DEEP CORE PLATFORM
DEEP CORE
PLATFORM

Security beyond the Deep Core engine

Through the AI engine Deep Core, it infers and detects even the new variant malicious code that the vaccine cannot detect, and provides the intelligence needed for proactive and clear response to classify and respond to malicious code based on the best security experts and know-how in Korea.

Through the AI engine Deep Core, it infers and detects even the new variant malicious code that the vaccine cannot detect, and provides the intelligence needed for proactive and clear response to classify and respond to malicious code based on the best security experts and know-how in Korea.

Patent application: Patent registration number 10-1863615 (2018.05.28) related to a variant malicious code detection technology based on neural network learning

Patent application: Patent registration number 10-1863615 (2018.05.28) related to a variant malicious code detection technology based on neural network learning

Threat Inside, a malicious code threat response solution based on Deep Core engine

Threat Inside, a malicious code threat response solution based on Deep Core engine

롯데면세점 모바일 앱
AR TRY ON 서비스

Threat Inside is the most reliable and advanced way of responding to malware threats, providing the intelligence needed for malware discrimination, classification, and response, based on endpoint security expertise and the AI Deep Core engine.

Leading domestic institutions and companies have verified its effectiveness by introducing Threat Inside, and have validated its accurate threat detection and swift response to malware 24 hours a day, 365 days a year.

Threat Inside is the most reliable and advanced way to respond to malware threats, providing the intelligence necessary for malware detection, classification, and response based on endpoint security expertise and the AI Deep Core engine.

Leading domestic institutions and companies have verified the effectiveness of Threat Inside by introducing it to accurately detect and respond to malware threats 24/7, 365 days a year.

Threat Inside is the most reliable and advanced malware threat response solution that provides the intelligence necessary for malware discrimination, classification, and response based on endpoint security expertise and the artificial intelligence Deep Core engine.

Leading domestic institutions and companies have adopted Threat Inside to validate its effectiveness in accurately detecting and swiftly responding to malware threats 365 days a year, 24 hours a day.

Accurate malware identification of the Threat Inside AI analysis engine

The latest malicious code data collected has been learned by the Threat Inside Deep Core engine, and as a result of verifying the subsequently discovered malicious code,
it was possible to identify the malicious code with 99.5% accuracy.

*The result has been verified in a real-world environment with newly collected malware after learning without dividing the dataset into training and validation sets

Accurate malware identification of the Threat Inside AI analysis engine

The latest malicious code data collected has been learned by the Threat Inside Deep Core engine, and as a result of verifying the subsequently discovered malicious code,
it was possible to identify the malicious code with 99.5% accuracy.

*The result has been verified in a real-world environment with newly collected malware after learning without dividing the dataset into training and validation sets

Threat Inside AI
Accurate identification of malware by the analysis engine

The latest malicious code data collected has been learned by the Threat Inside Deep Core engine, and as a result of verifying the subsequently discovered malicious code,
it was possible to identify the malicious code with 99.5% accuracy.

*The result has been verified in a real-world environment with newly collected malware after learning without dividing the dataset into training and validation sets

  • Republic of Korea Financial Institutions,
    Threat Inside Analysis System
    IMAS Introduction

    A system was needed to collect various domestic financial-related samples (files, URLs, etc.) and verify their maliciousness. After introducing IMAS, the <sample collection-analysis request-administrator result check> process was automated, enabling swift business processing.

    Download

  • Police Agency,
    Introduction of Threat Inside Analysis System
    IMAS

    We have introduced the analysis system IMAS to verify the maliciousness of files and apps for cyber investigations. Thanks to this, we are now able to efficiently utilize detailed analysis information related to the police agency's business processes.

    Download

Threat Inside customer case

South Korea's certain financial institution,
Threat Inside analysis system IMAS introduction

“A system was needed to collect various domestic financial-related samples (files, URLs, etc.) and verify whether they are malicious. After the introduction of IMAS, the process of <sample collection-analysis request-administrator result confirmation> has been automated, allowing for quick handling of tasks.”

