Products
-
NeoBIS V2
An optimized system with agile
adaptability to the financial environment
and business scope of each country -
KCC-Automotive
SolutionService for effective comprehensive management from vehicle sales to management
-
DEXT5 Editor
An optimal web editor to help users
quickly and flexibly respond to the
growing demands of web standards and
compliance with accessibility requirements -
DEXT5 Upload
Korea's first commercialized solution
based on HTML5 technology and
complying with web standards and
accessibility requirements -
Trans-Act
A video streaming solution supporting
a complete cross-platform -
Stone Pass
Next-generation user authentication technology that integrates all authentication processes into one system
-
eGenTouch4U
A new type of book management system that is flexible for libraries to choose the functions they need to meet their unique requirements
-
ITSM4U
A service-centered process to provide IT services at a reasonable price and with minimal risk
-
Insight-Eye
A solution that integrates and analyzes internal data of a company and customers' responses across social media channels
-
Arista Networks
A modern core architecture that provides image consistency, in-service upgrades and application scalability
-
Nutanix
An all-in-one system integration virtualization solution for optimizing the performance of virtual machines operated in a virtualized environment
-
F5 Networks BIG-IP
PlatformProvides applications for IT infrastructure
integration and flexible application
service implementation -
Riverbed
A company that provides an
all-encompassing IT performance
enhancement platform for the WAN-based
enterprise environment
-
WareValley
An expert database security
solution expert company -
CounterACT
An automated security platform for
network access control -
FORTINET
Provides security access products
that make up an organic fabric -
FireEye
An effective response to cyber
exploits and attacks -
Rapid7
Provides direction of security policies
to protect important IT assets and
information from external attacks