Contact Us

IT Security

Information Security Management (ISM Security)

We are in aims to gain customer satisfaction and trust by providing outstanding technology, products, and services on Information Security.

The aims of information security, through such efforts, are to heighten public confidence in your customer and further enhance your corporate value.

  • ISM Concept
  • ISM Promotion Roles
  • ISM Promotion Structure
  • ISM Classification
  • ISM Imp. Information
  • ISM Storage Format
  • ISM Personal Security
  • ISM Disciplinary Action
  • ISM Physical Security
  • ISM IT Security
  • ISM Incidents / Accidents

Security safeguards the confidentiality, integrity, and availability of information from both internal and external threats. Company information includes proprietary of information, customer information, and information received from Third Parties.

Information includes that on non-electric media such as paper, or electric information stored, communicated or used, information embodied in physical property such as production facilities and prototype products.

Identify Assets Evaluate Risks Manage Risk
DataApplicationTransactionWeb SitesDirectories PersonalPhysicalOperationalCredential SecurityExcess Privilege
Admin Accounts
Access Rights
Orphan Account
Non Compliance
Personal RiskPhysical SecurityOperation LogsE-commerce SecurityUser Access Management
Network Access Control
OS Access Control
Application Access Control


Intrusion Prevention

Virus Protection