ensun logo
Locations
Company type
Result types
Industries
Employees
Founding year
background

Top Threat Intelligence Companies in South Korea

The B2B platform for the best purchasing descision. Identify and compare relevant B2B manufacturers, suppliers and retailers

Close

Filter

Result configuration


Continents


Locations


Result types


Company type


Industries


Company status

Number of employees

to

Founding year

to

Clear filters

12 companies for Threat Intelligence in South Korea

Sort by:

Relevance

S2W's Logo

S2W

Seongnam-si, South Korea

A

- Employees

2018

Key takeaway

S2W utilizes AI-based detection technology to conduct thorough analyses of virtual asset transactions and monitor illegal activities, making it a key player in threat intelligence. Their platform specifically addresses a range of threats, including those related to cryptocurrency and ransomware, by quickly detecting and analyzing leak information to protect customers from external threats.

Reference

Service

Threat Intelligence

TI quickly detects various leak information by reviewing and analyzing DDW threat data and protects customers from external threats.

Mandiant Korea's Logo

Mandiant Korea

Seoul, South Korea

A

11-50 Employees

-

Key takeaway

Mandiant, now part of Google Cloud, specializes in cyber threat intelligence, offering products and services that support their mission to defend against cybercrime. Their Mandiant Breach Analytics for Chronicle combines industry-leading threat intelligence with advanced security operations, enabling early detection of threats and providing insights into critical areas of cyber defense.

Reference

Core business

Cyber Security Threat Intelligence Solutions & Managed Services

Mandiant provides solutions that protect organizations against cyber security attacks, leveraging innovative technology and expertise from the frontlines.

지니언스(GENIANS)'s Logo

지니언스(GENIANS)

Anyang-si, South Korea

A

51-100 Employees

2005

Key takeaway

Genians integrates with IBM's Resilient SOAR system to analyze threat intelligence, allowing for the rapid and secure isolation of nodes with identified security threats in the network. This approach aims to protect the network services of clients effectively.

Reference

Product

IBM - Resilient 연동 - Genians

SOAR 시스템인 IBM사의 Resilient에서 분석한 위협정보를 근거로 보안위협이 존재하는 노드를 네트워크에서 격리하여, 고객사의 네트워크 서비스를 신속하고 안전하게 보호하기 위해 연동하는것이 목적입니다.

Looking for more accurate results?

Find the right companies for free by entering your custom query!

25M+ companies

250M+ products

Free to use

NORMA Inc.'s Logo

NORMA Inc.

Seoul, South Korea

A

11-50 Employees

2011

Key takeaway

Norma, a global IoT and quantum security specialist, enhances information security through ISMS-P certification, compliance models, and penetration testing, while also fostering a strong security culture within organizations. Their expertise in cloud security certification and innovative solutions positions them as a key player in the threat intelligence landscape.

Reference

Product

글로벌 IoT & 양자 보안 전문 기업 - 노르마

IoT 보안 솔루션과 컨설팅 서비스를 제공하는 양자 보안 전문 기업입니다.

Suprema's Logo

Suprema

Seongnam-si, South Korea

A

501-1000 Employees

2000

Key takeaway

Suprema is a prominent global innovator in cybersecurity, specializing in access control and AI-based biometric solutions, highlighting its expertise in security technology.

Reference

Product

Suprema | Security & Biometrics

Suprema is a global leader in biometrics and securities technology.

Lockin Company's Logo

Lockin Company

Seongnam-si, South Korea

A

11-50 Employees

2013

Key takeaway

LIAPP is a robust mobile app security solution that offers advanced hacking defense and threat detection features. It provides detailed reports on device information and connections, which are essential for effective threat intelligence.

Reference

Core business

LIAPP | The easiest and powerful mobile app security solution

ust one click for source code encryption and obfuscation,Anti-Tamper,Unity protection,rooting detection, string encryption, etc

Insignary's Logo

Insignary

Seoul, South Korea

A

11-50 Employees

2016

Key takeaway

Insignary focuses on enhancing security through its Clarity solution, which identifies security and compliance issues in open source code by using unique fingerprint matching technology. This capability is crucial for threat intelligence, as it allows for the examination of binary code against known vulnerabilities in open source components.

Reference

Core business

insignary

Solution for Identifying Open Source Security and Compliance Issues in Binary Code

Erudite Risk's Logo

Erudite Risk

Seoul, South Korea

A

11-50 Employees

2013

Key takeaway

Erudite Risk offers customized intelligence products that address various areas of the risk ecosystem, emphasizing their commitment to providing relevant and actionable insights. Their trained personnel ensure that the intelligence provided aligns with the specific goals and needs of organizations.

