Penta Security
Encyclopedia
Penta Security Systems, Inc. (Korean: 펜타시큐리티시스템㈜) is an information technology
Information technology
Information technology is the acquisition, processing, storage and dissemination of vocal, pictorial, textual and numerical information by a microelectronics-based combination of computing and telecommunications...

 (IT) security firm headquartered in Seoul
Seoul
Seoul , officially the Seoul Special City, is the capital and largest metropolis of South Korea. A megacity with a population of over 10 million, it is the largest city proper in the OECD developed world...

, South Korea
South Korea
The Republic of Korea , , is a sovereign state in East Asia, located on the southern portion of the Korean Peninsula. It is neighbored by the People's Republic of China to the west, Japan to the east, North Korea to the north, and the East China Sea and Republic of China to the south...

. Penta Security offers web application security
Web Application Security
Web application security is a branch of information security that deals specifically with security of websites and web applications.At a high level, Web application security draws on the principles of application security but applies them specifically to Internet and Web systems...

, database security
Database security
Database security concerns the use of a broad range of information security controls to protect databases against compromises of their confidentiality, integrity and availability...

, and public key infrastructure
Public key infrastructure
Public Key Infrastructure is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. In cryptography, a PKI is an arrangement that binds public keys with respective user identities by means of a certificate...

 (PKI) solutions.

History

Founded in 1997 by Seokwoo Lee, and headquartered in Seoul
Seoul
Seoul , officially the Seoul Special City, is the capital and largest metropolis of South Korea. A megacity with a population of over 10 million, it is the largest city proper in the OECD developed world...

, South Korea
South Korea
The Republic of Korea , , is a sovereign state in East Asia, located on the southern portion of the Korean Peninsula. It is neighbored by the People's Republic of China to the west, Japan to the east, North Korea to the north, and the East China Sea and Republic of China to the south...

, Penta Security Systems Inc. is a provider of web application
Web application
A web application is an application that is accessed over a network such as the Internet or an intranet. The term may also mean a computer software application that is coded in a browser-supported language and reliant on a common web browser to render the application executable.Web applications are...

 security products and core technology, with more than 1500 installed customers in government, large enterprise, small and medium business, education, and finance. Its Japanese Office, Penta Security Systems K.K., was incorporated in Akasaka, Tokyo
Akasaka, Tokyo
is a residential and commercial district of Minato, Tokyo, located west of the government center in Nagatachō and north of the Roppongi nightlife district....

, Japan
Japan
Japan is an island nation in East Asia. Located in the Pacific Ocean, it lies to the east of the Sea of Japan, China, North Korea, South Korea and Russia, stretching from the Sea of Okhotsk in the north to the East China Sea and Taiwan in the south...

 in 2009, and is currently led by Penta Security’s Vice President, John Kirch. Together, Penta Security Systems, Inc. and Penta Security Systems K.K are focusing on the goal of meeting the IT security needs and requirements of organizations across South Korea
South Korea
The Republic of Korea , , is a sovereign state in East Asia, located on the southern portion of the Korean Peninsula. It is neighbored by the People's Republic of China to the west, Japan to the east, North Korea to the north, and the East China Sea and Republic of China to the south...

 and Japan
Japan
Japan is an island nation in East Asia. Located in the Pacific Ocean, it lies to the east of the Sea of Japan, China, North Korea, South Korea and Russia, stretching from the Sea of Okhotsk in the north to the East China Sea and Taiwan in the south...

, as well as throughout East Asia
East Asia
East Asia or Eastern Asia is a subregion of Asia that can be defined in either geographical or cultural terms...

.
In 2010, Penta Security announced its corporate slogan as '긍정적영향력' in Korean
Korean
Korean typically refers to the Korean language or a Korean person.Other uses include:* any or all of the cultures of Korea: traditional culture or North or South Korean contemporary cultures...

, '肯定的な影響力' in Japanese
Japanese
Japanese refers to anything that originates in Japan, an island country in East Asia. Used as a noun, it may also refer to:* Foreign-born Japanese, naturalized citizens of Japan...

, and 'The positive influence' in English.

WAPPLES

WAPPLES, originally launched in 2005, is a web application firewall (Application layer firewall
Application layer firewall
An application firewall is a form of firewall which controls input, output, and/or access from, to, or by an application or service. It operates by monitoring and potentially blocking the input, output, or system service calls which do not meet the configured policy of the firewall...

