메뉴 바로가기 본문 바로가기
Cyclone Personal Information Management Solution
Information security begins with understanding which assets must be protected.

These assets may be a database, server, and even the personal information possessed by the company.

As such, knowing which assets to prioritize in protecting from risks, and making plans and managing said assets in accordance with this knowledge is a key task for those who oversee security. These security officers must be able to obtain a grasp on the expanding IT environment of companies and constantly stay up-to-date and keep up with the ever-increasing vulnerabilities being reported as well as the various compliances required to regulate them.

With the management system built through Cyclone, administrators simply need to enter a few pieces of simple information and click a few times to scan their company’s assets and manage the personal information stored by the company.

  • Database and Server Detection Network detection through photo scans and smart detection through traffic analysis
  • Personal Information Detection Automatic/periodic detection of personal information within formal and informal data
  • Personal Information Management History Monitoring the Status of Personal Information Usage. Verification and Audit Functions Regarding the Use of Personal Information
  • Database Vulnerabilities Execution of Penetration Test and Internal Security Auditing. Provision of Scripts to Fix Vulnerabilities