Slide 1
SEMOR
Slide 2
Integrated Hybrid Defense Monitoring Platform
Slide 3
Real-Time Monitoring
previous arrow
next arrow
Image

 

SEMOR is an integrated security operations management platform.

It consists of four main modules: SIEM (Security Information and Event Management), Remote Access Control, Network Access Control, and Cyber Threat Intelligence.

By combining these four modules, SEMOR creates a Zero Trust framework tailored to the needs of internal enterprise security. SEMOR collects information from both internal and external devices, threat intelligence, and vulnerability risks. Through correlation analysis, it helps enterprises quickly identify the source of abnormal events when they occur. In conjunction with the organization’s compliance policies, SEMOR can instantly intercept and block devices that violate policies or pose security risks, ensuring the highest level of security within the corporate network environment.

Given the frequent global cyberattacks, SEMOR’s initial goal was to develop effective defense mechanisms. Therefore, leveraging different security modules allows SEMOR to adapt to various environments and achieve optimal security for enterprise networks.

Image

Process mechanism

 The SEMOR platform is based on the following four processes to help enterprises achieve the most secure network environment architecture.

Visibility

The SEMOR platform collects all internal network information through modes such as ARP, SNMP, and FLOW, and performs visibility analysis and asset classification based on different types and connection scenarios. It can be combined with existing asset management systems for asset analysis.

Compliance

Establishing an optimal information security defense model based on compliance conditions, transparently formulating strategies, and implementing mechanisms such as identity verification to achieve a Zero-Trust security network architecture.

Instant response

Every connection must have the necessary permissions to access and manage resources. If the connection does not comply with policy requirements, it will be allocated to an isolated area or service connection will be stopped, reducing the chance of risk occurrence.

Relevance

Collect all events/logs/traffic and threat intelligence from devices. Utilize custom correlation analysis with events and logs. When abnormal events occur, the system will automatically generate alert messages and promptly send them to administrators.

 

SEMOR
Main functional features of security maintenance platform products

SEMOR is an integrated defense monitoring platform. It includes SIEM, Remote Access Control, Network Access Control, Performance Monitoring, and Threat Intelligence.

 

Intelligent event collection and correlation analysis

  • Event collection and analysis
  • Abnormal Traffic Monitoring and Triggering
  • Event Tracking and Triggering
  • Custom Correlation Analysis
  • Custom Machine Learning Language Models with Artificial Intelligence Analysis

Automatic detection device safety and blocking

  • Determining abnormal user behavior through IDS engine
  • Performing detection and handling in conjunction with vulnerability scanning.
  • Isolating VLANs using SNMP Trap.

.

Supports multiple authentication sources and authentications

  • Supports AD/LDAP/RADIUS/Google, and more
.

Network and defense equipment integration and joint defense

  • Integrate multiple network switching and security defense devices. 
  • Events can be exported to existing SIEM/SOC by triggering zoned and joint defense modes.
.

Secure remote access to intranet servers and audits

  • Provide international 4A audit standards.
  • Offer equipment/account/file access permission management.
  • Provide operation/command/file operation and access records. 
  • Enable real-time playback of video records and immediate connection interruption.

Internal network equipment and risk assessment

  • Vulnerability assessment and risk scoring
.

Main functional modules

The system model rental includes four major items: log collection and correlation analysis, secure remote access, network security access, and internal and external network threat analysis and assessment. These four modules form the foundation of a zero-trust architecture.

Image
Image
Image
Image

Log collection analysis

Is composed of Wazuh and OpenSearch engine. It can collect logs, traffic, events, and more from all devices. All information can be analyzed using custom correlation analysis conditions, and relevant alarm trigger conditions can be set. When anomalies occur, the system will automatically issue alerts based on the configured policy.

Remote Access Control (RAC)

Based on international 4A audit standards, is designed to achieve effective management of operational restrictions, command filtering, file access authorization, and records for maintenance personnel. It encompasses account management, authorization control, audit checks, and authentication management. When incidents occur, administrators can query the source of the issue based on the recorded information.

Network Access Control (NAC)

 SEMOR Unified Defense is a critical core module. It automatically searches for all internal network devices through ARP and SNMP, classifies them, and analyzes their connections. Enterprises can establish compliance policies based on this information to manage all internal network devices. Incase of anomalies, real-time blocking can be performed through switches or firewalls.

Network Risk Accessment

The log collection system is composed of Wazuh and OpenSearch engine. It can collect logs, traffic, events, and more from all devices. All information can be analyzed using custom correlation analysis conditions, and relevant alarm trigger conditions can be set. When anomalies occur, the system will automatically issue alerts based on the configured policy.

Relational Architecture

Through SEMOR’s platform integration, SEMOR can provide multidimensional reports for maintenance, monitoring, recording, analysis, and assessment. Users can define their own SEMOR operational platform based on their specific needs. Using an intuitive drag-and-drop interface, users can easily adjust report column order, timeframes, and other fields. This flexibility allows managers to quickly meet the requirements for job management and analysis.

Integrating threat intelligence from the dark web, deep web, hacker organizations, public networks, and reputation organizations, and exporting it to a Security Information and Event Management (SIEM) system for consolidation.

Analyze the credentials, connection requirements, data transfer, and application service monitoring and management policies to determine the behavior of each application connection.

Defining, correlating, and operating on multidimensional information generated through relevant link behavior, policy execution, and event logs.

System Structure

The SEMOR platform, through its integration, provides multidimensional reporting for operations, monitoring, recording, analysis, and assessment. Users can customize their SEMOR situational platform based on their specific job requirements. With an intuitive drag-and-drop interface, users can easily adjust report column order, timelines, and other fields. This flexibility allows managers to quickly meet various needs for job management and analysis.

Image

Brand-Agnostic

The SEMOR integrated monitoring and defense platform is capable of integrating multiple international brands. To achieve regional collaborative defense capabilities, it integrates with systems such as firewalls and network switches. When abnormal events occur, the platform promptly communicates with defense systems to issue defense instructions. This proactive defense helps prevent attack propagation and cross-infection, ultimately reducing the workload for administrators.

Image

Our Partners

Our partners come from some of the highest-quality information security professional firms in Asia. They possess top-notch technology and robust post-sales service teams.

Image
Image
Image
Image
Image
Image
Image
Image

Welcome to Join as Our Partners

If you are interested in our solutions, we welcome you to contact us anytime to learn about our products or join our distribution partners.


SG: +65 8067 4725
TW: +886 2 2595 4260
MY: +60 16 982 6311


Latest News

SEMOR's first image video is released!! Released for the first time at this information security conference

FOCUSECRE SEMOR’s first promotional video has been officially released. The content will provide a...

Read more: SEMOR's first...

The annual information security event 2024 Taiwan Information Security Conference will be held in May.

Every year, the annual cybersecurity event, CYBERSEC 2024 Taiwan, is set to take place in May....

Read more: The annual...

Relevant Information

The purpose of all explanations is to help you understand the features of this product. If you require them, please request presentations or tests from our partners. Keep in mind that all tests will involve partner assistance and obtaining necessary authorization and environment investigation forms. For relevant test applications or support documents, visit our technical Support page. If you intend to use these resources, be prepared to share relevant information and engage in discussions with our partners or us. 

 Contact us.