Download

Korean National Police Agency,
Introduction of Threat Inside analysis system IMAS

"For cyber investigations, we have introduced an analysis system, IMAS, to verify the maliciousness of files and applications. Thanks to this, we are now able to more efficiently utilize the detailed analysis information related to the National Police Agency's business processes."

Download

Threat Inside customer case

South Korea's certain financial institution,
Introduction of Threat Inside analysis system IMAS

“A system was needed to collect various domestic financial-related samples (files, URLs, etc.) and verify whether they are malicious. After the introduction of IMAS, the process of <sample collection-analysis request-administrator result confirmation> has been automated, allowing for quick handling of tasks.”

Download

Korean National Police Agency,
Introduction of Threat Inside Analysis System IMAS

"For cyber investigations, we have introduced an analysis system, IMAS, to verify the maliciousness of files and applications. Thanks to this, we are now able to more efficiently utilize the detailed analysis information related to the National Police Agency's business processes."

Download

Customized Deep Core platform for customers

The Deep Core engine developed for AI for Security, which adds artificial intelligence to information security technologies and products,
is optimized for customized deployment and is widely used in and out of the security market.

User-customized platform based on AutoML

  • We provide a customized platform that enables automatic machine learning for clients who are not experts in AI.

  • Provides an AutoML-based operating environment that allows for easy collection of training data, learning and automatic model generation, and maintenance and deployment

  • Provides an abnormal sign system that can predict and forecast the future expected linkage volume by analyzing past linkage patterns with an intelligent linkage transaction volume prediction engine based on Deep Core.

Customized threat information classification service for customers

  • Through customer interviews, we provide a subscription-based service for one-stop custom model integration management, from labeling to feature extraction

  • Collected, analyzed, processed, labeled, and built a dataset of 1 million of the most recent malicious codes related to social issues closely related to people's lives

  • Unlike in the past where it had to be managed manually, it is now possible to quickly detect and maintain ever-changing threat information by continuously updating characteristics and models.

Customized Deep Core platform for customers

The Deep Core engine developed for AI for Security, which adds artificial intelligence to information security technologies and products,
is optimized for customized deployment and is widely used in and out of the security market.

User-customized platform based on AutoML

  • We provide a customized platform that enables automatic machine learning for clients who are not experts in AI.

  • Provides an AutoML-based operating environment that allows for easy collection of training data, learning and automatic model generation, and maintenance and deployment

  • Provides an abnormal sign system that can predict and forecast the future expected linkage volume by analyzing past linkage patterns with an intelligent linkage transaction volume prediction engine based on Deep Core.

Customized threat information classification service for customers

  • Through customer interviews, we provide a subscription-based service for one-stop custom model integration management, from labeling to feature extraction

  • Collected, analyzed, processed, labeled, and built a dataset of 1 million of the most recent malicious codes related to social issues closely related to people's lives

  • Unlike in the past where it had to be managed manually, it is now possible to quickly detect and maintain ever-changing threat information by continuously updating characteristics and models.

Customized Deep Core platform for customers

The Deep Core engine, developed for AI for Security, which adds artificial intelligence to information protection technologies and products, is optimized for custom adoption and is being widely used in and out of the security market.

User-customized platform based on AutoML

  • We provide a customized platform that enables automatic machine learning for clients who are not experts in AI.

  • Provides an AutoML-based operating environment that allows for easy collection of training data, learning and automatic model generation, and maintenance and deployment

  • Provides an abnormal sign system that can predict and forecast the future expected linkage volume by analyzing past linkage patterns with an intelligent linkage transaction volume prediction engine based on Deep Core.

Customized threat information classification service for customers

  • Through customer interviews, we provide a subscription-based service for one-stop custom model integration management, from labeling to feature extraction

  • Collected, analyzed, processed, labeled, and built a dataset of 1 million of the most recent malicious codes related to social issues closely related to people's lives

  • Unlike in the past where it had to be managed manually, it is now possible to quickly detect and maintain ever-changing threat information by continuously updating characteristics and models.

