PNPSECURE Security Solution

PNPSECURE Security Solution

What is Zero Trust? 


Zero Trust is a security framework for securing data for today's digital transformation, assuming that digital threats always exists outside and also inside the network. 


The main motto behind the framework is “never trust, always verify,” meaning that no device or person, whether external or internal, should be trusted by default. 


It prevents various security threats in digital work environments such as telecommuting and remote work, by identifying users based on "who" rather than "when and where they are," and also by controlling access to data based on user verifications results. 

Who is it?

Identity Authentication

Powerful authentication method

Convenient Verifying Procedure

Is it Permitted?

Access Management

Continuous validation of access 

Logging and real-time monitoring 

Main Principles of

Zero Trust 


Strengthened

User Authentication 

__

Creating authentication policies 

by setting reliability in subjects accessing resources as a key factor



Micro

Segmentation 

__

Storing each resource separately in a single network protected by a gateway, and continuing user verification process over access requests 



Software

Defined Boundaries 

__

Using SDP technique to dynamically configure

the network following policy engine decisions, 

and also to form data channels for resource access after securing user-reliability


PNPSECURE

Zero Trust


With Vision AI technology, PNPSECURE's Zero Trust security model eliminates implicit trust in user intent, time, and space by performing continuous user authentication based on facial information

__
Facial Information 

Powerful user authentication system utilizing facial information, which is free from risk of leakage or forgery 

__
Implicit Continuous Authentication 

Convenient, swift work environment

by minimizing user-intervention with automatic facial information detection system

__
Access and Permission Management 

Repetitive user authentication

not only at the time of resource access,

but also at the time of resource use, such as command execution, or data download 

__
Audit Logs Monitoring 

Automatic audit logging and real-time

policy violation status monitoring system 

Expected Benefits 

Zero Trust 01

User Intent 

__

Eliminates possibility of important

data or authentication information leakage by authorized internal users, with powerful and continuous authentication 

Zero Trust 02

Validation Time 

__

Prevents risk of business information leakage through unauthorized manipulation of devices or privilege escalation attack, during valid time after initial authentication by real-time facial information detection and permission control 

Zero Trust 03

Workspace

__

Prevents Vusual-Hacking such as third-party person watching the screen or camera shooting outside the office, with object detection and automatic work screen blocking functions 

Key Features

User verification for
each work process

Provides detailed access and permission control policy settings to verify user identity not only at the time of first-time access but also as the actual user performs the task, even on a command basis 


VIsion AI technology

Detects camera lenses and fake authenticaion with a multi-AI engine which has passed Korean official facial authentication test with 100% accuracy


Verified Product Lineup

Suppoorts reliable installation and operation with 6,000+ clients experience


Minimum resource

for management

Enables integrated management for user accounts across heterogeneous devices, or multi/hybrid cloud environments, by linking with existing business security or personnel systems

PNPSECURE

Zero Trust Model


realizes the data security of Korean companies and public institutions by fully complying with related Korean regulations

Ministry of Science and ICT

 Zero Trust Guideline V1.0

Zero Trust based response methods

[ Distrust and deny all access

until reliability is determined ]



Monitor and analyze 
corporate network insider behavior


· Detect and block abnormal behavior
· Collect and store surveillance log
· Provide statistics on the status of

  abnormal behavior
· Support point-of-occurrence

  log lookup 


Give minimum authorization
based on precise 
user reliability judgement


· Perform powerful user identification
  based on facial information
· Continue user authentication for

  each work process after first access 


Financial Supervisory Service 

Passwordless policy 

Introduction and expansion of authentication methods 

to replace passwords 

____

Advance authentication methods to 

privately owned device-based authentication

(identification, mobile OTP, etc.),

biometric authentication (fingerprints, irises, facial recognition, etc.), or equivalent means

What is Zero Trust?

Zero Trust is a security framework for securing data for today's digital transformation,

assuming that digital threats always exists outside and also inside the network.


 The main motto behind the framework is “never trust, always verify,”

meaning that no device or person, whether external or internal, should be trusted by default.


It prevents various security threats in digital work environments such as telecommuting and remote work,

by identifying users based on "who" rather than "when and where they are,"

and also by controlling access to data based on user verifications results. 

Who is it?

