본문으로 바로가기
메인배너 첫번째 이미지 모바일 메인배너 첫번째 이미지
메인배너 두번째 이미지 모바일 메인배너 첫번째 이미지
메인배너 두번째 이미지 모바일 메인배너 첫번째 이미지

ABOUT US

Developed the world’s first Hot H/W Wallet

BCS (Blockchain Security) has been experienced in cyber security consulting, R&D projects,
SI (System Integration) business, and hardware information security business with Government and Companies in Korea.
Due to the emerging security issues in Blockchain, we have established a Start-up with research team from SNU (Seoul National University)
SNU (Seoul National University) Department of Electrical and Computer Engineering Security Optimization Research Lab.
BCS provides services as hardware security business related with Blockchain and ICO consulting.

  • The world’s best security technology

    The world’s best security technology

    Experienced cyber security technology

  • HOT H/W Wallet

    HOT H/W Wallet

    Cyber security technology with Blockchain

  • The 4th Industrial Revolution leading company

    The 4th Industrial Revolution leading company

    Existing proven security technology
    IoT, AI BigData, ITSM, etc.
    The 4th industrial revolution leader

The world’s best security technology,HOT H/W Wallet,The fourth Industrial Revolution leading company

Organization

조직도 이미지
모바일 조직도 이미지

BUSINESS

Cooperation – consortium

BUSINESS 모델 이미지
모바일 BUSINESS 모델 이미지

Research Team

  • Seoul National University
    Department of Electrical and Computer Engineering
  • Black Duck HUB
  • Metasploit
  • Yeungnam University College
  • Seoul National University
  • Chung-Ang University
  • RAPID7
  • MITE
  • BlockDuckSoft
  • Security Project
  • Seoul National University Hacking Club
  • Chung-Ang University Hacking Club
  • Yeungnam University College Hacking Club

Description

  • The world’s first hardware based
  • Malware detection Analysis
  • Applied cyber kill chain mythology
  • Provide technical security architecture
    and recommended guidelines
  • Analysis of ISMS, PIMS, ISO27001 certification
    and information protection targeted model
  • AI + ICBM security intelligence
  • Proposal of vulnerability examination and solution supply for optimal security system construction and operation support
  • Practice-oriented education of the latest hacking and defense technologies
  • Acquire pure research data and latest information of security technology research team
  • Security technology advisory

Joint Research – Technology consulting

기술개발 공동연구 및 기술자문 이미지
모바일 기술개발 공동연구 및 기술자문 이미지

Security Consulting – Consultative group

Security Consulting Consultative group
Mobile Security Consulting Consultative group

It is security research council specialized in vulnerability management that
Provide blockchain ecosystem security, open source security, compliance and gevernance solutions,
Perform open source consulting, issue CVE code to number/ manage malicious code
Have the CVE Numbering Authority (CAN) and collaborate with global security and software venders.

  • Nexpose appspider
  • Metasploit
  • InsightIDR
Nexpose appspider,Metasploit,InsightIDR Mobile image
  • All open source detection in user code
  • Existing security vulnerability mapping
  • Identify license and component quality risks
  • Open source policy setting and enforcement
  • Open source management integration with DevOps environment
  • Continuous monitoring and notification when new security vulnerabilities are reported

BlockChainSecurity – Product information

블록체인 시큐리티 상품 이미지
블록체인 시큐리티 상품 이미지

PARTNER

  • SOR
  • PCN
  • SAINT SECURITY
  • HACKERS LAB
  • 한국스마트인증
  • NSHC
  • 사단법인해커연합 하루
  • 쿤텍 화이트소스
  • COREXFLY

CONTACT

If you have any questions about Blockchain/IoT/5G Network Security, please contact us.
E-Mail : info@blockchain4security.kr (Block Chain Security)

Contact Information
Contact Information
Name
Email
Phone

This Privacy Policy (the "Policy") provides guidance on how BlockChain Security (BCS) collects, uses and processes personal information. BCS complies with GDPR (European Information Protection Act) and privacy regulations / laws. Please read this policy together with the Terms and Conditions. You understand and fully understand the Terms of Use and agree to all the terms of the Terms of Use.

1. General

  1. ① BCS is responsible for managing, protecting and processing personal information of users under the responsibility of CSO (Information Security Officer).
  2. ② Users agree that BCS may collect and use personal information under Policy by visiting this site and providing personal information.

2. Changes to this policy

Users acknowledge that this policy may be amended at any time and that changes to this policy will be announced at the request of the law.

3. Personal Information collection

BCS strives to protect users' personal information by establishing this policy and processes personal information in a transparent manner. When you register with this site, BCS may collect the following personal information:

  1. ① Information collected with registration this site: name, email address, phone number

4. Protection of personal information

All information will be processed in a legal, fair and transparent manner. BCS is committed to protecting your privacy by complying with all applicable laws and regulations. BCS uses technology and data encryption to organize a team that protects your personal information and takes the necessary technical, administrative and physical measures to safeguard your safety.

5. Retention and Destruction of Personal Information

After the purpose of collection / use of personal information is fulfilled, or if legal / administrative needs of personal information are achieved, we will immediately destroy the personal information without any reason. However, if it should be preserved in accordance with other laws, the procedures / deadlines and methods of destruction are as follows.a) The information entered by the user has passed the retention periodb) Destroy according to internal policy and related laws after the purpose of processing is achieved.

6. Inquiry

If you have any feedback, inquiries or complaints regarding this policy, please contact us at info@blockchain4security.kr.

Last updated: August 29, 2018

SAVE
Inquiry button

Privacy Policy

This Privacy Policy (the "Policy") provides guidance on how BlockChain Security (BCS) collects, uses and processes personal information. BCS complies with GDPR (European Information Protection Act) and privacy regulations / laws. Please read this policy together with the Terms and Conditions. You understand and fully understand the Terms of Use and agree to all the terms of the Terms of Use.

1. General

  1. ① BCS is responsible for managing, protecting and processing personal information of users under the responsibility of CSO (Information Security Officer).
  2. ② Users agree that BCS may collect and use personal information under Policy by visiting this site and providing personal information.

2. Changes to this policy

Users acknowledge that this policy may be amended at any time and that changes to this policy will be announced at the request of the law.

3. Personal Information collection

BCS strives to protect users' personal information by establishing this policy and processes personal information in a transparent manner. When you register with this site, BCS may collect the following personal information:

  1. ① Information collected with registration this site: name, email address, phone number

4. Protection of personal information

All information will be processed in a legal, fair and transparent manner. BCS is committed to protecting your privacy by complying with all applicable laws and regulations. BCS uses technology and data encryption to organize a team that protects your personal information and takes the necessary technical, administrative and physical measures to safeguard your safety.

5. Retention and Destruction of Personal Information

After the purpose of collection / use of personal information is fulfilled, or if legal / administrative needs of personal information are achieved, we will immediately destroy the personal information without any reason. However, if it should be preserved in accordance with other laws, the procedures / deadlines and methods of destruction are as follows.a) The information entered by the user has passed the retention periodb) Destroy according to internal policy and related laws after the purpose of processing is achieved.

6. Inquiry

If you have any feedback, inquiries or complaints regarding this policy, please contact us at info@blockchain4security.kr.

Last updated: August 29, 2018

CLOSE