Slide 1
SEMOR
Slide 2
Integrated Hybrid Defense Monitoring Platform
Slide 3
Real-Time Monitoring
previous arrow
next arrow
Image

 

SEMOR is an integrated security operations management platform.

It consists of four main modules: SIEM (Security Information and Event Management), Remote Access Control, Network Access Control, and Cyber Threat Intelligence.

By combining these four modules, SEMOR creates a Zero Trust framework tailored to the needs of internal enterprise security. SEMOR collects information from both internal and external devices, threat intelligence, and vulnerability risks. Through correlation analysis, it helps enterprises quickly identify the source of abnormal events when they occur. In conjunction with the organization’s compliance policies, SEMOR can instantly intercept and block devices that violate policies or pose security risks, ensuring the highest level of security within the corporate network environment.

Given the frequent global cyberattacks, SEMOR’s initial goal was to develop effective defense mechanisms. Therefore, leveraging different security modules allows SEMOR to adapt to various environments and achieve optimal security for enterprise networks.

Image

Process mechanism

 The SEMOR platform is based on the following four processes to help enterprises achieve the most secure network environment architecture.

Visibility

The SEMOR platform collects all internal network information through modes such as ARP, SNMP, and FLOW, and performs visibility analysis and asset classification based on different types and connection scenarios. It can be combined with existing asset management systems for asset analysis.

Compliance

Establishing an optimal information security defense model based on compliance conditions, transparently formulating strategies, and implementing mechanisms such as identity verification to achieve a Zero-Trust security network architecture.

Instant response

Every connection must have the necessary permissions to access and manage resources. If the connection does not comply with policy requirements, it will be allocated to an isolated area or service connection will be stopped, reducing the chance of risk occurrence.

Relevance

Collect all events/logs/traffic and threat intelligence from devices. Utilize custom correlation analysis with events and logs. When abnormal events occur, the system will automatically generate alert messages and promptly send them to administrators.

 

SEMOR
Main functional features of security maintenance platform products

SEMOR is an integrated defense monitoring platform. It includes SIEM, Remote Access Control, Network Access Control, Performance Monitoring, and Threat Intelligence.

 

Intelligent event collection and correlation analysis

  • Event collection and analysis
  • Abnormal Traffic Monitoring and Triggering
  • Event Tracking and Triggering
  • Custom Correlation Analysis
  • Custom Machine Learning Language Models with Artificial Intelligence Analysis

Automatic detection device safety and blocking

  • Determining abnormal user behavior through IDS engine
  • Performing detection and handling in conjunction with vulnerability scanning.
  • Isolating VLANs using SNMP Trap.

.

Supports multiple authentication sources and authentications

  • Supports AD/LDAP/RADIUS/Google, and more
.

Network and defense equipment integration and joint defense

  • Integrate multiple network switching and security defense devices. 
  • Events can be exported to existing SIEM/SOC by triggering zoned and joint defense modes.
.

Secure remote access to intranet servers and audits

  • Provide international 4A audit standards.
  • Offer equipment/account/file access permission management.
  • Provide operation/command/file operation and access records. 
  • Enable real-time playback of video records and immediate connection interruption.

Internal network equipment and risk assessment

  • Vulnerability assessment and risk scoring
.

Main functional modules

The system model rental includes four major items: log collection and correlation analysis, secure remote access, network security access, and internal and external network threat analysis and assessment. These four modules form the foundation of a zero-trust architecture.

Image
Image
Image
Image

Log collection analysis

Is composed of Wazuh and OpenSearch engine. It can collect logs, traffic, events, and more from all devices. All information can be analyzed using custom correlation analysis conditions, and relevant alarm trigger conditions can be set. When anomalies occur, the system will automatically issue alerts based on the configured policy.

Remote Access Control (RAC)

Based on international 4A audit standards, is designed to achieve effective management of operational restrictions, command filtering, file access authorization, and records for maintenance personnel. It encompasses account management, authorization control, audit checks, and authentication management. When incidents occur, administrators can query the source of the issue based on the recorded information.

Network Access Control (NAC)

 SEMOR Unified Defense is a critical core module. It automatically searches for all internal network devices through ARP and SNMP, classifies them, and analyzes their connections. Enterprises can establish compliance policies based on this information to manage all internal network devices. Incase of anomalies, real-time blocking can be performed through switches or firewalls.

Network Risk Accessment

The log collection system is composed of Wazuh and OpenSearch engine. It can collect logs, traffic, events, and more from all devices. All information can be analyzed using custom correlation analysis conditions, and relevant alarm trigger conditions can be set. When anomalies occur, the system will automatically issue alerts based on the configured policy.

Relational Architecture

Through SEMOR’s platform integration, SEMOR can provide multidimensional reports for maintenance, monitoring, recording, analysis, and assessment. Users can define their own SEMOR operational platform based on their specific needs. Using an intuitive drag-and-drop interface, users can easily adjust report column order, timeframes, and other fields. This flexibility allows managers to quickly meet the requirements for job management and analysis.

Integrating threat intelligence from the dark web, deep web, hacker organizations, public networks, and reputation organizations, and exporting it to a Security Information and Event Management (SIEM) system for consolidation.

Analyze the credentials, connection requirements, data transfer, and application service monitoring and management policies to determine the behavior of each application connection.

Defining, correlating, and operating on multidimensional information generated through relevant link behavior, policy execution, and event logs.

System Structure

The SEMOR platform, through its integration, provides multidimensional reporting for operations, monitoring, recording, analysis, and assessment. Users can customize their SEMOR situational platform based on their specific job requirements. With an intuitive drag-and-drop interface, users can easily adjust report column order, timelines, and other fields. This flexibility allows managers to quickly meet various needs for job management and analysis.

Image

Brand-Agnostic

The SEMOR integrated monitoring and defense platform is capable of integrating multiple international brands. To achieve regional collaborative defense capabilities, it integrates with systems such as firewalls and network switches. When abnormal events occur, the platform promptly communicates with defense systems to issue defense instructions. This proactive defense helps prevent attack propagation and cross-infection, ultimately reducing the workload for administrators.

Image

Our Partners

Our partners come from some of the highest-quality information security professional firms in Asia. They possess top-notch technology and robust post-sales service teams.

Image
Image
Image
Image
Image
Image
Image
Image

Welcome to Join as Our Partners

If you are interested in our solutions, we welcome you to contact us anytime to learn about our products or join our distribution partners.


SG: +65 8067 4725
TW: +886 2 2595 4260
MY: +60 16 982 6311


Latest News

SEMOR's first image video is released!! Released for the first time at this information security conference

FOCUSECRE SEMOR’s first promotional video has been officially released. The content will provide a...

Read more: SEMOR's first...

每年資訊安全年度盛事2024臺灣資安大會即將於5月舉辦

每年資訊安全年度盛事2024臺灣資安大會即將於5月舉辦。FOCUSECURE 將在展區首度展示SEMOR Version 4的版本,請大家踴躍到展區了解。 

Read more: ...

相關資訊

所有說明僅用於讓您了解本產品功能的目的。 若您有需要請向合作夥伴申請簡報或測試。

另外,所有的測試將需要透過合作夥伴協助並取得相關的授權與環境調查表單 ,相關測試申請或支援文件請進入技術支援.如果您想使用這些,您可能需要提供相關的訊息並跟合作夥伴或我們進行必要的討論。 請造訪 聯絡我們