our technology

Digital Content is ESSENTIAL
in Business Communication

Malicious cyber attacks are evolving. Threat techniques which can evade existing security systems are increasing day by day.
Detecting and blocking the new and unknown pattern requires new cutting-edge technology.

SecuLetter MARS Platform

Enhanced Standard Layers & Cutting-edge APT Protection

SecuLetter compensates the existing signature and behavior based APT solution vulnerability and deliver the most advanced threat detection capabilities defend against the malicious code attack by automated reverse-engineering analysis.

Threat Analysis

01 Static Analysis

02 CTI & AI Analysis

03 Dynamic Analysis

CDR

(Content Disarm & Reconstruction)

01 Identify Active Content

02Remove Active Content

03 Reconstruct Content

Debugger Analysis

01 Principle of Vulnerability Occurrence

02 CVE Vulnerability Analysis

03 Process Stack

04 Memory

05 Execution Flow Analysis

06 Obfuscation Script Decoding

Competitive Advantage

We proactively defend against unknown cyber attacks before they occur.

competitive advantage

Assembly Level Diagnosis

Accurate Diagnosis Rate, Reduce False Positive/Negative

5 Times Faster

Reduce 80% of Diagnosis Time vs APT Solution

Neutralize Evasion Technique

Detect and Block Malware to Evade Diagnosis

Content Disarm

A proactive security technology that treats all active content within non-executable files as potential threats, removes malware and risky elements, and reconstructs them into safe files.

Unknown Threat Detection within 20 Seconds

Fundamental Defense Technology against Sophisticated Malware Attacks.

Malware Detection Types

threat-detection-and-diagnosis-technology-icon-01-min

Malicious Code Attack
Security Vulnerabilities and Countermeasure Technologies

1st Generation
Signature-based

Virus, Worm, Trojan etc.

Signature Based Defense
Detects only known malicious attacks referring to signature-based engine.

2st Generation
Behavior-based

APT Attack: PE File(exe, dll, sys)

Behavior
Unable to detect evasive threat which does not take any action in virtual machine.

3st Generation
Reverse Engineering-based

APT Attack: Non-PE File(MS Office, PDF, etc)

Reverse Engineering Based Defense
Detects unknown evasive threats, zero-day attack, malicious code with no behavior.

Malware Detection Types

threat-detection-and-diagnosis-technology-icon-01-min

Malware Detection Types

Malicious Code Attack
Security Vulnerabilities and Countermeasure Technologies

1st Generation
Signature-based

APT Attack: PE File(exe, dll, sys)

1st Generation
Signature-based

Signature Based Defense
Detects only known malicious attacks referring to signature-based engine.

2st Generation
Behavior-based

APT Attack: PE File(exe, dll, sys)

2st Generation
Behavior-based

Behavior
Unable to detect evasive threat which does not take any action in virtual machine.

3st Generation
Reverse Engineering-based

APT Attack: Non-PE File(MS Office, PDF, etc)

3st Generation
Reverse Engineering-based

Reverse Engineering Based Defense
Detects unknown evasive threats, zero-day attack, malicious code with no behavior.