525, Gangnam-daero, Seocho-gu, Seoul, Republic of Korea l Tel :822-3448-0880 l Fax : 822-3448-0804 l Email : jsshim@truecut.co.kr
Copyright (C) 2015 TrueCut Security, Inc. All Right Reserved.
1. What is the product type of TrojanCut?
TrojanCut was designed and developed for the purpose of protecting “leakage of national secret documents by unknown hacking” in 2005. Because the traditional ways—detecting malware, rule setting, policy setting—was impossible to block “unknown hacking”, we have developed a new technology which blocks “malicious behavior” for the first time in the world and acquired a patent. It means we created entirely new-concept product that did not exist until then. So, we classified TrojanCut as the new product type, “Malicious Behavior Blocking System”
2. What is the criteria of “malicious behavior” in TrojanCut?
Because our purpose to judge “malicious behavior” is to protect “unknown cyber attacks”, we defined most of unintended behaviors by user as malicious behaviors.
3. What is the method of blocking malicious behavior in TrojanCut?
A: Because TrojanCut is the product to "fundamentally" block unknown hackings, TrojanCut’s blocking criteria is very strict. As mentioned above, we defined most of unintended behaviors by user as malicious behaviors. So, it is core task to judge user's intention fundamentally to achieve our goal of blocking. TrojanCut is using own-developed COA(Cut On Active) algorithm combined computer’s operating principles with remote attacker’s physical limitation. This blocking technology got a patent in the Republic of Korea, in 2007.
4. Is TrojanCut a reliable product?
Every agent-based solution’s problems are stability and load. As if even the biggest software company faces troubles whenever it releases the new version, no company can help these problems. The only way to overcome these problems is the knowhow mastered in the field. TrojanCut was released 10 years ago and we have built up rich experience. TrojanCut’s reliability and performance have been demonstrated by our various government and enterprise customers.
5. What is the difference from traditional security products?
Traditional security products focus on blocking the inflow of malware from the outside. But the classic signature based technology which was used to detect malware reached the limit. So, the sandbox (virtual machine) technology nowadays emerged as a alternative technology, but it is also known to have a lot of vulnerability. For these reasons, cyber security incidents are rapidly increasing in spite of spending huge security budget. However, TrojanCut adopts conceptually advanced technology and it will be the next generation product which overcomes all these limitations.
6. Is TrojanCut treat the malware?
No. TrojanCut doesn’t treat the malware because it’s the product to focus on blocking malicious behavior. Other reasons which don’t treat malware are that every customer uses anti-virus vaccine for treatment, and TrojanCut makes malwares disable.
TrojanCut provides the detailed blocking information when blocking malicious behavior.
8. Is TrojanCut possible to link with the other products?
Yes. TrojanCut is operating linked with a variety of products in our various customers.
9. Should every user set their own environment?
No. TrojanCut does not require any kind of user’s setting or user’s interaction.