Predict your next investment

Security Platform company logo
SOFTWARE (NON-INTERNET/MOBILE) | Security Software
securityplatform.co.kr

See what CB Insights has to offer

Stage

Incubator/Accelerator | Alive

Total Raised

$2.78M

Mosaic Score

+10 points in the past 30 days

What is a Mosaic Score?
The Mosaic Score is an algorithm that measures the overall financial health and market potential of private companies.

About Security Platform

Security Platform (시큐리티플랫폼) provides security solutions for IoT devices.

Security Platform Headquarter Location

Suite #467, Information Security Cluster Enterprise Support Hub, 815 Daewangpangyo-ro, Sujeong-gu, Seongnam-si

Gyeonggi-do,

South Korea

+82 70 7613 0094

Latest Security Platform News

Fortinet : Addressing the Need for a New Security Platform

Oct 22, 2021

10/22/2021 | 01:34pm EDT Message : *Required fields Security platforms have been around for a while. When Next-Generation Firewalls (NGFW) appeared on the scene - able to blend several products into a single platform, reducing IT overhead and simplifying setups - they quickly became the cornerstone for security in nearly every organization worldwide. But many NGFW solutions are not without their own set of challenges. Far too often, the various technologies pre-loaded onto the device (firewall, IPS , VPN , web filtering , antivirus, and sandboxes ) do not work together seamlessly. While they may be wrapped in a single piece of sheet metal, many of its components actually require separate management consoles, and even run on different operating systems. Compounding the problem further, the quality of the technologies embedded within that single device is also frequently lacking. While such a platform may have a top-notch firewall, for example, the rest of the security roster may include a second-rate IPS or web filtering solution that customers will need to either just learn to live with, or that they will have to replace with another box. Such solutions defeat the whole purpose of buying an "integrated" solution, which is to simplify management and reduce vendor and solution sprawl through consolidation. Security Challenges in Today's Digital Landscape This challenge isn't limited to supposedly integrated devices. Today's digital landscape now consists of multi-cloud environments, data centers comprised of both physical and virtual infrastructures, distributed branch offices, mobile workers, and home offices. This ever-growing complexity means that simply placing a security device at the network edge is no longer sufficient. Complex challenges require seamless and integrated solutions. But due to the unique requirements and challenges of each new network environment, building a streamlined solution can be challenging. As a result, security solutions are often Frankensteined together across the network, creating further complexity and leading to security gaps. A recent IBM survey suggests there is an average of 45 security tools deployed inside any given organization, with each incident requiring coordination across 19 different tools. The key issue here is that these tools, whether deployed as separate solutions or as disparate tools wrapped inside a single box, are not natively designed for this level of interoperability. As a result, vendor and solution sprawl growing problems, preventing the use of automation to simplify processes and requiring the hand-correlation of threat intelligence to enable responses. IBM also reports that dwell time for security breaches is now measured in months, with costs exceeding $8.6 million per breach, in large part because cybercriminals can exploit the visibility gaps created by the inability to unify security functionality Three Critical Concepts for a New Security Platform A new approach is needed that weaves all critical security functionality into a unified solution that protects the entire network while enabling secure data and application access for users, regardless of location. To work in modern distributed network environments, an effective security platform must be built around the following three concepts: It must be deployable from anywhere: To be effective, a unified cybersecurity platform needs to work in traditional networks, run natively every cloud environment, exist in every possible form factor, and be deployable consistently and easily at every edge. This includes supporting traditional or highly distributed data centers, public cloud environments, branch offices, retail locations, home offices, and off-network mobile users. This enables a consistent level of protection, regardless of environment or geographical region. It must be fully integrated: An effective solution must include tools designed to function as a single, integrated system. Security solutions that are part of the same platform should either run on a common operating system, leverage open APIs, or be built using common standards. If done right, tools from different vendors can even be utilized while still maintaining interoperability. Integration should also go beyond just the security elements of a platform to include integration of networking, a concept known as security-driven networking . This enables security to respond automatically to network changes. And this should all be wrapped into a common management and orchestration system that extends visibility and control across the entire distributed network. It must support automation: Automation that leverages AI and machine learning is required to detect, investigate, and respond to the sophistication and speed of today's attacks. Such automation is only possible when security tools can function as a unified solution. Advanced management systems - including XDR , SIEM , and SOAR systems for NOCs and SOCs - are all enhanced when the devices being monitored and managed are designed to work together. A New Approach to Security Today's challenges require new security strategies and systems that can dynamically adapt alongside the networks they need to protect. A security platform has long been the right approach for organizations' security needs, but this idea requires updating for effectiveness in today's dynamic, high performance, hyperconnected networks. Such platforms must now be able to seamlessly span the entire network and adapt to an ever-evolving threat landscape. Designing such a platform around the three critical components of broad deployability, integration, and automation is key. This is a summary of an article written for Security Week by John Maddison, EVP of Products and CMO at Fortinet. The entire article can be accessed here . Find out how the Fortinet Security Fabric platform delivers broad, integrated, and automated protection across an organization's entire digital attack surface to deliver consistent security across all networks, endpoints, and clouds. Attachments

Predict your next investment

The CB Insights tech market intelligence platform analyzes millions of data points on venture capital, startups, patents , partnerships and news mentions to help you see tomorrow's opportunities, today.

Expert Collections containing Security Platform

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

Security Platform is included in 1 Expert Collection, including Internet of Things ( IoT ).

I

Internet of Things ( IoT )

3,149 items

Security Platform Patents

Security Platform has filed 4 patents.

The 3 most popular patent topics include:

  • Cryptography
  • Key management
  • ARM architecture
patents chart

Application Date

Grant Date

Title

Related Topics

Status

9/20/2017

Cryptography, Key management, Booting, Public key infrastructure, BIOS

Application

00/00/0000

00/00/0000

Subscribe to see more

Subscribe to see more

Subscribe to see more

00/00/0000

00/00/0000

Subscribe to see more

Subscribe to see more

Subscribe to see more

00/00/0000

00/00/0000

Subscribe to see more

Subscribe to see more

Subscribe to see more

Application Date

9/20/2017

00/00/0000

00/00/0000

00/00/0000

Grant Date

00/00/0000

00/00/0000

00/00/0000

Title

Subscribe to see more

Subscribe to see more

Subscribe to see more

Related Topics

Cryptography, Key management, Booting, Public key infrastructure, BIOS

Subscribe to see more

Subscribe to see more

Subscribe to see more

Status

Application

Subscribe to see more

Subscribe to see more

Subscribe to see more

Security Platform Web Traffic

Rank
Page Views per User (PVPU)
Page Views per Million (PVPM)
Reach per Million (RPM)
CBI Logo

Security Platform Rank

CB Insights uses Cookies

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.