Network Improvement with SDN
We implement a secure upgrade from wired LAN to wireless LAN, enhance network visibility and
resilience, integrate intrusion detection and prevention through unified threat filtering, and
establish secure remote connection VPN and site-to-site VPN.
Implementation of ZTNA/SASE
Transitioning away from centralized perimeter defense models, we adopt Zero Trust Network Access
(ZTNA) methods, implementing ID authentication, device posture assessment, application-level
micro-segmentation, and session management.
Defense through CSIRT/SOC
We offer support for building CSIRT systems to institutionalize incident response, starting with the
analysis and improvement planning for network and endpoint operations. Additionally, we provide SOC
functions based on SIEM-driven security log analysis.