Intelligent website security with ML-based threat detection.

Hacking tactics are growing more sophisticated every day. Just monitoring is not enough to spot evolving threats.
STORM AI for Web helps you control security operations efficiently and meticulously with the power of machine learning.


What’s special about STORM AI for Web

  • Advanced web security monitoring (control) capability

    It’s difficult to fight against constantly evolving cyber threats if you just rely on traditional security solutions and tools. But with our advanced threat detection technology powered by AI, you can respond to known and unknown threats quickly, proactively and flexibly.

  • Streamline web monitoring process

    Promote efficiency of security operations by automating threat detection and analysis processes. SOC analysts can group, refine and visualize the events they need to handle every day.


Take a closer look

  • Higher intrusion detection rate

    Constantly train your model to better detect true positives and lower false positives/false negatives.
    Utilize supervised/unsupervised learning guided by Samsung SDS’s security expertise and clustering analysis technique.

  • Insightful visualization of web attacks

    View real-time status of threat landscape on the web. Gain a more intuitive understanding of hacking activities, get actionable insights and prioritize your response.


  • Supervised learning, guided by security expertise
    Learns to automatically label web logs using rule-based analysis technique.
  • Unsupervised learning with multiple models
    Analyzes web-server access logs from various angles and learns from the results.
  • Learning from human feedback
    Constantly improves AI performance through human feedback
  • Threat visualization
    Provides useful insights to analysts and operators in visualized forms such as per-domain tree graphs of attacked URIs, dashboards, etc.
  • Automatic verification
    Identifies attacks that can actually penetrate the protected web server by automatically verifying the effectiveness of attacks with Event Verification System. (optional)
  • Customizable models
    Enables users to create, evaluate and simulate their own AI models, and select the best one. (optional)

Latest news and insights

What’s new and what’s next


    Find out more about our offerings


    Manage accounts and access for various IT infrastructures from cloud to on-premise from a single access point. Experience the simplicity and agility of IT system operation with EAMS.


    The optimized APT inspection system prevents a security violation.


    SentinelOne visualizes the events at end point, the starting point of cyber attacks and analyzes, responds, and treats the events thus protecting your information assets from cyber attacks.

    Monitoring an overuse of inside information

    Big data platform ensures an integrated visibility of flow on the use of personal and confidential information, detects the flow under the scenarios to prevent security incidents and improves enterprise’s competitiveness.


    ESCORT prevents information leaks and addresses weak points effectively based on the 20 year of know-how Samsung SDS has gained. Make sure your critical information assets secured strong and sound with ESCORT.

    Let's talk

    Whether you're looking for a specific business solution or just need some questions answered, we're here to help.