Administrator
PW change
Usage period
Usage authority
Identity & Access Management for System
Equipment#2
Copyright NETAND Co., Ltd. All rights reserved.
Password complexity
management
30 47
Password policy management
IAM for System04
Management of password
change frequency
Automatic/manual/random
change of passwords
Password management report
Password change history
management
Managementof risky passwords
of privilegedaccounts
Collectingand verifying
passwordsecurity policies by
system
Setting up
password policies
Automatic change of passwords
based on policies
Automatic provisioning
of accounts
Reporting change
history
Efficiency
in managing passwords
Security of passwords Password management
report
Administrator Administrator
Automatic change
Automatically changing on a
scheduled date
Manual change
Directly changing by booking
change on a certain date
Bulk change
Changing all passwords at
once
One time password
Using one time passwords
Random change of
passwords
Randomly changing by
setting up complexity
Setting up complexity
of passwords
Numbers, capital letters,
special characters, etc.
Password management
report
(The report that passwords can
be viewed)
Password change
history
Password change history
report
History of viewing
passwords
Report on the history of
viewing passwords
Identity & Access Management for System
Copyright NETAND Co., Ltd. All rights reserved. 31 47
HIWARE is integrated IAM solution to control access to target
equipment by users and to manage ID lifecycle in operation. By
HIWARE, unauthorized users will be blocked and unclear ID can
be dealt with processing policy under ID policy. By interworking
other system, work process can be more efficient and secured.
05
HIWARE Identity Access Management for DBMS v6.0
IAM for DBMS Identity & Access Management for DBMS
DR server
Foreign
HR DB SMS server
OTP server
Approval server
Administrator
Staff
Outsource
Retired staff
Block
ID/PW
IP/MAC
Two
factor
Inter
work
Access
Management
Identity
management
RBAC
DB Connector
Authority
Access
Account
MySQL
MS-SQL
Oracle
Access
Management Access
management
Session
Management
Query
Control
Logaudit
Basic
Multi-factor
Integration
ID/PW, IP/MAC, MOBILE OTP
SMS, OTP, Smart-card, RADIUS
LDAP *Provide API for integration
Authentication
Management
Identity
Management Life-Cycle
Management
Password
Management
Accountpolicy
Management
Detect
illegalaccount
Identity &AccessManagement
Copyright NETAND Co., Ltd. All rights reserved.
DBMS
32 47
05
DBA
Administrator
Oracle
MS-SQL
Oracle DBA
MS-SQL DBA
Access authority control by
user
Reinforce authentication (Two
Factor)
Access time control
IAM for DBMS
DBMS Access authority control
Basic
authentication
Two-factor
authentication
Basic
authentication
Two-factor
authentication
Identity & Access Management for DBMS
User’ Equipment Tree
Copyright NETAND Co., Ltd. All rights reserved. 33 47
DBMS query control
IAM for DBMS05
Inputting a query
Inputting a prohibited
query
Processing depending on query policies
Warning Massage
The query is not
accepted.
Blocked if N times of
attempts to input are made
Notification to an
administrator
Access for
approval
Filling in
a request form
Requesting
approval
Administrator’s
approval
Using the query
within a period
The query is
executed.
Worker
Permitted
query
Prohibited
query
Exceptions
suspect
user
Preventing
a security incident
caused by a user’s
mistake
Permitted
query Immediately
accepted
Warning!
Bad query!
Access Denied Administrator
query control
(permitted/prohibited)
Managing monitoring/
blocking/notification of query
Requesting approval of
important query
Managing query usage history
User
Time
DBMS
query Administrator
Possible to use
the requested
query
Identity & Access Management for DBMS
DBMS
Copyright NETAND Co., Ltd. All rights reserved. 34 47
IAM for DBMS05 Identity & Access Management for DBMS
Privileged Access Management for DBMS
5
1
4
2
3
Control large volume data
Control data inquiry number
Masking sensitive data
Notification to administrator
Control result data(1/2)
Copyright NETAND Co., Ltd. All rights reserved. 35 47
IAM for DBMS05 Identity & Access Management for DBMS
Passport_number name Passport_number
User1
User2
User3
…
Privileged Access Management for DBMS
Control result data(2/2)
Copyright NETAND Co., Ltd. All rights reserved. 36 47
IAM for DBMS05 Identity & Access Management for DBMS
Control DB tool
DBMSDBA
Administrator
DBMS #1
DBMS #2
Oracle DBA
MS-SQL DBA
Control DB tool to use
Prevent using DB tool that
have license
Notification to administrator
Basic
authentication
Two-factor
authentication
Basic
authentication
Two-factor
authentication
Copyright NETAND Co., Ltd. All rights reserved.
Monitoring all events after Access
37 47
DBMS log / audit
IAM for DBMS05 Identity & Access Management for DBMS
Logging
Auditing
Detailed history management
Logging audit information
of work details
Providing various search
filters
Access history by user
Change history by DBMS
Usage history by query
History of work details
Auditing variety of work details
Logging audit
information
Searching
diverse history
Logging information of
auditing work details
Diverse statistics and audit
reports
Various search filters
Statistics by user/
DBMS/query
Inquiry query result
Auditing work details in real time
DBMS
Working
user
[Audit Log]
Confirming access and query log
[Dashboard] Multivariate statistics
Copyright NETAND Co., Ltd. All rights reserved.
Automatic collection/
synchronization of accounts
38 47
ID life-cycle policy management
IAM for DBMS05
Provisioning management
(create/change/delete)
Suspension in Implementing
policies
Handling accounts at once
