IT Services

Overview

HYUNDAI MOVEX offers comprehensive integrated security management systems that include consultations, application of security solutions, and operation services for the protection of our clients’ information assets. By establishing the systems, processes, and infrastructure necessary for the security of client data assets we can offer safe and trustworthy operation of client information assets..

Details of offered integrated security services
Security consultations
  • Vulnerability analysis consultation
  • Information security safety diagnosis consultation
  • Integrated verification and privileges management consultation
  • Personal information security consultation
  • Data Loss Prevention (DLP) consultation
  • Integrated security consultation including security diagnosis, analysis/design, establishment of MP, and security system life cycle management
  • Acquisition of security certification (ISO27001) support consultation
Establishment of security solutions
  • Client (PC/notebooks, etc.) security solutions
  • Network/server/application security solutions
  • Physical security solutions
  • Personal information protection effect evaluation system
  • Integrated security control system
  • Virtualization solutions (client virtualization, SBC)
  • RSA based security solutions (APT, forensics, password protection, verification)
Security operation and control
  • Operation and maintenance of security solutions
  • Integrated security control
  • Security portal

Features

  • Create systematic and effective security measures through a medium-long term security blueprint
  • Protect the value of information assets through the cultivation of a safe security environment
    • Prevent unlawful usage of information assets and prevent external exposure
    • Cultivate trust in your information assets
  • Establish a disaster response system through the establishment of an integrated security control system
    • Establish a basis from which rapid responses can be made to changes in the environment through the unification of security management
  • Establish a systematic security process, improve awareness of the importance of information assets by strengthening the security group and its role, and instill an information security mindset internally
Korean Chinese