our technology

Digital Content is ESSENTIAL
in Business Communication

Malicious cyber attacks are evolving. Threat techniques which can evade existing security systems are increasing day by day.
Detecting and blocking the new and unknown pattern requires new cutting-edge technology.

SecuLetter MARS Platform

Enhanced Standard Layers & Cutting-edge APT Protection

SecuLetter compensates the existing signature and behavior based APT solution vulnerability and deliver the most advanced threat detection capabilities defend against the malicious code attack by automated reverse-engineering analysis.

threat analysis 01 static analysis
Static Analysis
threat analysis 02 cti and ai analysis
CTI & AI Analysis
threat analysis 03 dynamic analysis
Dynamic Analysis
cdr 01 identify active content
Identify
Active Content
cdr 02 remove active content
Remove
Active Content
cdr 03 reconstruct content
Reconstruct
Content
debugger analysis 01 principle of vulnerability occurrence
Principle of Vulnerability Occurrence
debugger analysis 02 cve vulnerability
CVE
Vulnerability
debugger analysis 03 process stack
Process
Stack
debugger analysis 04 memory
Memory
debugger analysis 05 execution flow manipulation
Execution Flow Manipulation
debugger analysis 06 obfuscation script decoding
Obfuscation Script Decoding
threat analysis 01 static analysis
Static Analysis
threat analysis 02 cti and ai analysis
CTI & AI Analysis
threat analysis 03 dynamic analysis
Dynamic Analysis
cdr 01 identify active content
Identify
Active Content
cdr 02 remove active content
Remove
Active Content
cdr 03 reconstruct content
Reconstruct
Content
debugger analysis 01 principle of vulnerability occurrence
Principle of Vulnerability Occurrence
debugger analysis 03 process stack
Process
Stack
debugger analysis 05 execution flow manipulation
Execution Flow Manipulation
debugger analysis 02 cve vulnerability
CVE
Vulnerability
debugger analysis 04 memory
Memory
debugger analysis 06 obfuscation script decoding
Obfuscation Script Decoding

Competitive Advantage

We proactively defend against unknown cyber attacks before they occur.

competitive advantage

Assembly Level Diagnosis

Accurate Diagnosis Rate, Reduce False Positive/Negative

5 Times Faster

Reduce 80% of Diagnosis Time vs APT Solution

Neutralize Evasion Technique

Detect and Block Malware to Evade Diagnosis

Unknown Threat Detection within 20 Seconds

Fundamental Defense Technology against Sophisticated Malware Attacks.

Virus, Worm, Trojan

APT Attack: PE File(exe, dll, sys)

APT Attack: Non-PE File(MS Office, PDF, etc)

Signature Based Defense

Detects only known malicious attacks referring to signature-based engine.

Behavior

Unable to detect evasive threat which does not take any action in virtual machine.

Reverse Engineering Based Defense

Detects unknown evasive threats, zero-day attack, malicious code with no behavior.

1st Generation

  • Security Technology
    Signature Based Defense
  • Security Vulnerability & Response
    Detects only known malicious attacks referring to signature-based engine.

2nd Generation

  • Security Technology
    Behavior Based Defense
  • Security Vulnerability & Response
    Unable to detect evasive threat which does not take any action in virtual machine.

3rd Generation

  • Security Technology
    Reverse Engineering Based Defense
  • Security Vulnerability & Response
    Detects unknown evasive threats, zero-day attack, malicious code with no behavior.