Personal setting
(password / unlock)
Requesting a new
account
Providing solutions to
normalize accounts depending
on their status
Tracking down change history
by account
Limited approval
Creating/ using the
account
Setting up account
policies
Policy-based automatic
account management
Management of account modification / password
change
Monitoring retired employees’
accounts / illegal accounts
Automatically locking /deleting /
notifying retired employees’/
illegal accounts
Worker
Automatic
provisioning
AUTO
delete notify
Retired
employee
Account takeback / Deletion Change account / password
Account creation Policy management
Administrator
Administrator Administrator
PW change
Usage period
Usage authority
Identity & Access Management for DBMS
DBMS#1
DBMS#2
Copyright NETAND Co., Ltd. All rights reserved.
Password complexity
management
39 47
Password policy management
IAM for DBMS05
Management of password
change frequency
Automatic/manual/random
change of passwords
Password management report
Password change history
management
Setting up
password policies
Automatic change of passwords
based on policies
Automatic provisioning
of accounts
Reporting change
history
Efficiency
in managing passwords
Security of passwords Password management
report
Administrator Administrator
Automatic change
Automatically changing on a
scheduled date
Manual change
Directly changing by booking
change on a certain date
Bulk change
Changing all passwords at
once
Random change of
passwords
Randomly changing by
setting up complexity
Setting up complexity
of passwords
Numbers, capital letters,
special characters, etc.
Password management
report
(The report that passwords can
be viewed)
Password change
history
Password change history
report
History of access
passwords
Report on the history of
viewing passwords
Identity & Access Management for DBMS
Copyright NETAND Co., Ltd. All rights reserved. 40 47
HIWARE Identity Management for Active Directory v6.0
HIWARE Identity Management for AD collects accounts
from multiple domains and automatically manages
account life cycle and passwords from creation to
deletion according to policy.
IM forAD06
Block
Administrator
Employee
Partner
Retired
Approval server
OTP server
SNS server
HR DB
DR server
Password
Auto-management
Create Account
Account Life-cycle
Management
Windows
server
Windows
server
AD
Domain#1
AD
Domain#2
Identity Management forActiveDirectory
Unauthorized account
Detection
Provisioning
Collect
Accounts
Audit
Report
Policy
Setting
Multiple
Authentication
interworking
Identity Management for AD
Basic
Multi-factor
Integration
ID/PW, IP/MAC, MOBILE OTP
SMS, OTP, Smart-card, RADIUS
LDAP *Provide API for integration
Authentication
Management
Identity
Management Life-Cycle
Management
Password
Management
Accountpolicy
Management
Detect
illegalaccount
Copyright NETAND Co., Ltd. All rights reserved. 41 47
IM forAD06 Identity Management for AD
ID life-cycle policy management
Worker
Automatic
provisioning
AUTO
delete notify
Retired
employee
Collecting / deleting accounts Account/password change
Account creation Policy management
Administrator
Administrator Administrator
PW change
Usage period
Usage authority
Domain#1
Domain#2
Provisioning management
(Create/Modify/Delete)
Bulk processing
Self-Service
(Password/ Release locked)
Detecting the change
history of accounts
Manual/automatic accounts
collection/synchronization
Requesting a new
account
Authorization
processes
Creating using the
account
Setting up account
policies
Policy-based automatic
Account management
Management of account modification / password
change
Monitoring Retired employees’
accounts / Misuse accounts
Automatically locking / notifying
Retired employees’ unauthorized
accounts
Copyright NETAND Co., Ltd. All rights reserved. 42 47
IM forAD06 Identity Management for AD
Password complexity
management
Password policy management
Management of password
change frequency
Automatic/manual/random
change of passwords
Password management
report
Password change history
management
Setting up
password policies
Automatic change of passwords based on
policies
provisioning of
accounts
Reporting change
history
Administrator Administrator
Automatic change
Automatically changing on
a scheduled date
Efficiency
in managing passwords
Security of passwords
Password management
report
Manual change
Changing the password
by scheduling a change date
Bulk change
Changing all passwords at
once
Setting up complexity
of passwords
Numbers, capital letters,
special characters, etc.
Password management
report
(The report that passwords
can be viewed)
Password change history
Password change history
report
History of access
passwords
Report on the history of
viewing passwords
1. In Domestic market
2. In Overseas market
4. Reference
Copyright NETAND Co., Ltd. All rights reserved. 44 47
Domestic market01
Reference in domestic market
Copyright NETAND Co., Ltd. All rights reserved. 45 47
Domestic market01
중앙연구원 울진원자력본부
Reference in domestic market
Copyright NETAND Co., Ltd. All rights reserved. 46 47
Overseas market02
USA
Branch office in USA
R&D Center
Mexico
Hyundai- Kia Motors
Turkey
Hyundai- Kia Motors
Korea
Head office in KOREA
R&D Center
China
Samsung Electronics
SK Hynix
Hyundai- Kia Motors
Vietnam
Shinhan Bank
NICE INFO VIETNAM
Philippines
Smart Communications
BPI bank
1,200+ customers in global market
India
Hyundai- Kia Motors
Laos
ACLEDA BANK
Cambodia
ACLEDA BANK
Indonesia
PT.IONPAY Networks
Reference in overseas market
Copyright NETAND Co., Ltd. All rights reserved. www.netand.info / Tel : +82-(0)2-2661-1410
Thank you
How to Manage IT Infrastructure for Remote Access in the Age of COVID-19