Reference

Service

Security – Erudite Risk

eNsecure's Logo

eNsecure

Seoul, South Korea

A

11-50 Employees

2008

Key takeaway

The company emphasizes its commitment to continuous growth in the IT security sector, which is crucial for addressing emerging threats. They have developed a real-time diagnostic system and implemented code security analysis, highlighting their proactive approach to threat intelligence.

Reference

Product

모바일 DNA 보안

Zimperium - 짐페리움

Security Office's Logo

Security Office

Seoul, South Korea

A

1-10 Employees

2014

Key takeaway

Security Office leverages its extensive expertise and real-world experience to protect clients' information and assets from cyber attacks. Through collaboration among various specialists, they effectively prevent cybersecurity threats, making them a trusted strategic information security advisor for over 30% of the top 100 companies in the Nordic region.

Reference

Core business

시큐리티 오피스 :: Security Office - Part of Truesec

당신의 안전한 디지털 미래를 위해 노력합니다. 시큐리티 오피스의 축적된 노하우와 실전 경험을 토대로 사이버 공격으로부터 고객의 정보와 자산을 보호하세요.


Related searches for Threat Intelligence

Technologies which have been searched by others and may be interesting for you:

Products and services for Threat Intelligence

A selection of suitable products and services provided by verified companies according to your search.

Product: Source Recommendation Assessment

Service

Source Recommendation Assessment

Go to product


Use cases around Threat Intelligence

A selection of suitable use cases for products or services provided by verified companies according to your search.

UseCase: FInding the optimal Threat Intelligence

Use case

FInding the optimal Threat Intelligence

MSSP, Security

Ticura enriches existing threat intelligence programs with data from over 870 sources of network, public cloud, SaaS, endpoint and identity telemetry. Then, leveraging its proprietary detection engine, data science and machine learning, Ticura analyzes and surfaces the anomalies, incidents and threats to deliver optimal protection for your organization.

UseCase: FInding the optimal Threat Intelligence

Use case

FInding the optimal Threat Intelligence

MSSP, Security

Ticura enriches existing threat intelligence programs with data from over 870 sources of network, public cloud, SaaS, endpoint and identity telemetry. Then, leveraging its proprietary detection engine, data science and machine learning, Ticura analyzes and surfaces the anomalies, incidents and threats to deliver optimal protection for your organization.

Information about Threat Intelligence in South Korea

When exploring the Threat Intelligence industry in South Korea, several key considerations emerge. The regulatory landscape is crucial, as the country has stringent data protection laws, including the Personal Information Protection Act (PIPA), which impacts how companies handle sensitive information. Understanding these regulations is vital for compliance and operational success. The competitive landscape is marked by a mix of established firms and emerging startups, creating opportunities for innovation and collaboration. The increasing frequency of cyber threats has heightened demand for threat intelligence solutions, making it a promising sector for investment and growth. Additionally, South Korea's advanced technology infrastructure supports the development of sophisticated threat detection and response systems. Environmental concerns related to data centers and technology use are gaining attention, prompting firms to adopt greener practices. Companies must also consider the global market relevance, as South Korea plays a significant role in the Asia-Pacific region's cybersecurity efforts. Collaborating with international partners can enhance capabilities and expand market reach. Overall, a comprehensive understanding of regulatory requirements, market dynamics, and technological advancements is essential for anyone aiming to enter the Threat Intelligence industry in South Korea.


Insights about the Threat Intelligence results above

Some interesting numbers and facts about your company results for Threat Intelligence

Country with most fitting companiesSouth Korea
Amount of fitting manufacturers6
Amount of suitable service providers9
Average amount of employees11-50
Oldest suiting company2000
Youngest suiting company2018

Frequently asked questions (FAQ) about Threat Intelligence Companies

Some interesting questions that has been asked about the results you have just received for Threat Intelligence

Based on our calculations related technologies to Threat Intelligence are Big Data, E-Health, Retail Tech, Artificial Intelligence & Machine Learning, E-Commerce

The most represented industries which are working in Threat Intelligence are IT, Software and Services, Defense, Other, Research

ensun uses an advanced search and ranking system capable of sifting through millions of companies and hundreds of millions of products and services to identify suitable matches. This is achieved by leveraging cutting-edge technologies, including Artificial Intelligence.

Threat Intelligence results by various countries

Related categories of Threat Intelligence