Cuvepia Inc.
We have been providing real hacking
Infiltration Diagnosis Service for many years and there are a lot of
high-qualified engineers who have many experience of real hacking. Since established
in 2010 we have been showing many issues and problems in security field. Now we
have launched the product. KWON-GA with a totally new standpoint.
Company Introduction
We have been providing real hacking
Infiltration Diagnosis Service for many years and there are a lot of
high-qualified engineers who have many experience of real hacking. Since established
in 2010 we have been showing many issues and problems in security field. Now we
have launched the product. KWON-GA with a totally new standpoint.
Under the belief- ‘No more victory just with a defensive security solution’-, we have launched the product of new paradigm, which makes the best use of attack technique. And we are very proud of it. We are not just content with the pride of a live witness of Korean information security. Based on continuous R&D and challengeable mind, we are trying to realize more value by suggesting new and progressive topic to the security field.
Thank you very much for your concern!
Detailed Company Information
Cuvepia Inc.
- Business Type Manufacturer
- Year Established 2010
- Location South Korea
- Main Markets Brazil,Canada,U. Kingdom,Israel,U.S.A
- Total Employees 1-50 People
- Homepage http://www.cuvepia.com
- President Seok Chul, Kwon
- Phone +82-31-701-4859
- FAX +82-31-8060-0137
- Address #601, PDC B/D C-dong, Pangyo-ro, Bundang-gu, Seongnam-si, Gyeonggi-do, 463-400, South Korea
-
Product Category
Electronic Products > Consumer Electronics > Computer Hardware & Software > Computer & Information Technology Service
Electronic Products > Consumer Electronics > Computer Hardware & Software > Computer Software
Electronic Products > Home Appliances > Home Security System > Security Services - Factory Information
Additional Introduction
The security which
does not depend on O/S
* We need security skill which is the same
level of O/S or higher authority than O/S.
* All hackers and malwares work under the
authority of O/S.
* The rate of success for attack or defense
is increasing tremendously.
The security which is
not analyzed by reverse engineering
* The S/W for operations must not be
analyzed.
* Most vulnerabilities happen by S/W reverse
engineering.
* Removal of the original reason which can
make vulnerability.
The perfect
separation between intruder and normal user
* We must separate normal user from intruder
in network level.
* Even in the same network, access control to
management line must be possible.
* We need the high stability of inside
network.
The technology which is beyond the existed security monitor
* Real-time intrusion detection and tracing
it back; the sooner, the better.
* From the first hacking attack point to the
end of it, all routes must be chased in real-time.
* The technology must be beyond the existed
signature based monitoring method.
The fundamental
blockade of system structure understanding
* The leak of system structure is very
important data in cyber attack.
* System structure must be designed by the
way that no one can see it from outside.
Simple and easy security
technology
* High level security always brings about
inconvenience. This is wrong.
* High level security with high convenience
is the best way.