More Related Content

What's hot

PowerShell and Azure DevOps
PowerShell and Azure DevOpsPowerShell and Azure DevOps
PowerShell and Azure DevOpsMatteo Emili
 
Hap 2 nd presentation1
Hap 2 nd presentation1Hap 2 nd presentation1
Hap 2 nd presentation1Yogesh kumar
 
Terraform Introduction
Terraform IntroductionTerraform Introduction
Terraform Introductionsoniasnowfrog
 
Acids, Bases and Salts (Chemistry 'O' level)
Acids, Bases and Salts (Chemistry 'O' level)Acids, Bases and Salts (Chemistry 'O' level)
Acids, Bases and Salts (Chemistry 'O' level)Faiz Abdullah
 
Introduction of pharmaceutical analysis and their scope
Introduction of pharmaceutical analysis and their scopeIntroduction of pharmaceutical analysis and their scope
Introduction of pharmaceutical analysis and their scoperamtripathi16
 
Terraform Best Practices - DevOps Unicorns 2019
Terraform Best Practices - DevOps Unicorns 2019Terraform Best Practices - DevOps Unicorns 2019
Terraform Best Practices - DevOps Unicorns 2019Anton Babenko
 

What's hot (7)

PowerShell and Azure DevOps
PowerShell and Azure DevOpsPowerShell and Azure DevOps
PowerShell and Azure DevOps
 
Hap 2 nd presentation1
Hap 2 nd presentation1Hap 2 nd presentation1
Hap 2 nd presentation1
 
Terraform
TerraformTerraform
Terraform
 
Terraform Introduction
Terraform IntroductionTerraform Introduction
Terraform Introduction
 
Acids, Bases and Salts (Chemistry 'O' level)
Acids, Bases and Salts (Chemistry 'O' level)Acids, Bases and Salts (Chemistry 'O' level)
Acids, Bases and Salts (Chemistry 'O' level)
 
Introduction of pharmaceutical analysis and their scope
Introduction of pharmaceutical analysis and their scopeIntroduction of pharmaceutical analysis and their scope
Introduction of pharmaceutical analysis and their scope
 
Terraform Best Practices - DevOps Unicorns 2019
Terraform Best Practices - DevOps Unicorns 2019Terraform Best Practices - DevOps Unicorns 2019
Terraform Best Practices - DevOps Unicorns 2019
 

Similar to Webinar hiware

Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!Symantec Brasil
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Systems, Inc.
 
Company and Market Overview
Company and Market OverviewCompany and Market Overview
Company and Market OverviewOkta-Inc
 
Implementing Enterprise Identity and Access Management in a microservices wor...
Implementing Enterprise Identity and Access Management in a microservices wor...Implementing Enterprise Identity and Access Management in a microservices wor...
Implementing Enterprise Identity and Access Management in a microservices wor...Judy Breedlove
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONInfosec Train
 
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...Sutedjo Tjahjadi
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudAmazon Web Services
 
CyberArk Interview Questions and Answers for 2022.pdf
CyberArk Interview Questions and Answers for 2022.pdfCyberArk Interview Questions and Answers for 2022.pdf
CyberArk Interview Questions and Answers for 2022.pdfInfosec Train
 
CyberArk Interview Questions and Answers for 2022.pdf
CyberArk Interview Questions and Answers for 2022.pdfCyberArk Interview Questions and Answers for 2022.pdf
CyberArk Interview Questions and Answers for 2022.pdfinfosec train
 
CyberArk Interview Questions and Answers for 2023.pdf
CyberArk Interview Questions and Answers for 2023.pdfCyberArk Interview Questions and Answers for 2023.pdf
CyberArk Interview Questions and Answers for 2023.pdfinfosec train
 
PSI Corporate Profile
PSI Corporate ProfilePSI Corporate Profile
PSI Corporate Profilemike_vincent
 
PSI corporate profile
PSI corporate profilePSI corporate profile
PSI corporate profilesanirudha
 
CyberArk Interview Questions and Answers for 2022.pptx
CyberArk Interview Questions and Answers for 2022.pptxCyberArk Interview Questions and Answers for 2022.pptx
CyberArk Interview Questions and Answers for 2022.pptxInfosectrain3
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...OracleIDM
 
Securing Your Cloud Applications
Securing Your Cloud ApplicationsSecuring Your Cloud Applications
Securing Your Cloud ApplicationsIBM Security
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-finalOracleIDM
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationIRJET Journal
 
ISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustInformation Security Services SA
 

Similar to Webinar hiware (20)

Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
 
SAP HANA Cloud Security
SAP HANA Cloud SecuritySAP HANA Cloud Security
SAP HANA Cloud Security
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
Company and Market Overview
Company and Market OverviewCompany and Market Overview
Company and Market Overview
 
Implementing Enterprise Identity and Access Management in a microservices wor...
Implementing Enterprise Identity and Access Management in a microservices wor...Implementing Enterprise Identity and Access Management in a microservices wor...
Implementing Enterprise Identity and Access Management in a microservices wor...
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTION
 