) that operates on a logic analysis based engine. This web application firewall enables users to protect their web applications from the top ten most critical web application security
Web Application Security
Web application security is a branch of information security that deals specifically with security of websites and web applications.At a high level, Web application security draws on the principles of application security but applies them specifically to Internet and Web systems...

 risks of 2010, as outlined by OWASP
OWASP
The Open Web Application Security Project is an open-source application security project. The OWASP community includes corporations, educational organizations, and individuals from around the world. This community works to create freely-available articles, methodologies, documentation, tools, and...

. WAPPLES received a certificate of conformity to PCI-DSS ver. 1.2 Requirement 6.6 common criteria
Common Criteria
The Common Criteria for Information Technology Security Evaluation is an international standard for computer security certification...

 (CC) certification, and is IPv6
IPv6
Internet Protocol version 6 is a version of the Internet Protocol . It is designed to succeed the Internet Protocol version 4...

 ready. WAPPLES has obtained patents in Korea for ‘Method for Detecting a Web Application Attack’ (Patent No. 10-2010-0064363) and ‘Method for Detecting a Web Attack Based on a Security Rule’ (Patent No. 10-2009-0077410), and Penta Security has submitted applications for comparable patents in the US, China, and Japan. Other WAPPLES family products include WAPPLES MS, a centralized management system allowing integrated management of groups of WAPPLES units, and WAPPLES V-Series, a virtual
Virtual
The term virtual is a concept applied in many fields with somewhat differing connotations, and also, differing denotations.The term has been defined in philosophy as "that which is not real" but may display the salient qualities of the real....

, cloud computing
Cloud computing
Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility over a network ....

-based equivalent to WAPPLES.

D'Amo

First released in 2004, D’Amo is a product that enables database security
Database security
Database security concerns the use of a broad range of information security controls to protect databases against compromises of their confidentiality, integrity and availability...

 and access control via encryption
Encryption
In cryptography, encryption is the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information...

. D’Amo enables high-speed encryption
Encryption
In cryptography, encryption is the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information...

 by column
Column
A column or pillar in architecture and structural engineering is a vertical structural element that transmits, through compression, the weight of the structure above to other structural elements below. For the purpose of wind or earthquake engineering, columns may be designed to resist lateral forces...

, and allows for the separation of database management from security management through two-tiered access control. Penta Security has patented D’Amo’s ‘Index Column Encryption Method.’ Additionally, this product has received the GS (Good Software) Certification from the Telecommunications Technology Association of Korea, as well as several awards from the South Korean government.

Other Products

Penta Security’s other products include ISSAC-Web and ISign Plus. Originally launched in 1998 under the name of PACA-Web, ISSAC-Web is a public key infrastructure
Public key infrastructure
Public Key Infrastructure is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. In cryptography, a PKI is an arrangement that binds public keys with respective user identities by means of a certificate...

 (PKI
PKI
PKI can refer to any of several things:* Kings Island, an amusement park formerly known as Paramount's Kings Island.* Partai Komunis Indonesia...

) encryption
Encryption
In cryptography, encryption is the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information...

 product that enables secure transmissions of data from a web server to a web browser. In 2010, Penta Security launched ISSAC-Web for SmartPhone. ISign Plus is a comprehensive user authentication system that offers a privilege management infrastructure (PMI) through PKI.

Key Milestones

2011
  • WAPPLES V-Series, Penta Security’s cloud computing
    Cloud computing
    Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility over a network ....

    -based web application firewall (web application security
    Web Application Security
    Web application security is a branch of information security that deals specifically with security of websites and web applications.At a high level, Web application security draws on the principles of application security but applies them specifically to Internet and Web systems...

    ), was introduced
  • PKI
    PKI
    PKI can refer to any of several things:* Kings Island, an amusement park formerly known as Paramount's Kings Island.* Partai Komunis Indonesia...

     solution, ISign Plus, was introduced in June 2011
  • Penta Security's database security
    Database security
    Database security concerns the use of a broad range of information security controls to protect databases against compromises of their confidentiality, integrity and availability...

     solution, D’Amo 2.3, received SAP certification


2010
  • WAPPLES v. 3.0 received Common Criteria
    Common Criteria
    The Common Criteria for Information Technology Security Evaluation is an international standard for computer security certification...

     certification


2009
  • The official Japanese subsidiary branch, Penta Security Systems K.K., was incorporated


2008
  • D’Amo for DB2 was introduced


2006
  • Penta Security established a local office in Akasaka, Tokyo
    Akasaka, Tokyo
    is a residential and commercial district of Minato, Tokyo, located west of the government center in Nagatachō and north of the Roppongi nightlife district....

