MANAGEMENT OF
PERSONAL INFORMATION
ACCESS HISTORY
FULLY CONPLYING WITH
SECURITY REGULATIONS


____


INFOSAFER logs and provides a real-time monitoring feature for all logins and activities of users who access the personal information processing system through all routes (3-tier/2-tier) to ensure that all security criteria are met.

Complies with key Korean regulations

Personal Information Protection Act

Personal Information Protection Commission's
Personal Information Safeguared
and Security Standard

Expected Benefits

Expected Benefits 01

Simplified examination of personal information status

__

INFOSAFER's data can be used as proof that the company has met security criteria for audits such as inspection for personal information security standards. INFOSAFER guarantees swift and efficient examination of personal information status by providing clients with examination reports that faithfully meet their needs.


Expected Benefits 02

Blocked the primary source of insider data leaks

__

INFOSAFER not only manages the access history of users who access the personal information processing system via Web/WAS but also the administrators and developers who directly access the DB. Additionally, it blocks others from modifying and counterfeiting administrator history and leaking data via encryption and WORM features which prevent data modification.

Expected Benefits 03

Increased work efficiency and resource utilization

__

INFOSAFER allows clients to automatically locate personal information and update them regularly via the DBSCANNER module without having to install a separate agent. This allows clients to more easily manage data and increase work efficiency via versatile, flexible monitoring.


Key Features

Creates personal information access history across all routes

INFOSAFER possesses linking modules that cover various client environments such as CS and Web/WAS. Furthermore, it also manages the access history of senior administrators and developers who can directly access DB via other routes.


Saves information safely without concerns about log counterfeiting/modification

INFOSAFER blocks the primary source of insider data leaks by not only encrypting and saving audit logs, but also saving the hash value of the original data in the WORM area, supporting data integrity checks along with data backup/repair.


Keeps resource data up-to-date and prevents omission of personal data

INFOSAFER can automatically identify and discover personal information scattered throughout servers using the DBSCANNER module without having to install an agent. Additionally, it also provides clients with a scheduling feature and statistical reports which allow them to regularly check the personal information status.


Monitors personal information access history and analyzes threats

The client can set detection rules that fit their company by combining various monitoring conditions such as user info (IP, USER, APP), task info, and performed tasks to maximize threat detection rate.


Detects and requests explanation for abnormal activities

Upon detecting abnormal behavior from a user such as a sudden increase in the use of personal information above the average rate, a notification regarding the occurrence of the abnormal behavior is sent to the dashboard as well as the e-mail/SMS. Afterward, INFOSAFER automatically requests the target to explain the unusual activity, allowing the client to swiftly check the status of personal information use.


Provides various reports

INFOSAFER provides diverse maintenance reports optimized based on various references from sectors such as public, finance, and e-commerce. These reports can be used as proof in various audits and inspections.

MANAGEMENT OF PERSONAL INFORMATION ACCESS HISTORY
THAT FULLY COMPLIES WITH SECURITY REGULATIONS

____

INFOSAFER logs and provides a real-time monitoring feature for all logins and activities of users who access the personal information processing system through all routes (3-tier/2-tier) to ensure that all security criteria are met


Complies with key Korean regulations

Personal Information Protection Act

Personal Information Protection Commission 's Personal Information Safeguard and Security Standard

As the Personal Information Protection Commission has propelled their plan to strengthen regulations for the management of access history,
it has now become necessary for companies to create and save access history for not just 3-tier users who access via application systems,
but also 2-tier users who directly access via OS and DB

Configuration
Overview

Manager server operated

Compared to the agent method that requires file creation and transfer, INFOSAFER has a very low risk of placing a load or creating an error in the WAS server because it has a simple task of only transmitting some of the data that are operating in the WAS server to the INFOSAFER manager server.

Expected Benefits

Expected Benefit 01

Simplified examination
of personal information status

____

INFOSAFER's data can be used as proof that the company has met security criteria for audits such as inspection for personal information security standards. INFOSAFER guarantees swift and efficient examination of personal information status by providing clients with examination reports that faithfully meet their needs.

Expected Benefit 02

Blocked the primary source of
insider data leaks

____

INFOSAFER not only manages the access history of users who access the personal information processing system via Web/WAS but also the administrators and developers who directly access the DB. Additionally, it blocks others from modifying and counterfeiting administrator history and leaking data via encryption and WORM features which prevent data modification.

Expected Benefit 03

Increased work efficiency
and resource utilization

____

INFOSAFER allows clients to
automatically locate personal
information and update them regularly
via the DBSCANNER module without
having to install a separate agent. 
This allows clients to more easily
manage data and increase work 
efficiency via versatile, flexible monitoring.

Key Features

Creates personal information access history across all routes

INFOSAFER possesses linking modules that cover various client environments such as CS and Web/WAS. 
Furthermore, it also manages the access history of senior administrators and developers who can directly access 
DB via other routes.

Saves information safely without concerns about 
log counterfeiting/modification

INFOSAFER blocks the primary source of insider data leaks by not only encrypting and saving audit logs, 
but also saving the hash value of the original data in the WORM area, supporting data integrity checks 
along with data backup/repair.

Keeps resource data up-to-date and prevents omission of personal data

INFOSAFER can automatically identify and discover personal information scattered throughout servers 
using the DBSCANNER module without having to install an agent. Additionally, it also provides clients 
with a scheduling feature and statistical reports which allow them to regularly check the personal information status.

Monitors personal information access history and analyzes threats

The client can set detection rules that fit their company by combining various monitoring conditions 
such as user info (IP, USER, APP), task info, and performed tasks to maximize threat detection rate.

Detects and requests explanation for abnormal activities

Upon detecting abnormal behavior from a user such as a sudden increase in the use of personal information above 
the average rate, a notification regarding the occurrence of the abnormal behavior is sent to the dashboard as well as the e-mail/SMS. Afterward, INFOSAFER automatically requests the target to explain the unusual activity, 
allowing the client to swiftly check the status of personal information use.

Provides various reports

INFOSAFER provides diverse maintenance reports optimized based on various references from sectors 
such as public, finance, and e-commerce. These reports can be used as proof in various audits and inspections.

Configuration Overview

Manager server operated

Compared to the agent method that requires file creation and transfer, INFOSAFER has a very low risk of placing a load or creating an error in the WAS server because it has a simple task of only transmitting some of the data that are operating in the WAS server to the INFOSAFER manager server.

Related Products 

Database Access Management
  

DBSAFER DB



Integrated Account Management
  

DBSAFER IM



File/Process Access Management
  

DATACRYPTO


Facial Biometric Authentication
Security 

FaceLocker



PNPSECURE | 107-86-44093

CEO Cheon-Oh, Park

Tel. 1670-9295 |E-mail sales@pnpsecure.com 

182, Magokseo-ro, Gangseo-gu, Seoul, Republic of Korea (Magok-dong) 


Privacy Policy

Copyright ⓒ 2023 pnpsecure All rights reserved.


PNPSECURE | 107-86-44093

CEO Cheon-Oh, Park

Tel.   1670-9295          E-mail sales@pnpsecure.com

182, Magokseo-ro, Gangseo-gu, Seoul, Republic of Korea (Magok-dong) 


Copyright ⓒ 2023 pnpsecure All rights reserved. |Privacy Policy