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
CyberArk Interview Questions and Answers for 2022.pdf
CyberArk Interview Questions and Answers for 2022.pdfCyberArk Interview Questions and Answers for 2022.pdf
CyberArk Interview Questions and Answers for 2022.pdf
 
CyberArk Interview Questions and Answers for 2022.pdf
CyberArk Interview Questions and Answers for 2022.pdfCyberArk Interview Questions and Answers for 2022.pdf
CyberArk Interview Questions and Answers for 2022.pdf
 
CyberArk Interview Questions and Answers for 2023.pdf
CyberArk Interview Questions and Answers for 2023.pdfCyberArk Interview Questions and Answers for 2023.pdf
CyberArk Interview Questions and Answers for 2023.pdf
 
PSI Corporate Profile
PSI Corporate ProfilePSI Corporate Profile
PSI Corporate Profile
 
PSI corporate profile
PSI corporate profilePSI corporate profile
PSI corporate profile
 
CyberArk Interview Questions and Answers for 2022.pptx
CyberArk Interview Questions and Answers for 2022.pptxCyberArk Interview Questions and Answers for 2022.pptx
CyberArk Interview Questions and Answers for 2022.pptx
 
ClearPass Overview
ClearPass OverviewClearPass Overview
ClearPass Overview
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
 
Securing Your Cloud Applications
Securing Your Cloud ApplicationsSecuring Your Cloud Applications
Securing Your Cloud Applications
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
 
ISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de Entrust
 

Recently uploaded

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 

Recently uploaded (20)

