525, Gangnam-daero, Seocho-gu, Seoul, Republic of Korea l Tel : 822-3448-0880 l Fax : 822-3448-0804 l Email : jsshim@truecut.co.kr
Copyright (C) 2015 TrueCut Security, Inc. All Right Reserved.
Div | Functions | Features of trueEP |
---|---|---|
Data Hacking Prevention | Data hacking prevention | Blocking exporting files stored on the disk without user input |
Tracing personal information files | Notification of personal information document transmission | |
Logging insider's data transfer history | Logging exporting files stored on the disk by insider | |
File attachment control | Restrict transmission of files by attaching them to e-mail/messenger | |
Restrict the size of files attached to e-mail and messenger | ||
Print security | When printing, insert a watermark - image or text | |
Logging printing history | ||
Preventing Zombie PCs | Block unknown excessive traffic | Block when traffic above the threshold (adjustable) occurs without user input |
Media-Use Control | USB-Media control | USB-Media set to Enable/Disable/Read only mode |
Allow only authorized USBs to be used | ||
Tethering control | Prevent tethering function from being used | |
Blacklist control | Block the execution of programs by blacklist | |
Internet access control | Block the access of internet by blacklist |
Div | Functions | Features of trueEP |
---|---|---|
Ransomware attacks prevention | Blocking ransomware behavior | The only product that can defend against unknown ransomware |
Full automatic smart backup | Smart backup |
Run backup only during CPU idle time Stop backup while using PC Specify the storage space size according to the user's PC status Automatic deletion of old files when storage space is insufficient Set up only specified folders or files to be backed up |
Full automatic backup |
Self-backup without user intervention Backup by automatically recognizing file creation and changes |
|
Automatic recovery |
Automatic recovery tool (can only be restored by the provided recovery tool) Restore by selecting the original file path or a specified new path |
|
Motoring & Managing |
Monitoring of the backup status for individual users from the trueEP Manager Backup policies can be set for individual users from the trueEP Manager |
|
Backup to external storage | Supporting the external backup by FTP / NAS | |
DB backup | Supporting the Date Base backup |
Functions | Description |
---|---|
PC uptime monitoring | Signs of abnormal operation can be detected by monitoring PC uptime |
Web page access history monitoring | Anomalies can be detected by monitoring web page access records |
Resource usage monitoring | Anomalies can be detected by monitoring CPU, memory, network usage, etc. |
Program installation status monitoring | Signs of malicious code installation can be detected by monitoring program installation status |
Personal information monitoring | Prepare for personal information security by monitoring the holding status of documents containing personal information |
Defense principles of conventional products | Defense principles of trueEP | |
---|---|---|
Defense principles |
Block signature-based malware infection. - Method to prevent COVID infection with a mask |
Malicious behavior blocking. - Method of inhibiting viral activity by autoantibodies |
Concept | Incoming packets are checked to see if they contain known malicious codes, and if so, they are deleted. | When a process behavior occurs on the PC (or server), it is determined whether the behavior was executed by the user or not, and if the behavior was not executed by the user, it is blocked. |
Limitations |
+ Defenseless against unknown malware + Need to patch from time to time + Increased capacity of security products |
Methods to exclude the behavior of auto-executing business programs. |
Features | Inability to fundamentally defend against unknown cyberattacks in conventional ways. |
+ Block even unknown attacks + No frequent patching required + Program size is very small ( 5MB ) |
Applied area | Descriptions | |
---|---|---|
By functional | Purpose of preventing hacking attacks | If you want to defend against hacking attacks and prepare for abnormal symptoms. |
Purpose of preventing ransomware attacks | If you want to defend against ransomware attacks and prepare for abnormal symptoms. | |
Integrated security purpose | If you want to defend against normal hacking attacks and ransomware attacks, and prepare for abnormal symptoms. | |
By purpose | Server protection purpose | If the target to be protected are business server products. |
PC protection purpose | If the target to be protected are business PCs. | |
Purpose of protecting special equipments | If the target to be protected are special devices such as POS, ATM, KIOSK, Smart factory devices, etc. | |
By service | On-premise | If you want to operate a own management server. |
SaaS / Cloud | If you want to install only the agent and connect to the cloud-based management server for operation. |