WE WORK WITH AI

We believe that AI makes the world more convenient and safer

1.

Senior care with AI

AI senior care service that takes responsibility for seniors' Fun and cognitive enhancement with AI human technology

2.

Education with AI

Celebrity instructor video lecture creation, TOEIC speaking education content production, as a fitness training instructor

Expansion of educational businesses in various fields such as AI content

3.

Content with AI

Implementing 'moving pictures' with EST AI technology, 'face transformation, makeup application, and clothing creation' through deep learning

Creating and utilizing various AI human content such as new employee analysts, announcers, etc.

4.

API business with AI

Companies can focus on their inherent customer value by providing data and solutions using AI

as an API.

5.

Software with AI

Background removal technology applied in ALSee Capture, like the smooth design of ESTsoft AI technology and ALTools products,

provides the utility environment that users want.

WE WORK WITH AI

We believe that AI makes the world more convenient and safer

1.

Senior care with AI

AI senior care service that takes responsibility for seniors' Fun and cognitive enhancement with AI human technology

2.

Education with AI

Expansion of educational businesses in various fields, such as the establishment of celebrity lecture video courses, production of TOEIC speaking educational content, and AI content as a fitness training instructor

3.

Content with AI

Implementing 'moving pictures' with EST AI technology, 'face transformation, makeup application, and clothing creation' through deep learning

Creating and utilizing various AI human content such as new employee analysts, announcers, etc.

4.

API business with AI

We provide data and solutions utilizing AI through APIs to enable companies to focus on their intrinsic customer value.

5.

Software with AI

Background removal technology applied in ALSee Capture, like the smooth design of ESTsoft AI technology and ALTools products,

provides the utility environment that users want.

WE WORK WITH AI

We believe that AI makes the world more convenient and safer

1.

Senior care with AI

AI senior care service that takes responsibility for seniors' Fun and cognitive enhancement with AI human technology

2.

Education with AI

Celebrity instructor video lecture creation, TOEIC speaking education content production, as a fitness training instructor

Expansion of educational businesses in various fields such as AI content

3.

Content with AI

Implementing 'moving pictures' by applying EST AI technology, producing various AI human contents such as 'face transformation, makeup application, and clothing creation' for new employees including analysts and announcers, and utilizing them

4.

API business with AI

Companies can focus on their inherent customer value by providing data and solutions using AI

as an API.

5.

Software with AI

Background removal technology applied in ALSee Capture, like the smooth design of ESTsoft AI technology and ALTools products,

provides the utility environment that users want.

LET'S Connect

We collaborate with ambitious brands and people around the world.

To learn more about creating digital experiences that effectively reach and engage customers and target audiences, please contact us.

Download Company Brochure

CEO: Sangwon Jung

Business Registration Number 229-81-03214 Mail-Order Business Notification Number 2011-Seoul Seocho-1962

EST Building, 3 Banpo-daero, Seocho-gu, Seoul (Postal Code)06711

Family Site

LET'S Connect

We collaborate with ambitious brands and people around the world.

To learn more about creating digital experiences that effectively reach and engage customers and target audiences, please contact us.

Download Company Brochure

CEO: Sangwon Jung

Business Registration Number 229-81-03214 Mail-Order Business Notification Number 2011-Seoul Seocho-1962

EST Building, 3 Banpo-daero, Seocho-gu, Seoul (Postal Code)06711

Family Site

LET'S Connect

We collaborate with ambitious brands and people around the world.

To learn more about creating digital experiences that effectively reach and engage customers and target audiences, please contact us.

Download Company Brochure

CEO: Sangwon Jung

Business Registration Number 229-81-03214 Mail-Order Business Notification Number 2011-Seoul Seocho-1962

EST Building, 3 Banpo-daero, Seocho-gu, Seoul (Postal Code)06711

Family Site