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 

Webinar hiware

  • 1. netand.info How to Manage IT Infrastructure for Remote Access in the Age of COVID-19 AP Webinar
  • 2. Copyright NETAND Co., Ltd. All rights reserved. Contents HIWARE, an integrated IAM solution which has adopted the latest technologies such as artificial intelligence and cloud, is the flagship product of NETAND that has developed various solutions with the best technology. 01 02 03 04 Company Introduction Solution Overview Product Introduction Reference
  • 3. 1. Company Overview 2. Profit History 3. HIWARE History 4. Marketing Vision 1. Company Introduction
  • 4. Copyright NETAND Co., Ltd. All rights reserved. 4 47 A Complete IAM(Identity and Access Management) Solution specialized in Asia Security Standard. Company Overview01 HQ and R&D center in Seoul, Korea R&D center in Silicon Valley , USA 13Years Experiences 121 Employees 1 In Korea `1200+ Customers Platform & Service provider for Infrastructure Security management Number
  • 5. Copyright NETAND Co., Ltd. All rights reserved. 5 47 Company Overview01 85% RnD RnD Consulting Customers Partners Sales Marketing HQ and R&D Seoul, Korea R&D center in Silicon Valley, USA Knowledge Data Customer Experience Customer Needs Tech-people
  • 6. Copyright NETAND Co., Ltd. All rights reserved. 6 47 Profit History02 Revenue Net Profit 8.23% 3 years Average 8.23% Average net Profit for Last 3 years 9.09% FY 2018’ Net Profit No. 1 In Korea 45% 6 years CAGR (million$)USD1$=KRW1,100Won 45% 6 years CAGR Proven of Growth and Profitability
  • 7. Copyright NETAND Co., Ltd. All rights reserved. 7 47 Profit History02 License Maintenance Cloud Cloud Service opened end of 2017’ Total: 40 customers (million$)USD1$=KRW1,100Won Revenue model is on premise solution, License fee and Maintenance fee Cloud service started from end of 2017
  • 8. Copyright NETAND Co., Ltd. All rights reserved. Consistent Growth and Development 8 47 HIWARE History03 2007 Started 2009 2011 Access Management ver.1.0 Access Management ver.2.0 Identity Management ver.1.0 2012 Total IAM 2013 Entered Global 2014 Total IAM platform ver.1.0 - HIWARE 4.0 Oracle Open World San Francisco Oracle Open World Shanghai China Xian Samsung HIWARE 5.0 Hyundai Motors Turkey and India China Suzhou Samsung 2015 Southeastern Market 2016 R&D center in US Southeast Asia Market INT’L SOFT CHINA Global Security Philippines Expo Philippines Smart Communications R&D Center in U.S ACLEDA BANK Cambodia and Laos Hyundai Motors Mexico 2017 Cloud Service 2018 HIWARE 6.0 for Global Acquired 2 Patents AWS open HIWARE 6.0 (Global) Acquired 3 Patents CDIC 2018 in Thailand PT.IONPAY Networks Indonesia
  • 9. 1. Background 2. Concept of IAM 3. AS-IS & TO-BE 2. Solution Overview
  • 10. Copyright NETAND Co., Ltd. All rights reserved. 10 47 Security Threats in the age of COVID-19 As recently various security threats by COVID-19, the demand of telecommuting has been increasing. As a result, it would lead for malicious users illegally to access corporate infra assets from a vulnerable remote environment. Background01 The indicator of searching of ‘Remote Work’ SK Infosec EQST, 2020 Google Trends, 2020 9.7% Year 2020 2019 JAN FEB MAR ¼ Average The indicator of searching of ‘Remote Work’ Statistics of cyber attacks Statistics of cyber attacks
  • 11. Copyright NETAND Co., Ltd. All rights reserved. 11 47 Security Threats in the age of COVID-19 As recently various security threats by COVID-19, the demand of telecommuting has been increasing. As a result, it would lead for malicious users illegally to access corporate infra assets from a vulnerable remote environment. Background01 Examples - Information Security Incident Insufficient use of remote working system (VPN) Incomplete management of account and access permission for telecommuters No remote access monitoring Insufficient environment for session block when the user is absent Impossible detection for access & work history by users Incident From home office Difficulty in analyzing causes of security incidents and slow recovery to normal operation
  • 12. Copyright NETAND Co., Ltd. All rights reserved. What is identity? Concept of IAM02 User SAM FILE SAM FILE SAM FILE SAM FILE Linux Server Windows Server AIX Server HP Server 12 47
  • 13. Copyright NETAND Co., Ltd. All rights reserved. 02 Concept of IAM Linux Server Windows Server AIX Server HP Server Integrated ID Database Identity Management Solution User 13 47 What is identity?
  • 14. Copyright NETAND Co., Ltd. All rights reserved. 02 Concept of IAM Integrated ID Database AM 이미지 Identity Management Solution Access Management Solution ID/PW Linux Server Windows Server AIX Server HP Server User 14 47 What is authentication?
  • 15. Copyright NETAND Co., Ltd. All rights reserved. 02 Concept of IAM Integrated ID Database AM 이미지 Identity Management Solution Privileged Access Management Solution ID/PW OTP Linux Server Windows Server AIX Server HP Server User IP/MAC 15 47 What is advanced authentication?
  • 16. Copyright NETAND Co., Ltd. All rights reserved. 02 Manager Developer Illegal User ID/PW ID/PW Linux Server Windows Server AIX Server HP Server Integrated ID Database OTP OTP IP/MAC IP/MAC Identity Management Solution Privileged Access Management Solution Concept of IAM 16 47 How to enhance security in IT infrastructure?
  • 17. Copyright NETAND Co., Ltd. All rights reserved. 03 AS-IS & TO-BE AS-IS Windows Network Security devices Unix/ Linux Oracle Ms-sql Mysql Windows Windows AD ID/PWD authentication ID/PWD authentication System operators from most of customers are accessing target equipment with basic authentication only. Passwords are also incompletely managed. The current situation can lead to control the access and behavior of illegal users insufficiently. Administrator Users Outsourced users Retired users 17 47
  • 18. Copyright NETAND Co., Ltd. All rights reserved. 03 AS-IS & TO-BE Approval server OTP server SMS server HR DB DR server ID/PW IP/MAC Two factor External RDP | Telnet | SSH | FTP | SFTP Identity &AccessManagement Windows N/W devices Security devices Unix/ Linux Oracle Ms-sql Mysql AD Windows Windows Manage ID life-cycle Detect Unauthorized ID Manage password automatically Create System ID TO-BE HIWARE is integrated IAM solution to control access to target equipment by users and to manage ID lifecycle in operation. By HIWARE, unauthorized users will be blocked and unclear ID can be dealt with processing policy under ID policy. By interworking other system, work process can be more efficient and secured. Administrator Users Outsourced users Retired users Block 18 47
