We provide a total security service that includes security consulting,
security system implementation, solution provision, and security monitoring.
LG CNS's Security Service
In the rapidly emerging the Fourth Industrial Revolution, new and innovative technologies such as IoT, AI, and cloud will accelerate customers’ digital transformation. LG CNS’s total security service includes security consulting, system implementation, solution provision, and security monitoring, providing security, privacy, and safety for customers’ digital transformation.
What security services does LG CNS offer?
01Security Consulting
Information Security Masterplan Consulting
Ideal for companies that need to establish or adjust security visions, objectives, or roadmaps
Personal Information protection Consulting
Ideal for companies with large amounts of personal information and multiple personal information systems
Information Security Certification Consulting
Ideal for companies seeking to acquire or renew an information security certification
Cloud Security Consulting
Ideal for companies looking to securely design, build, and operate cloud resources
Factory Security Consulting
Ideal for companies wishing to improve the security of production lines and operate them safely
Physical Security Consulting
Ideal for companies planning to relocate or establish new business sites
Vulnerability Assessment and Preventative Hacking Simulation
Ideal for companies that frequently develop or change services and applications
02Security Implementation
Smart Factory Security
Ideal for companies planning to construct, relocate, or expand factories
Smart City Security
Ideal for central or local governments that have a Smart City project plan
Public, Financial, and Corporate Security
Ideal for organizations planning to develop a new system or change an existing one
Physical Security
Ideal for companies with multiple dispersed business sites or a large warehouse
03Security Solution
Cloud Environment Protection
Ideal for companies looking to strengthen public, hybrid, or multi-cloud security
Personal Information Security Management
Ideal for companies with large amounts of personal information and multiple personal information systems
Information Security Portal
Ideal for companies with new or expanding security systems
IoT Security Solutions
Ideal for companies that sell B2B or B2C IoT devices
Access Control
Ideal for companies with multiple dispersed business sites or a large warehouse
Video Surveillance
Ideal for companies with multiple dispersed business sites or a large warehouse
Physical Security Integrated Monitoring
Ideal for companies with multiple dispersed business sites or a large warehouse
04Managed Security Service
Security Control
Ideal for companies with many B2C sites or many Internet connections
Security Management Shared Service
Ideal for companies with no security system or security staff
01Security Consulting Service
Security consulting by area
LG CNS’s security consulting service proposes integrated information security models optimized for client companies that need advanced information protection systems. Based on the company's more than 20 years' security consulting experience and expertise, the service identifies the root causes of security vulnerabilities and provides realistic improvement plans.
Proposes an optimized security strategy through systematic risk analysis and practical implementation plan that includes HotFix and short-term and medium-term plans
Eliminates the risk of personal information loss by analyzing the personal information status and life cycle
Improves information security management systems, and supports the acquisition or renewal of domestic and overseas security certifications such as ISMS-P and ISO27001
Proposes security requirements and safe design, implementation, and operation measures needed for public or hybrid cloud establishment
Identifies security vulnerabilities in production lines and proposes protective measures for the non-disruptive operation of production environments
Designs a safe physical security system by identifying security risks considering protection targets and internal and external physical environments
Vulnerability assessment and hacking simulation
LG CNS’s security service provides vulnerability assessment and preventative hacking simulation to help clients better respond to system intrusion or data loss caused by technical vulnerabilities. Based on various inspection checklists and scenarios developed in our dedicated vulnerability analysis, and hacking prevention labs, our consulting incluces diagnostics for the web operations and applications as well as IoT devices and industrial control facilities.
Performs OWASP-based web application inspection and hacking simulation
The Open Web Application Security Project (OWASP)
Performs vulnerability diagnosis and hacking simulation for apps based on iOS and Android
Performs vulnerability diagnosis and hacking simulation for IoT devices, gateways, and servers
Performs vulnerability diagnosis for facilities and equipment such as smart factory and power facilities
Industrial Control System (ICS), Supervisory Control and Data Acquisition (SCADA)
Performs vulnerability diagnosis for public cloud environments such as AWS, Azure, and GCP
02Security System Implementation
Security system implementation for Smart Factory
LG CNS’s security service provides an end-to-end security system that identifies and proactively counters possible security threats in production facilities, thereby minimizing the risk of production disruption. The system protects important facilities and prevents infomation breaches by utilizing ICS/SCADA experts experienced in factory security consulting and security system implementation in LG affiliates as well as the factory security solution suite that supports the integrated resolution of security threats without depending on specific vendors.
Graphically displays threat points such as inflow points in the production network
Security monitoring of facility and production network status
Restricts the connection of unauthorized media
Detects malware in facilities and takes protective measures
Separately configures production networks
Controls remote access based on authorization levels maintain access records
Authentication and encryption to prevent information interception and falsification
Monitors unauthorized access to key facilities
Controls access to key facilities by authority
Manages visitors’ access cards and controls mobile devices
Security screening for information breach points
Security system implementation for Smart City
LG CNS’s security service builds an end-to-end security system that protects all facilities and IT systems directly related to Smart City safety and privacy. This service proposes integrated security measures for IT security, IoT security, and physical security to protect all Smart City components and provides an intelligent security monitoring system that detects abnormalities based on information collected from different devices using AI technology.
Security event integration and intelligent analysis
Authentication and Authority management and protection against web vulnerabilities
Personal information encryption, de-identification, access control
Malware detection and blocking, server access control
Protects against external DDoS attacks and vulnerability attacks
Protects the PCs of the operator and the user
Authentication, Encryption, Integrity verification, Site device updates
Physical security of integrated urban operation centers
Security system implementation for public, finance, and corporate sectors
LG CNS’s security service designs and implements security systems to help customers respond to security threats, such as the latest technologies and services such as cloud, IoT, and blockchain aside from the traditional IT systems. Based on proven design experience and implementation procedures that can be applied to various industries and business scales, service provides security systems that take into account future operational efficiency.
Implements security systems such as firewalls, IPS, encryption systems, web firewalls, and SSO for protecting servers, networks, databases, and applications
Implements security systems such as cloud firewall and encryption system to protect assets in cloud environments such as AWS, Azure, and GCP
Implements security systems such as mutual authentication and encryption systems to protect IoT devices, gateways, and servers
Implements security systems for access control, encryption, and monitoring to protect blockchain-based systems
Physical security system implementation
LG CNS’s security service implements physical security systems to protect important information assets from the physical risks of intrusion and theft. Services include information breach prevention, the safe management of major facilities, and personal safety protection. It can link various detection signals to CCTV images to provide intuitive screens and improve effectiveness in responding to physical security and environmental incidents.
03Security Solutions
LG CNS’s security service provides security solutions customized to the customer’s business.
04Security Management Service
Security monitoring
As a 24/7 service provided on the premises or in a cloud environment, it provides guidance on the latest security trends and prevention activities and detects and responds to internal and external security threats in real time to ensure the customer’s business stability.
Various security control services can be provided depending on the customer environments.
24/7 monitoring, security equipment operation, reporting, customer support (Help Desk), and breach response support
LG CNS's Community Emergengency Response Team (CERT) has the highest-level accident forecasting and warning capability in Korea and provides total service that covers all areas from PC/server/network infrastructure to cloud depending on the client's business environment.
Security management sharing service
LG CNS's security specialists provide the essential security management task service for companies having difficulty in security management due to lack of security personnel. This service consists of 13 separate services that improve information security levels. From the Plan-Do-Check-Act (PDCA) perspective, it provides a wide range of services for all security management tasks with close support from LG CNS's top security experts, including hacking simulation specialists.
See the customers using LG CNS's
security service.
Wish to connect directly with the personnel?
Contact Information“*” indicates a required input field.
Close PopupPlease agree to receive marketing information and enter your company name and related work details to receive related newsletters and offline seminar information.
Click the link below and read the content carefully. By checking I Agree, you are deemed to have read and agreed to all of the following.
Using email collection programs or any other technical devices to collect email addresses displayed on this website without permission is prohibited. Failure to comply will lead to criminal charges in accordance with the "Act on the Promotion of Information and Communications Network Utilization and Information Protection, etc."
