Advanced Search
Search Results
17 total results found
Introduction
This document will be continuously updated, and not all the features presented may be fully implemented.Some parts of the content are based on the Markov project. Overview Unified Security Platform is to provide real-time security monitoring and response ser...
Security Events Collection and Analysis
Agent-Based Log Collection The platform leverages agent-based log collection capabilities, utilizing the Wazuh agent for comprehensive security event monitoring and analysis. Supported Operating Systems The Wazuh agent can be deployed on a wide range of ope...
Vulnerability Management
Agent-Based Vulnerability Detection The platform provides comprehensive vulnerability analysis based on operating system and package information collected from deployed agents. Data Collection Agents gather detailed information about the host's operatin...
Security Configuration Assessment
The system offers a comprehensive Security Configuration Assessment feature that evaluates the security settings of registered customer assets. This functionality ensures adherence to industry best practices and company security policies. Automated Configurat...
Cloud Security Posture Management
The system offers comprehensive Cloud Security Posture Management (CSPM) capabilities for major public cloud platforms, including Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). This feature provides in-depth security analysis at t...
Network Flow Information Collection and Analysis
The platform collects, visualizes, and analyzes network flow information from various sources, including NetFlow/IPFIX from network switches and VPC flow logs from public cloud services. Network flow data is correlated with threat intelligence feeds to perform...
GRC Assessment and Evidence Management
GRC : Governance, Risk & Compliance The system offers comprehensive assessment reporting capabilities for key compliance audits and certifications, including ISO, PCI-DSS, and ISMS-P. This feature is designed to assist customers in ensuring adherence to vario...
Topics to discuss [TBD]
LLM/SLM Integration Anomaly Detection & MLOps Automated Response Federated Authentication
Dashboard
Getting Started Logging In with an Accessible User Account To begin, log in using a user account with access privileges.You can find more options for user authentication. This guide is based on SKT’s SmartWAN Portal. Updates will be continuously applied...
Detection & Response
Cases The user can access the cases menu, which is under Detection & Response. Case List The Case List screen in the SmartWAN Portal, accessible under the "Detection & Response" section, provides a detailed list of cases generated by analyzing event l...
Assets
Assets
Endpoint
Endpoint
Report
Event Report The Event Report menu can be found in the Report section of the left sidebar. Event Report List The Event Report menu in the SmartWAN Portal displays a list of generated reports for events. Accessible under the "Report" section, it inclu...
Configuration
configuration
Authentication
SmartWAN Portal Login When you access the SmartWAN Portal, you will encounter the login screen as shown in the image below. This screen allows users to authenticate and access the portal's features. Input Fields: Email Address or ID: A field where u...
Overview
SmartWAN Portal The SmartWAN Portal provides a centralized, real-time interface for comprehensive security monitoring and management across hybrid IT environments. Designed to integrate on-premises and cloud-based security data, the dashboard offers a un...
Home Screen
Some features described below are currently in the prototype stage and are scheduled for future implementation. Upon logging in to the SmartWAN Portal, the Home Screen automatically appears, providing a comprehensive overview of network and security ev...