  • 19. Copyright NETAND Co., Ltd. All rights reserved. 19 47 Success Case Success Case04 1000 In this case, both DBMS Privileged Access management solution and identity management solution are established together and they are integrated with diverse authentication DBMS to strengthen security and improve stability through dualization of gateways. Also, the solutions are integrated with the client’s existing in-house DBMSs such as HR DBMS, approval DBMS, and the server for managing automation to implement a single interface and enhance convenience of use and efficiency at work at the same time. User Target device User No. of Equipment Server 1500 / N/W 12000 / DB 500 Functionality - IP / MAC authentication - SMS OTP double authentication - History management of major query - Users’ Access authority control by DBMS account - Controlling authorities over SU login to public accounts based on the policy of personal account - NT account management through AD account management - Simultaneous management of NT local accounts - Manual password change of the person responsible for public accounts - Randomly changing root accounts at once - Using one time passwords for root accounts - Manual change of personal accounts - Locking inactive accounts - Locking ghost/broken accounts - Locking and deleting Retired employees’ accounts - server security configuration (Red Castle) - NT server : Applying local security policies (IP-SEC) Access control interworking GATEWAY HA configuration Administrator Users Partners WINDOWS server LINUX/UNIX server network DR server Gateway #1 Gateway #2 DBMS #1 DBMS #2 E-mail server SMS server AD server Approval DBMS H.R DBMS Category Policy of user authentication query control Management of personal/publi c accounts NT account management Password management Management of illegal accounts Blocking Access through bypassing AD IP/MAC SMS OTP Authentication DBMS GATEWAY Oracle, Ms-sql, MariaDB VPN Client VPN Client VPN Client VPN Client Customer
  • 20. 1. Product Line-up 2. Solution Strength 3. IAM for System 4. IAM for DB 5. IM for AD 3. Product Introduction
  • 21. Copyright NETAND Co., Ltd. All rights reserved. 21 47 NETAND., Ltd. of the top-tier technology and variety of experience supplies HIWARE, a package of integrated Identity and Access Management(IAM) which consists of seven products managing security of IT infrastructure and systems of companies and institutions. 02 1. HIWARE PrivilegedAccess Management for System v6.0 2. HIWARE Identity Management for System v6.0 3. HIWARE PrivilegedAccess Management for Database v6.0 4. HIWARE Identity Management for Database v6.0 5. HIWARE Identity Management for Active Directory v6.0 6. HIWARE Mobile One Time Password v6.0 7. HIWARE ThreatAnalytics v6.0 StandardScalable Product Line-up
  • 22. Copyright NETAND Co., Ltd. All rights reserved. 22 47 Making work environment smarter and more stable Solutions have to change, following rapidly changing business environment and IT infrastructure. HIWARE is the next Access control solution which perfectly supports not only users’ work environment but also diverse IT infrastructure such as cloud and network segmentation. Create a smart work environment in a rapidly changing IT environment under security threat without concerns about security. 03 User Environment Cross browsing Multi-languages Windows / MAC IPv6 Infrastructure Network segmentation Cloud environment Work Internet Auto-scaling, Processing Tag Solution Strength
  • 23. Copyright NETAND Co., Ltd. All rights reserved. 23 47 HIWARE is integrated IAM solution to control access to target equipment by users and to manage ID lifecycle in operation. By HIWARE, unauthorized users will be blocked and unclear ID can be dealt with processing policy under ID policy. By interworking other system, work process can be more efficient and secured. 04 HIWARE Identity Access Management for System v6.0 IAM for System Identity & Access Management for System Access Management Access management Session Management Command Control Logaudit Basic Multi-factor Integration ID/PW, IP/MAC, MOBILE OTP SMS, OTP, Smart-card, RADIUS LDAP *Provide API for integration Authentication Management Identity Management Life-Cycle Management Password Management Accountpolicy Management Detect illegalaccount Inter work Block Administrator Staff Outsource Retiredstaff WINDOWS server UNIX/LINUX server Network Security devices Approval server OTP server SMS server HR DB DR server ID/PW IP/MAC Two factor External RBAC Identity & Access Management Solution RDP | Telnet | SSH | FTP | SFTP Authority Access Identity Access Management Identity Management
  • 24. Copyright NETAND Co., Ltd. All rights reserved. ID/PW login 24 47 Unifying access channel API for integrating diverse authentication IP/MAC address authentication Optional additional OTP authentication Supporting combination of diverse authentication types (RSA, accredited certificate, LDAP, etc.) Login 2 Factor Authentication basic Two-factor external ID/PW, IP/MAC, MOBILE OTP SMS, OTP, SSO, Smart card, RADIUS, PKI, biometrics, etc. LDAP, etc. *Providing api for integration Mobile Authentication v1.0 Clientscansavethecosttoestablishasecuritysolutionsinceweprovide amobile OTPproduct thatwedeveloped byourselves Retired employee H.RDB A user tries to access Retired employee’s try to access Integration with H.R DB Impossible to access automatically after retired company/ notifying the threat IP/MAC authentication 2 factor authentication Automatic login to equipment IAM for System04 Enhance user authentication - Support Android/IOS - Support off-line environment Retired employee management Administrator Retired employee Block Notify Identity & Access Management for System User server#1 server#2
  • 25. Copyright NETAND Co., Ltd. All rights reserved. Equipment 25 47 04 Auto Login Auto Login User FARM #1 FARM #2 FARM#1 User FARM#2 User Access authority control by user Stronger authentication (Two Factor) Access time control Automatic login to system Feature to Access by network Support IPv6 IAM for System System Access authority control Basic authentication Two-factor authentication Basic authentication Two-factor authentication Identity & Access Management for System User’ Equipment Tree Auto Login
  • 26. Copyright NETAND Co., Ltd. All rights reserved. 26 47 System command control IAM for System04 Inputting command prohibited command Processing depending on command policies Warning Massage Not accept command Block if many times of attempts to input Notification Access for approval Filling request form Request approval Administrator’s approval Using the command within a period The command is executed. Worker Permitted commands Important commands Prohibited command Exceptions Risky user Equipment Prevent User’s mistake Permitted command Important command Immediately accepted Warning! Bad Command! Access Denied Administrator Command control (permitted/prohibited) Monitoring/blocking /notification of commands Requesting approval of important commands Exception commands by period Block risky command Command usage history Confirmation text Accepted User Time Device Command Administrator Possible to use the requested command Identity & Access Management for System
