
Digital Content is ESSENTIAL
in Business Communication
Malicious cyber attacks are evolving. Threat techniques which can evade existing security systems are increasing day by day.
Detecting and blocking the new and unknown pattern requires new cutting-edge technology.
SecuLetter MARS Platform
Enhanced Standard Layers & Cutting-edge APT Protection
SecuLetter compensates the existing signature and behavior based APT solution vulnerability and deliver the most advanced threat detection capabilities defend against the malicious code attack by automated reverse-engineering analysis.

Threat Analysis
01 Static Analysis
02 CTI & AI Analysis
03 Dynamic Analysis

CDR
(Content Disarm & Reconstruction)
01 Identify Active Content
02Remove Active Content
03 Reconstruct Content

Debugger Analysis
01 Principle of Vulnerability Occurrence
02 CVE Vulnerability Analysis
03 Process Stack
04 Memory
05 Execution Flow Analysis
06 Obfuscation Script Decoding
Competitive Advantage
We proactively defend against unknown cyber attacks before they occur.

Assembly Level Diagnosis
Accurate Diagnosis Rate, Reduce False Positive/Negative
5 Times Faster
Reduce 80% of Diagnosis Time vs APT Solution
Neutralize Evasion Technique
Detect and Block Malware to Evade Diagnosis
Content Disarm
A proactive security technology that treats all active content within non-executable files as potential threats, removes malware and risky elements, and reconstructs them into safe files.
Unknown Threat Detection within 20 Seconds
Fundamental Defense Technology against Sophisticated Malware Attacks.
Malware Detection Types

Malicious Code Attack
Security Vulnerabilities and Countermeasure Technologies
1st Generation
Signature-based
Virus, Worm, Trojan etc.

Signature Based Defense
Detects only known malicious attacks referring to signature-based engine.
2st Generation
Behavior-based

APT Attack: PE File(exe, dll, sys)
Behavior
Unable to detect evasive threat which does not take any action in virtual machine.
3st Generation
Reverse Engineering-based

APT Attack: Non-PE File(MS Office, PDF, etc)
Reverse Engineering Based Defense
Detects unknown evasive threats, zero-day attack, malicious code with no behavior.
Malware Detection Types

Malware Detection Types
Malicious Code Attack
Security Vulnerabilities and Countermeasure Technologies
1st Generation
Signature-based

APT Attack: PE File(exe, dll, sys)
1st Generation
Signature-based
Signature Based Defense
Detects only known malicious attacks referring to signature-based engine.
2st Generation
Behavior-based
APT Attack: PE File(exe, dll, sys)

2st Generation
Behavior-based
Behavior
Unable to detect evasive threat which does not take any action in virtual machine.
3st Generation
Reverse Engineering-based
APT Attack: Non-PE File(MS Office, PDF, etc)

3st Generation
Reverse Engineering-based
Reverse Engineering Based Defense
Detects unknown evasive threats, zero-day attack, malicious code with no behavior.