Identity Authentication

·  Powerful Authentication Method 
·  Convenient Verifying Procedure 

Is it Permitted?

Access Management

·  Continuous Validation of Resource Access 
·  Logging and Real-Time Monitoring 

Main Principles of Zrero Trust

Micro Segmentation 

___

Storing each resource separately 

in a single network protected 

by a gateway, and continuing

user verification process

over access requests  


Strengthened

User Authentication 

___

Creating authentication policies by setting reliability in subjects accessing resources as a key factor



Software Defined Boundaries 

___

Using SDP technique to dynamically configure the network following policy engine decisions, and also to form data channels for resource access after securing user-reliability 

PNPSECURE Zero Trust

With Vision AI technology, PNPSECURE's Zero Trust security model eliminates implicit trust in

user intent, time, and space by performing continuous user authentication based on facial information 

Employees

Contractors

Partners

Facial Information 


Powerful user authentication system utilizing facial information, which is free from risk of leakage or forgery 

Continuous Authentication 


Convenient, swift work environment by minimizing user-intervention with automatic facial information detection system 

Access and Permission Management 


Repetitive user authentication not only at the time of resource access, but also at the time of resource use, such as command execution, or data download  

Audit Logs Monitoring 


Automatic audit logging and
real-time policy violation status monitoring system  

Server

Network

Application

DBMS

Expected Benefits 

Zero Trust 01

User Intent 


__

Eliminates possibility of important data or authentication information leakage by authorized internal users, with powerful and continuous authentication 



Zero Trust 02

Validation Time 


__

Prevents risk of business information leakage through unauthorized manipulation of devices or privilege escalation attack, during valid time after initial authentication by real-time facial information detection and permission control 

Zero Trust 03

Workspace 


__

Prevents Vusual-Hacking such as 
third-party person watching the screen or camera shooting outside the office, with object detection and automatic work screen blocking functions 



Key Features


User verification for each work process 
Provides detailed access and permission control policy settings to verify user identity not only at the time of first-time access but also as the actual user performs the task, even on a command basis 

VIsion AI technology 
Detects camera lenses and fake authenticaion with a multi-AI engine which has passed Korean official facial authentication test with 100% accuracy 

Verified Product Lineup 
Suppoorts reliable installation and operation with 6,000+ clients  



Minimum resource for management 
Enables integrated management for user accounts across heterogeneous devices, or multi/hybrid cloud environments, by linking with existing business security or personnel systems 

Zero Trust Security Model of PNPSECURE
realizes the data security of Korean companies and public institutions
fully complying with related Korean regulations 
Ministry of Science and ICT 
Zero Trust Guideline V1.0 

Zero Trust based response methods

[ Distrust and deny all access until reliability is determined ]



Monitor and analyze 
corporate network insider behavior 

Give minimum authorization based on precise user reliability judgement 


·  Detect and block abnormal behavior 
·  Collect and store surveillance log 
·  Provide statistics on the status of 
   abnormal behavior 
·  Support point-of-occurrence log lookup 

·  Perform powerful user identification 
   based on facial information 
·  Continue user authentication 
   for each work process after first access 

Financial Supervisory Service 
Passwordless policy 

Introduction and expansion of authentication methods to replace passwords


_____________


Advance authentication methods to 

privately owned device-based authentication(identification, mobile OTP, etc.), 

biometric authentication (fingerprints, irises, facial recognition, etc.), or equivalent means 

Related Products 

Facial Biometric Authentication
Security 

FaceLocker



Database Access Management
  

DBSAFER DB



System Access Management
  

DBSAFER AM


PNPSECURE | 107-86-44093

CEO Cheon-Oh, Park

Tel. 1670-9295 |E-mail sales@pnpsecure.com 

182, Magokseo-ro, Gangseo-gu, Seoul, Republic of Korea (Magok-dong) 


Privacy Policy

Copyright ⓒ 2023 pnpsecure All rights reserved.


PNPSECURE | 107-86-44093

CEO Cheon-Oh, Park

Tel.   1670-9295          E-mail sales@pnpsecure.com

182, Magokseo-ro, Gangseo-gu, Seoul, Republic of Korea (Magok-dong) 


Copyright ⓒ 2023 pnpsecure All rights reserved. |Privacy Policy