Secure Cloud Service from Security Threats

Samsung SDS Cloud’s strengthened security system effectively addresses security threats. Through 24/7 real-time monitoring and security control, it safeguards customer data and supports customer business continuity in any case.

Secure Cloud Service from Security Threats

Products and Key Features

Anti-DDoS Monitoring

Analysis and blocks against massive inflows of network traffic which may paralyze the service

What you need

  • -

    Different responses depending on the types of DDos attacks

  • -

    Measures to respond to a high-volume DDos attack

Key features

  • -

    24/7 real-time monitoring and security control

  • -

    Tabletop exercise performance or drill exercise upon customer request

  • -

    Automatic blocking service for DDoS attacks (consultation required)

  • -

    High-volume DDos attack prevention through an outside shelter that distributes traffic

  • -

    DDoS analysis report

Firewall

Intrusion blocks to protect internal networks

What you need

  • -

    IP address blocks and access logs in a cloud environment, which is difficult on public clouds

Key features

  • -

    Network traffic monitoring and traffic allowance/blocks based on rule sets

IDS Monitoring

Security control through IDS solution

What you need

  • -

    No unnecessary alerts for just suspicion of a possible attack

  • -

    Exact information on how an attack affected the service

Key features

  • -

    24/7 real-time monitoring and security control

  • -

    Constant monitoring and analysis on detecting abnormal usage or attacks on vulnerabilities

  • -

    Real-time detection and attack reproduction to increase accuracy of analysis

  • -

    Analysis report on intrusion attempts

WAF

Web application security solution

What you need

  • -

    An additional layer of security to secure coding to address any unanticipated vulnerabilities

Key features

  • -

    Security service specialized in web applications

  • -

    Detections based on attack patterns analysis to maintain high level of security

Let's talk

Whether you're looking for a specific business solution or just need some questions answered, we're here to help.