Skip to content
  • REGISTER FOR 2025
6th SMART BANKING6th SMART BANKING6th SMART BANKING
  • Home
  • Overview
    • Event at a glance
    • Event brochure 2025
    • About Organizers
  • CYBER DENFENSE
  • Conference
    • Conference Agenda
    • Speakers 2025
  • Sponsor
    • Sponsors 2025
    • Expo highlights
    • Why Sponsor | Exhibit
  • Delegate
    • Register as a Delegate
    • Why attend
    • Travel & Accommodation
  • Media
    • Press Registration
    • News
  • Contact
  • Vietnamese

XCURENET, Inc.

  • 276 Gajwa-ro, eunpyeong-gu, Seoul (Sinsa-dong, J Tower)
  • 02.567.0961
    02.3151.0730
  • https://www.xcurenet.com/

| COMPANY PROFILE

Founded in 1999, XCURENET, Inc. is a network security company specializing in cybersecurity.
With over 25 years of experience in developing and delivering network data-based information protection solutions, XcureNet leverages AI-powered threat detection and content analysis technologies to provide a wide range of security solutions to government agencies, financial institutions, and universities across South Korea.
 

| PRODUCT & SOLUTION INTRODUCTION

EMASS AI PLUS collects and logs all inbound and outbound network communications to detect abnormal behaviors, dangerous keywords, personal information, and potential internal data leakage risks.

It also stores all network packets and analyzes them to identify suspicious activities and high-risk traffic.

Furthermore, it can detect data leaks originating from generative AI services, enabling precise behavior analysis and policy-based responses.

Key services:

1) Real-Time Data Leakage Detection Service

Analyzes network traffic in real time to detect attempts to leak personal and internal information.

2) Integrated Detection of Internal and External Threats

Simultaneously analyzes risks of sensitive data leakage from internal users and other external threats.

3) Generative AI Service Monitoring

We hold the largest dataset in the country for detecting potential data leakage through various Generative AI services.

4) Security Policy Consulting

Designs detection policies and provides threat response scenarios tailored to the security requirements of each organization and industry.

5) Full Packet Collection and Logging Based on Traffic

Network traffic can be captured at the full packet level, and in the event of abnormal behavior, raw data can be recorded for security incident analysis and forensic purposes.

Product Features and Advantages:

  • AI-Based User Behavior Analytics(UBA)
  • Generative AI Data Leakage Detection
  • Industry-Leading Content Logging Technology
  • In-Depth Network Communication History Analysis
  • High-Performance Processing of Large Data Volumes
  • Optimized Personal Information Leakage Detection 
  • Scalable Data Architecture
  • Anomaly Detection and Alerting

Key product features:

1) AI-Based Analysis

  • Instantly detects additional leakages by suggesting similar documents using text vectorization, attachment content analysis, and natural language processing(NLP).
  • Provides insight into user interest trends—such as search behavior—through keyword logging and analysis.
  • Delivers customized analysis using LLM-based foundation models, including service and URL analysis, keyword extraction, and content summarization.

2) Content/Session Search & Inspection

  • Search content and keywords from logged-in services such as email, messaging, SNS, collaboration tools, and Generative AI platforms.
  • Search packet information(Header, Payload) and download original files.
  • Integrated search engine for fast querying.
  • Supports multi-condition and advanced query-based search.

3) Data Optimization

Allows exclusion of unnecessary log data to minimize monitoring resource usage.

4) Dashboard

  • Visualizes the status of data collection, personal information leakage, and abnormal behavior.
  • Displays key metrics: amount of collected data, personal information count, top 10 sent attachments, real-time network status, and more.

5) Data Relationship Analysis

Visual tracking of data leakage paths through analysis of external data transmission relationships.

6) Regular Expression Templates

Enables the creation of templates for identifying sensitive data patterns(e.g., customer IDs, phone numbers, addresses) to support automated detection.

IEC GROUP

 Floor 5, 66 Tran Dai Nghia St., Hai Ba Trung Dist, Hanoi

 0246 663 2450

 info@iecgroup.com.vn

UPCOMING EVENTS

  • Home
  • Overview
    • Event at a glance
    • Event brochure 2025
    • About Organizers
  • CYBER DENFENSE
  • Conference
    • Conference Agenda
    • Speakers 2025
  • Sponsor
    • Sponsors 2025
    • Expo highlights
    • Why Sponsor | Exhibit
  • Delegate
    • Register as a Delegate
    • Why attend
    • Travel & Accommodation
  • Media
    • Press Registration
    • News
  • Contact
  • Vietnamese