    , Japan
    Japan
    Japan is an island nation in East Asia. Located in the Pacific Ocean, it lies to the east of the Sea of Japan, China, North Korea, South Korea and Russia, stretching from the Sea of Okhotsk in the north to the East China Sea and Taiwan in the south...

  • D’Amo for SQL servers was introduced


2005
  • WAPPLES, Penta Security’s web application firewall (web application security
    Web Application Security
    Web application security is a branch of information security that deals specifically with security of websites and web applications.At a high level, Web application security draws on the principles of application security but applies them specifically to Internet and Web systems...

    ) product, was introduced


2004
  • D’Amo, Penta Security’s database security
    Database security
    Database security concerns the use of a broad range of information security controls to protect databases against compromises of their confidentiality, integrity and availability...

     solution, was introduced
  • Penta Security extended sales of D’Amo to Japan


2002
  • Penta Security established the PKI
    PKI
    PKI can refer to any of several things:* Kings Island, an amusement park formerly known as Paramount's Kings Island.* Partai Komunis Indonesia...

     project with the South Korean government


2001
  • Penta Security introduced their ISign EAM
    EAM
    Possible meanings:* Electric Accounting Machine * Electric Aero Modeling* Electro-absorption modulator* Electronic art music* Embedded atom method* Emergency Action Message* Energy Art Movement* Enhanced Assessment Methodology...

     solution


1999
  • Penta Security launched the first database security
    Database security
    Database security concerns the use of a broad range of information security controls to protect databases against compromises of their confidentiality, integrity and availability...

     business in South Korea


1998
  • ISSAC, Penta Security’s data encryption
    Encryption
    In cryptography, encryption is the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information...

     solution, was introduced
  • Siren, an intrusion detection system, was introduced
  • Penta Security Lab was founded


1997
  • Penta Security Systems was founded


Industry Recognition

  • In 2003, Penta Security was awarded by the South Korean government for completing the e-Government project
  • In 2006, D’Amo received the GS (Good Software) Certification from the Telecommunications Technology Association of Korea
  • In 2007, WAPPLES received the GS (Good Software) Certification from the Telecommunications Technology Association of Korea
  • In 2008, WAPPLES received CC (Common Criteria) Certification
    Common Criteria
    The Common Criteria for Information Technology Security Evaluation is an international standard for computer security certification...

  • In 2008, WAPPLES received Security Compatibility Certification from the South Korean National Intelligence
    National Intelligence Service (South Korea)
    The National Intelligence Service is the chief intelligence agency of South Korea. The agency was officially established in 1961 as the Korea Central Intelligence Agency , during the rule of President Park Chung-hee's military Supreme Council for National Reconstruction, which displaced the...

     Service
  • In 2008, WAPPLES received the Intelligent Product Award from South Korea’s Intelligent Information System Society
  • In 2009, WAPPLES received the Grand Prize in New Software Product from the South Korean Ministry of Knowledge and Economy
  • In 2009, WAPPLES acquired a certificate of conformity to PCI-DSS ver. 1.2 Requirement 6.6'
  • In 2009, Penta Security received the “Prime Minister’s Award” in the New Technology Commercialization category from the Korean Ministry of Knowledge and Economy
  • In 2010, WAPPLES received the Grand Prize at the 9th Korea Software Competitiveness Awards
  • In 2010, Seokwoo Lee was honored in the Senior Information Security Professional category at the International Information System Security Certification Consortium (ISC)² Fourth Asia-Pacific Information Security Leadership Achievements Program.
  • In 2010, WAPPLES earned the IPv6
    IPv6
    Internet Protocol version 6 is a version of the Internet Protocol . It is designed to succeed the Internet Protocol version 4...

     Ready Silver Logo (IPv6
    IPv6
    Internet Protocol version 6 is a version of the Internet Protocol . It is designed to succeed the Internet Protocol version 4...

    )
  • In 2011, Penta Security became a member of the Open Web Application Security Project (OWASP
    OWASP
    The Open Web Application Security Project is an open-source application security project. The OWASP community includes corporations, educational organizations, and individuals from around the world. This community works to create freely-available articles, methodologies, documentation, tools, and...

    )

See also

  • IT Security
  • Computer security
    Computer security
    Computer security is a branch of computer technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to...

  • Network security
    Network security
    In the field of networking, the area of network security consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources...

  • Economy of South Korea
    Economy of South Korea
    South Korea has a market economy which ranks 15th in the world by nominal GDP and 12th by purchasing power parity , identifying it as one of the G-20 major economies. It is a high-income developed country, with a developed market, and is a member of OECD...

  • List of Korean companies
  • List of Korea-related topics
The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK