Zentillion is a group of professionals with over 20 years of experience in national research institutes or companies in the field of network and security. We improve the reliability of our technology and provide customized products and solutions that meet market demands.
+ MORE
Visions and Missions
We will become a global hidden champion based on the expertise of advanced technology and network security.
∙ Deliver specialized expertise in global market.
∙ Provide customized solutions based on customer confidence.
∙ Realize secure network at corporate and industrial sites.
Core Value
∙ Customer trust customized solutions
∙ Differentiated technology through challenge and creation
∙ Progress through unity and harmony
Business Area
∙ CYBER BLACK BOX
∙ Network isolation/unidirectional network technologies for industrial security network
∙ High-speed storage of networking data
∙ IPS/IDS, DPI technology
History
∙ 2016.04 Zentillion Founded
∙ 2016.05 Establishment of R&D center
∙ 2016.08 Investment from Chungcheong start-up accelerating investment association
∙ 2016.05 Contract : 1Gbps unidirectional security gateway
∙ 2016.07 Contract : DPI module with open source
∙ 2016.08 Contract : DPI Engine for NFV
∙ 2016.12 Launching : zPR-1000 – Highspeed Packet Recoder
∙ 2017.01 Launching : zUG-1000 – 2.5Gbps Unidirectional Security Gateway
∙ 2017.02 Exhibition in RSA2017
PRODUCT
System performance
2Gbps
Type of Network connection port
2 × 1G SFP/UTP
Maximum number of flows (unidirectional network)
Maximum number of connection per second
16,000K
500K
Main purpose and feature
2Gbps Full packet capture and store
Time to market
2016.12
System performance
Broker system for Encrypted packet
Type of Network connection port
200K
Maximum number of flows (unidirectional network)
1,000K
Maximum number of connection per second
12×10G SFP+16×1G SFP/UTP
Main purpose and feature
20/40Gbps
Time to market
2018.12
System performance
Type of Network connection port
Maximum number of flows (unidirectional network)
Maximum number of connection per second
Main purpose and feature
Time to market
N×2Gbps + M×20Gbps
N×4× 10G SFP+M×16×1G SFP/UTP
32,000K
1,000K
openSOC platform supporting full packet capture/search/analysis/visualize base on BigData analysis
2018.12
System performance
20Gbps
Type of Network connection port
Maximum number of flows (unidirectional network)
Maximum number of connection per second
2× 10G SFP+16 × 1G SFP/UTP
32,000K
1,000K
Main purpose and feature
20Gbps packet capture and store real-time data compression improvement of search efficiency
Time to market
2017.3
zPR-1000
High-speed Packet Recording System
Recent cyber-attacks are often equipped with various sophisticated functions to evade security components protecting the network, and hence, it would be very difficult to identify the intrusions that employed such complicated techniques to penetrate the system, to steal the confidential information, and to control the agent. For effective forensic, it is essential to store and keep network traffic data consistently with no loss of information that can enable thorough investigation in future. zPR-1000 provides a powerful forensic infrastructure with the full-fledged functionality for lossless capturing, storing, and indexing of network traffic data, with the associated integrity information.
Lossless traffic capture and store
zPR-1000 has an ability to capture the packets from a 10Gbps network interface with the full bandwidth rate, and it stores the captured packets to the 96TB storage system without any loss. It is thus possible to identify intrusions with the collected traffic data, providing a practical tool for forensic analysis like blackbox and CCTV. zPR-1000 is unique and complementary to existing security components such as firewalls, IDS/IPS systems and SIEM tools, to enhance the security function.
Layer-7 flow collection and analysis
zPR-1000 provides a function of layer-7 flow collection and analysis, as well as the capture of the raw traffic data, which enables the tracking of sessions among hosts. zPR-1000 also implements a diverse range of auxiliary features for flow statistics, application identification, and file attachment detection, which can be referenced for internal tracking.