  • 27. Copyright NETAND Co., Ltd. All rights reserved. 27 47 Real-time session monitoring / control IAM for System04 Real-time session statistics Real-time event monitoring Real-time session monitoring Real-time Access monitoring Event monitoring Forced block user session Real-time dashboard Session timeout Identity & Access Management for System
  • 28. Copyright NETAND Co., Ltd. All rights reserved. Monitoring all events after access 28 47 System log / audit IAM for System04 Identity & Access Management for System Logging Auditing Detailed history managementLogging audit information Provide various search filters Access history by user Change history by device Usage history by command History of work details Auditing variety of work details Logging audit information Searching diverse history Logging information of auditing work details Diverse statistics and audit reports Store compressed system logs Various search filters Statistics by user/ device/command Provide saving options by time/event [TEXT audit] Displaying texts by command [Video audit] Displaying video by command [Dashboard] Multivariate statistics Auditing work details in real time device Working user
  • 29. Copyright NETAND Co., Ltd. All rights reserved. Automatic collection/ synchronization of accounts 29 47 ID life-cycle policy management IAM for System04 Provisioning management (create/change/delete) Suspension in Implementing policies Handling accounts at once Personal setting (password / unlock) Requesting a new account Providing solutions to normalize accounts depending on their status Tracking down change history by account Limited approval Creating/ using the account Setting up account policies Policy-based automatic account management Management of account modification / password change Monitoring Retired employees’ accounts / illegal accounts Automatically finding/deleting / notifying Retired employees’/ illegal accounts Worker Automatic provisioning AUTO delete notify Retired employee Equipment#1 Account takeback / Deletion Change account / password Account creation Policy management Administrator Administrator Administrator PW change Usage period Usage authority Identity & Access Management for System Equipment#2
  • 30. Copyright NETAND Co., Ltd. All rights reserved. Password complexity management 30 47 Password policy management IAM for System04 Management of password change frequency Automatic/manual/random change of passwords Password management report Password change history management Managementof risky passwords of privilegedaccounts Collectingand verifying passwordsecurity policies by system Setting up password policies Automatic change of passwords based on policies Automatic provisioning of accounts Reporting change history Efficiency in managing passwords Security of passwords Password management report Administrator Administrator Automatic change Automatically changing on a scheduled date Manual change Directly changing by booking change on a certain date Bulk change Changing all passwords at once One time password Using one time passwords Random change of passwords Randomly changing by setting up complexity Setting up complexity of passwords Numbers, capital letters, special characters, etc. Password management report (The report that passwords can be viewed) Password change history Password change history report History of viewing passwords Report on the history of viewing passwords Identity & Access Management for System
  • 31. Copyright NETAND Co., Ltd. All rights reserved. 31 47 HIWARE is integrated IAM solution to control access to target equipment by users and to manage ID lifecycle in operation. By HIWARE, unauthorized users will be blocked and unclear ID can be dealt with processing policy under ID policy. By interworking other system, work process can be more efficient and secured. 05 HIWARE Identity Access Management for DBMS v6.0 IAM for DBMS Identity & Access Management for DBMS DR server Foreign HR DB SMS server OTP server Approval server Administrator Staff Outsource Retired staff Block ID/PW IP/MAC Two factor Inter work Access Management Identity management RBAC DB Connector Authority Access Account MySQL MS-SQL Oracle Access Management Access management Session Management Query Control Logaudit Basic Multi-factor Integration ID/PW, IP/MAC, MOBILE OTP SMS, OTP, Smart-card, RADIUS LDAP *Provide API for integration Authentication Management Identity Management Life-Cycle Management Password Management Accountpolicy Management Detect illegalaccount Identity &AccessManagement
  • 32. Copyright NETAND Co., Ltd. All rights reserved. DBMS 32 47 05 DBA Administrator Oracle MS-SQL Oracle DBA MS-SQL DBA Access authority control by user Reinforce authentication (Two Factor) Access time control IAM for DBMS DBMS Access authority control Basic authentication Two-factor authentication Basic authentication Two-factor authentication Identity & Access Management for DBMS User’ Equipment Tree
  • 33. Copyright NETAND Co., Ltd. All rights reserved. 33 47 DBMS query control IAM for DBMS05 Inputting a query Inputting a prohibited query Processing depending on query policies Warning Massage The query is not accepted. Blocked if N times of attempts to input are made Notification to an administrator Access for approval Filling in a request form Requesting approval Administrator’s approval Using the query within a period The query is executed. Worker Permitted query Prohibited query Exceptions suspect user Preventing a security incident caused by a user’s mistake Permitted query Immediately accepted Warning! Bad query! Access Denied Administrator query control (permitted/prohibited) Managing monitoring/ blocking/notification of query Requesting approval of important query Managing query usage history User Time DBMS query Administrator Possible to use the requested query Identity & Access Management for DBMS DBMS
  • 34. Copyright NETAND Co., Ltd. All rights reserved. 34 47 IAM for DBMS05 Identity & Access Management for DBMS Privileged Access Management for DBMS 5 1 4 2 3 Control large volume data Control data inquiry number Masking sensitive data Notification to administrator Control result data(1/2)
  • 35. Copyright NETAND Co., Ltd. All rights reserved. 35 47 IAM for DBMS05 Identity & Access Management for DBMS Passport_number name Passport_number User1 User2 User3 … Privileged Access Management for DBMS Control result data(2/2)
  • 36. Copyright NETAND Co., Ltd. All rights reserved. 36 47 IAM for DBMS05 Identity & Access Management for DBMS Control DB tool DBMSDBA Administrator DBMS #1 DBMS #2 Oracle DBA MS-SQL DBA Control DB tool to use Prevent using DB tool that have license Notification to administrator Basic authentication Two-factor authentication Basic authentication Two-factor authentication
