TESS TMS
Threat Management System for proactive cyber threat response
TESS TMS (Threat Management System) is an intelligent network security management platform that monitors incoming traffic in large-scale network environments in real time and detects and blocks external attacks and attempts at internal data leakage through an advanced intrusion detection engine. With powerful analytics capabilities, it eliminates security blind spots and ensures operational reliability through features such as real-time leakage rate monitoring, delivering optimal network security availability.
TESS TMS Framework
Based on network traffic and detection events collected from sensors,it analyzes threat indicators to enable comprehensive identification of attack flow.
Major Features
-
Attack Detection
Signature-based advanced detection of known threats such as DoS and malware
-
Malicious Traffic Data Collection & Analysis
In-depth analysis of malicious traffic and user-centric visualization dashboards
-
Policy Management
Configuration and management of detection policies for network and security threats
-
Detection Intelligence Integration
Sharing detection intelligence with external ESM and SIEM systems, with support for policy integration with firewalls (FW) and IPS
-
File Collection & Malware Detection
Detection and collection of file transfers within traffic, and advanced malware analysis based on YARA
-
IP Reputation Matching
Intelligent threat analysis engine utilizing global IP reputation data by attacker IP
-
Application Detection
Automatic analysis and detection of L7-level applications without requiring separate policies
-
Asset Discovery & Learning
Identification of internal asset information discovered during analysis to support continuous asset visibility and management
Distinct Features
-
Threat Detection
& Analysis - Sandbox PCRE/YARA
- Advanced malware analysis through sandbox integration and YARA engine. Supports analysis of Suricata, Snort, PCRE, YARA, and applications.
-
Advanced Malware
Response -
Sandbox-Integrated Analysis
Multi-Engine Threat
Detection - In-depth analysis of advanced intelligent malware using sandbox integration and YARA engines. Comprehensive threat detection through integrated operation of Suricata, Snort, PCRE, and YARA engines.
-
Performance
& Reliability -
Minimized Packet Loss
Real-Time Loss Rate
Monitoring Optimized Data Analysis -
Minimizes packet loss even in high-volume traffic environments through high-performance dedicated hardware
and optimized analysis engines. Provides real-time metrics on processing status and loss rates to verify the reliability of data collection. Improves analysis efficiency through event refinement and lightweight processing,
minimizing the transmission load to upper-level systems.
- Visibility
- Intuitive UI/UX Reduced Analysis Time
- User-friendly management environment through data visualization and diverse statistical insights. Supports rapid decision-making with an integrated UI centered on key events.
-
Precise Analysis
& Visibility -
XFF-based Real
IP Identification GZIP Compressed
Traffic Analysis Encrypted Threat
Analysis Support VXLAN Tunneling
Analysis - Identifies and manages the actual client IP by analyzing X-Forwarded-For (XFF) headers even in proxy/L4 environments. Detects threats within compressed web traffic without gaps using a built-in GZIP decompression engine. Performs deep packet inspection (DPI) on decrypted traffic when integrated with external decryption devices. Provides in-depth analysis of VXLAN virtual network traffic to ensure visibility in virtualized environments.
- Forensics
-
Log with Stream
Detailed Analysis
Data Provision - Supports detailed tracking of attack context with optional storage of additional packets before and after event matching. Improves analysis accuracy by providing real-time RAW data and stream information related to threat events.
-
Infrastructure
Flexibility - SSL/TLS Native Analysis Support for Universal Virtual Environments Multi-Cloud Compatibility
- Detects threats in encrypted traffic based on metadata through native SSL/TLS analysis. Fully supports KVM/QEMU and image installations (ISO, VMDK, etc.), as well as standalone OS environments. Provides optimized security features and services for various domestic and global cloud infrastructure environments.