Data integrity for effective forensic
zPR-1000 keeps the network traffic in the standard pcap files, with the meta-data to retrieve packets using the flow and offset information. The associated hash data for each traffic file is also maintained for data integrity to provide effective forensic services. zPR-1000 utilizes a virtualized volume-based storage technology for secure management of the integrity information.
System Specification
Applications and Uses
Inference of transit nodes from victim hosts for tracking
• Unidirectional flow meta-data
• Identification of connections to blacklisted hosts • Management of blacklist
Flow-based anomaly detection
• Port scanning detection
• Traffic statistics data
Forensic with the integrity information
• Filtered/non-filtered captured traffic data
File transfer/reception meta-data
• Tracking of downloaded files (e.g., via Web or email)
• Tracking of file transfer/reception
• Detection of file transfer initiators and C&C servers
Cooperation with third-party security components
• Identification of malicious hosts and files through the cooperation with third-party security functions
• Detection of malicious files/hosts and infected hosts
DOWNLOAD
OUR TEAM
Sang Man Lee
CEO
SYSMATE Vice president
Paxcomm Senior researcher
ETRI Senior researcher
Seok Jae Han
Senior Engineer
SYSMATE Senior researcher
Coentec Senior researcher
You Kyoung Lee
Senior Managing Director
CP Science & Technology Co.
ETRI Senior researcher
Seog Bea Kim
Senior Engineer
Mrsys Senior researcher
ETRI Senior researcher
Wang Hwan Lee
CTO
SYSMATE Director of research institute
ETRI Senior researcher
Hyeong Ki Park
Senior Engineer
Netcodec head of department
Paxcomm Exaggeration
PARTNERS
CONTACT
75 Techno 1-ro, Yuseong-gu, Daejeon, South Korea
T: 042-933-0685
F: 042-933-0687
Zentillion Inc. | 75 Techno 1-ro, Yuseong-gu, Daejeon, South Korea
T: 042-933-0685 | F: 042-933-0687 | E-mail: marketing@zentillion.net | © 2016 Zentillion Inc. All Rights Reserved
Zentillion is a group of professionals with over 20 years of experience in national research institutes or companies in the field of network and security. We improve the reliability of our technology and provide customized products and solutions that meet market demands.
System performance
2Gbps
Type of Network connection port
2 × 1G SFP/UTP
Maximum number of flows (unidirectional network)
16,000K
Maximum number of connection per second
500K
Main purpose and feature
2Gbps Full packet capture and store
Time to market
2016.12
System performance
20Gbps
Type of Network connection port
2× 10G SFP+16 × 1G SFP/UTP
Maximum number of flows (unidirectional network)
32,000K
Maximum number of connection per second
1,000K
Main purpose and feature
Broker system for Encrypted packet
Time to market
2017.3
System performance
N×2Gbps + M×20Gbps
Type of Network connection port
N×4× 10G SFP+M×16×1G SFP/UTP
Maximum number of flows (unidirectional network)
32,000K
Maximum number of connection per second
1,000K
Main purpose and feature
openSOC platform supporting full packet
capture/search/analysis/visualize base on Big Data analysis
Time to market
2018.12
System performance
20/40Gbps
Type of Network connection port
12×10G SFP+16×1G SFP/UTP
Maximum number of flows (unidirectional network)
1,000K
Maximum number of connection per second
200K
Main purpose and feature
20Gbps packet capture and store real-time data compression improvement of search efficiency
Time to market
2018.12
Inference of transit nodes from victim hosts for tracking
• Unidirectional flow meta-data
• Identification of connections to blacklisted hosts • Management of blacklist
Flow-based anomaly detection
• Port scanning detection • Traffic statistics data
Forensic with the integrity information
• Filtered/non-filtered captured traffic data
File transfer/reception meta-data
• Tracking of downloaded files (e.g., via Web or email)
• Tracking of file transfer/reception
• Detection of file transfer initiators and C&C servers
Cooperation with third-party security components
• Identification of malicious hosts and files through the cooperation with third-party security functions
• Detection of malicious files/hosts and infected hosts