  • 37. Copyright NETAND Co., Ltd. All rights reserved. Monitoring all events after Access 37 47 DBMS log / audit IAM for DBMS05 Identity & Access Management for DBMS Logging Auditing Detailed history management Logging audit information of work details Providing various search filters Access history by user Change history by DBMS Usage history by query History of work details Auditing variety of work details Logging audit information Searching diverse history Logging information of auditing work details Diverse statistics and audit reports Various search filters Statistics by user/ DBMS/query Inquiry query result Auditing work details in real time DBMS Working user [Audit Log] Confirming access and query log [Dashboard] Multivariate statistics
  • 38. Copyright NETAND Co., Ltd. All rights reserved. Automatic collection/ synchronization of accounts 38 47 ID life-cycle policy management IAM for DBMS05 Provisioning management (create/change/delete) Suspension in Implementing policies Handling accounts at once Personal setting (password / unlock) Requesting a new account Providing solutions to normalize accounts depending on their status Tracking down change history by account Limited approval Creating/ using the account Setting up account policies Policy-based automatic account management Management of account modification / password change Monitoring retired employees’ accounts / illegal accounts Automatically locking /deleting / notifying retired employees’/ illegal accounts Worker Automatic provisioning AUTO delete notify Retired employee Account takeback / Deletion Change account / password Account creation Policy management Administrator Administrator Administrator PW change Usage period Usage authority Identity & Access Management for DBMS DBMS#1 DBMS#2
  • 39. Copyright NETAND Co., Ltd. All rights reserved. Password complexity management 39 47 Password policy management IAM for DBMS05 Management of password change frequency Automatic/manual/random change of passwords Password management report Password change history management Setting up password policies Automatic change of passwords based on policies Automatic provisioning of accounts Reporting change history Efficiency in managing passwords Security of passwords Password management report Administrator Administrator Automatic change Automatically changing on a scheduled date Manual change Directly changing by booking change on a certain date Bulk change Changing all passwords at once Random change of passwords Randomly changing by setting up complexity Setting up complexity of passwords Numbers, capital letters, special characters, etc. Password management report (The report that passwords can be viewed) Password change history Password change history report History of access passwords Report on the history of viewing passwords Identity & Access Management for DBMS
  • 40. Copyright NETAND Co., Ltd. All rights reserved. 40 47 HIWARE Identity Management for Active Directory v6.0 HIWARE Identity Management for AD collects accounts from multiple domains and automatically manages account life cycle and passwords from creation to deletion according to policy. IM forAD06 Block Administrator Employee Partner Retired Approval server OTP server SNS server HR DB DR server Password Auto-management Create Account Account Life-cycle Management Windows server Windows server AD Domain#1 AD Domain#2 Identity Management forActiveDirectory Unauthorized account Detection Provisioning Collect Accounts Audit Report Policy Setting Multiple Authentication interworking Identity Management for AD Basic Multi-factor Integration ID/PW, IP/MAC, MOBILE OTP SMS, OTP, Smart-card, RADIUS LDAP *Provide API for integration Authentication Management Identity Management Life-Cycle Management Password Management Accountpolicy Management Detect illegalaccount
  • 41. Copyright NETAND Co., Ltd. All rights reserved. 41 47 IM forAD06 Identity Management for AD ID life-cycle policy management Worker Automatic provisioning AUTO delete notify Retired employee Collecting / deleting accounts Account/password change Account creation Policy management Administrator Administrator Administrator PW change Usage period Usage authority Domain#1 Domain#2 Provisioning management (Create/Modify/Delete) Bulk processing Self-Service (Password/ Release locked) Detecting the change history of accounts Manual/automatic accounts collection/synchronization Requesting a new account Authorization processes Creating using the account Setting up account policies Policy-based automatic Account management Management of account modification / password change Monitoring Retired employees’ accounts / Misuse accounts Automatically locking / notifying Retired employees’ unauthorized accounts
  • 42. Copyright NETAND Co., Ltd. All rights reserved. 42 47 IM forAD06 Identity Management for AD Password complexity management Password policy management Management of password change frequency Automatic/manual/random change of passwords Password management report Password change history management Setting up password policies Automatic change of passwords based on policies provisioning of accounts Reporting change history Administrator Administrator Automatic change Automatically changing on a scheduled date Efficiency in managing passwords Security of passwords Password management report Manual change Changing the password by scheduling a change date Bulk change Changing all passwords at once Setting up complexity of passwords Numbers, capital letters, special characters, etc. Password management report (The report that passwords can be viewed) Password change history Password change history report History of access passwords Report on the history of viewing passwords
  • 43. 1. In Domestic market 2. In Overseas market 4. Reference
  • 44. Copyright NETAND Co., Ltd. All rights reserved. 44 47 Domestic market01 Reference in domestic market
  • 45. Copyright NETAND Co., Ltd. All rights reserved. 45 47 Domestic market01 중앙연구원 울진원자력본부 Reference in domestic market
  • 46. Copyright NETAND Co., Ltd. All rights reserved. 46 47 Overseas market02 USA Branch office in USA R&D Center Mexico Hyundai- Kia Motors Turkey Hyundai- Kia Motors Korea Head office in KOREA R&D Center China Samsung Electronics SK Hynix Hyundai- Kia Motors Vietnam Shinhan Bank NICE INFO VIETNAM Philippines Smart Communications BPI bank 1,200+ customers in global market India Hyundai- Kia Motors Laos ACLEDA BANK Cambodia ACLEDA BANK Indonesia PT.IONPAY Networks Reference in overseas market
  • 47. Copyright NETAND Co., Ltd. All rights reserved. www.netand.info / Tel : +82-(0)2-2661-1410 Thank you How to Manage IT Infrastructure for Remote Access in the Age of COVID-19