TrueCut Security,Inc.

World first new concept "MAPS"
Malicious Acts Prevent System
TrojanCut

Overview

Comparison with traditional products

Comparison with traditional products
TrojanCut V2.0 Traditional products
Blocking Method Human-Interaction-based
COA(Cut On Active) Algorithm(Own patent)
Signature / Sandbox
Blocking Concept Blocking the real attack of malware Blocking the influx of malware
Blocking Range Any malicious behavior, running without users realizing it Known malware + Some unknown malware
Blocking Area Outbound Inbound

We developed the new blocking concept to protect unknown attacks and TrojanCut is the world's first and the only product which is blocking unknown malware.

The development of security technology

The development of security technology
1st Generation 2nd Generation 3rd Generation
Signature-based Detection In Virtual Space,
Detecting malicious behavior
In Real Space,
Blocking malicious behavior
Traditional Products Sandbox / Virtual machine products Only TrojanCut

TrueCut Security, Inc. is the patentee of blocking malicious behavior technology based on human-interaction which is the most challenging and ultimate concept.
This is the most innovative technology of blocking unknown attacks by applying the computer's operating principles and physical limitations of remote attackers.

Functions

Functions
Functions - Description
Blocking Malicious Behavior
  • Preemptively blocking of information leakage from Servers and PCs - Blocking information leakage without users knowing it in real time
  • Preemptively blocking of Servers and PCs crash - Blocking crash attacks without users knowing it in real time
  • Preemptively blocking of attacks caused by Servers and PCs - Blocking attacks by zombie PCs or zombie Servers
Audit (Optional)
  • Outbound transfer logs audit - Transmission control and logs
Additional functions
(Optional)
  • Media control - Media control and logs
  • Printing security - Watermarks, and print control, logs
  • Mail Messenger security - Mail messenger control and logs
  • Internet security - Internet access control and logs
  • Remote maintenance - Remote maintenance
  • Password Security - Block password cracking
  • Whitelist Vaccine - Process Control by Whitelist

The implementation of integrated security by a single agent is possible.

Self-Report

  • Daily / Weekly / Monthly
    analysis report
  • Blocked status
    by time line analysis report
  • Blocked status
    by users analysis report
  • Blocked status
    by documents analysis report
    (hwp, doc, ppt, pdf, xls, ...)
  • Blocked status
    by destinations(attackers)
    analysis report
  • Blocked status
    by processes analysis report

Operating Environment

  • Agent (32/64bits support)
    Windows 2000XP / Windows VISTA
    Windows 7 / Windows 8 / Windows 10
  • Managing
    Server(32/64bits support)
    Windows 10 Pro
    Maria DB

Customers

Government

National Defense

Finance

Enterprise

POS보안

보안관제협약