CodeOne
Company
About Us
Company History
Major Certifications and Awards
Clients
Contact Us
Products
AppScan Management System
Sentinelle
Codeone Extinelle
HCL AppScan
HCL AppScan Standard
HCL AppScan Source
HCL AppScan Enterprise
IBM Security Qradar
IBM Security Qradar SIEM
IBM Security Qradar SOAR
IBM Security QRadar UBA
OpenText
Open Text Fortify Sonatype
Open Text Fortify SCA
Open Text Fortify SSC
Open Text Loadrunner
Group-IB
Group-IB ASM
Research
Security Research Lab
Research Areas
Research Lab Composition
Partners
IBM
HCL
OpenText
Paloalto
Group-IB
Services
System vulnerability diagnosis
Source code vulnerability diagnosis
Web Vulnerability Diagnosis

언어 선택

Research Areas

Code One conducts various research to create a safer digital environment by utilizing AI and data analysis technologies

Artificial Intelligence
Data Analysis
Monitoring System
Security Portal
Smart Factory Security

Artificial Intelligence

AI is a core IT technology that implements intelligent characteristics such as learning, reasoning, and perception that humans possess

It has developed dramatically through computer performance advancements, big data, and GPUs (Graphics Processing Units)

Recently, there is an increasing trend of research and implementation in the security field where vast events are accumulated in real-time

Code One's Security Research Lab conducts R&D by enabling efficient security event control and combining AI with security and data analysis technologies

Technologies such as source code security diagnosis, vulnerability management, immediate response to security issues, automatic processing, and recommendation of countermeasures are expected to further enhance security efficiency against increasingly intelligent cybercrime

Data Analysis

Data analysis aims at accurate predictions by systematically examining given data flows for better decision-making

Security data analysis requires high accuracy as it's an area where one must devote full attention to prevent mistakes and prepare for all possible incidents

To defend against increasingly sophisticated cyber threats, not only the capabilities of experts are important, but security solutions equipped with advanced analysis technologies are essential for active response

By utilizing AI-based data analysis techniques, it's possible to respond more agilely by quickly understanding a wide range of data

Code One's Security Research Lab develops meticulous data analysis technologies that reduce false positives while efficiently storing, searching, and reviewing vast event data generated from multiple heterogeneous security systems through AI utilization

This research enhances the detection of existing cyber attack patterns while proactively detecting and responding to new threats that have not existed before

Monitoring System

A monitoring system is a system that handles the pivotal management of systematically collecting and efficiently processing log information generated in large quantities in the operational environment

The collected logs enable tracking of various business activities within the organization and include important information related to system operating status and security matters

Traditional log management methods alone make it difficult to properly manage and analyze such large-scale log data, necessitating integrated and systematic data management using AI

Code One has introduced AI technology to monitoring systems to overcome these issues

Security Portal

A security portal is a security groupware configured to efficiently handle an organization's security tasks, providing all management points of security work to be processed in one place

It includes functions such as vulnerability analysis and assessment, information security education, countermeasure establishment, security monitoring, system access control, authority management, user authentication, information protection, information leakage prevention, and information protection management system process management

Code One provides easy access to security-related tasks or information to employees within the organization and ensures that all repetitive security tasks are processed in an integrated manner without omission or duplication for security personnel

By concentrating management points in one place, tasks are efficiently processed through the security portal, systematizing security work processes and security activities, and supporting real-time confirmation through dashboard functions

Smart Factory Security

A smart factory is a factory that utilizes advanced technology and information technology to automate and optimize the production process, featuring characteristics such as automation, data analysis, real-time monitoring, flexibility, and energy efficiency

By integrating cutting-edge technologies such as IoT devices, automated robots, and big data analysis, it maximizes production efficiency and realizes benefits in various aspects, not just increasing productivity, but improving product quality, reducing costs, and enhancing process flexibility

With the introduction of various advanced technologies included in smart factories, it is required to safely manage and analyze large-scale complex data, network structures, and vast data generated in the manufacturing process

Code One has developed AI-based smart security solutions to address the security issues of smart factories

AI can recognize and predict abnormal behavior patterns and is developing the ability to detect threats to smart factory systems in real-time and automatically respond to malicious actions from external sources

It supports the detection of anomalies in production lines through continuous monitoring for enhanced security and preventive measures, and the implementation of immediate security protocols to block cyber threats

By analyzing log data generated by industrial facilities, it identifies security vulnerabilities and suggests improvement measures, while the smart security system integrated with AI technology makes the security of smart factories more robust, providing functions that can respond quickly and intelligently to cyber threats