Posting date: 2010.8.30
LG CNS (hereinafter referred to as the “Company”) takes every measure to protect the rights and interests of the user by complying with the personal data protection regulations for information and communications service providers and setting up a privacy policy pursuant to the “Act on the Promotion of Information and Communications Network Utilization and Information Protection, etc.”
The Company notifies you of its privacy policy as follows:
The Company collects the following types of personal information to facilitate customer consultation and provide various services:
You have the right to withhold consent to the collection of the required information and/or optional information. If you do not consent to the collection of the required information, however, use of service may be limited.
The information below may be automatically generated and collected when you use our website services.
IP address, cookies, date and time of visit, service use history
How personal information is collected
The Company collects personal information in the following ways:
The Company processes collected personal information for the following purposes:
The Company shall use user's personal information within the scope specified in "2. Purposes of processing and using personal information,” and shall neither use such information beyond the scope of agreement without prior consent from the user nor disclose such personal information to third parties, in principle. The following cases are exceptions, however:
The Company shall process and retain the following information for the specified period for the following reasons:
Retaining information in accordance with company policy
Retention Items | Retention Purpose | Retention Period |
---|---|---|
Name, email, contact number, company, job position | Checking the inquirer’s details | 60 months |
Name, email, occupation, company, job position, areas of interest | Sending blog updates | 60 months |
Name, contact number, email, company, job position, department name | Email marketing | 60 months |
If an individual has agreed to the retention period of personal information in advance, the Company may retain such information for the agreed-upon period.
Retention of information in accordance with the relevant laws
If an investigation is in progress due to a violation of related laws, the Company may retain personal information for a certain period of time until the investigation is completed according to the relevant laws.
The Company consigns personal information processing as described below to improve its services and stipulates the necessary matters to ensure that personal information is safely managed upon conclusion of consignment contracts (prohibiting the processing of personal information for purposes other than fulfilling the consignment contract, restricting re-consignment, taking measures to ensure stability) pursuant to the relevant laws. In the event of a change of the consignee, the Company shall disclose the fact through this Privacy Policy without delay.
The Company operates “cookies” that frequently store and find user information. A cookie refers to a very small text file sent by the server used to operate our website on browser and is stored on local computer hard disks. The Company uses cookies for the following purposes:
Example : You can set the options in your web browser to allow all cookies, check and confirm each time a cookie is saved, or refuse to save any cookies.
Example of setting the options (for Internet Explorer): At the top of the web browser, go to Tools> Internet Options> Privacy. If you refuse the installation of cookies, however, there may be difficulties in using our website services.
The Company enforces technical and administrative measures to secure the safety of your personal information, so that it is not lost, stolen, leaked, altered, or damaged when processed.
Technical measures for protecting personal information
Administrative measures for protecting personal information
Only the personal data protection officers of the Company can be assigned the role of personal information controller. Personal information controllers are given separate passwords that are regularly updated, and they must receive regular training to strengthen and emphasize compliance with the personal information processing policy.
The Company has set up internal standards for system access authority of personal information controllers to manage the granting, changes, and cancellation of access rights. The Company implements measures to manage personal information controllers, such as operating the standards for generating access passwords and managing password change intervals.
If your personal information is lost, leaked, altered, or damaged by the mistake of an internal manager or in any technical or administrative accident, the Company shall immediately notify you of the fact, take appropriate measures, and make the corresponding compensation.
The Company shall destroy your personal information without delay after achieving the purpose of collecting and using personal information. The Company shall destroy personal information through the following procedure.
Destruction procedure
The Company shall store personal information entered for a certain period of time after the purpose of collecting this information is achieved for the purpose of protecting the information in accordance with the internal regulations and the relevant laws (see Processing and retention period of personal information), and then destroy the information at the end of the retention period. Personal information stored for said retention period is not used for other purposes unless required by law.
Destruction method
The Company designates the following department and chief privacy officer to protect users’ personal information and settle any complaints regarding personal information.
Type | Manager Team | |
---|---|---|
Chief Privacy Officer’s | Corporate Auditing Unit | infosec01@lgcns.com |
Personal Data Protection Cfficer | Information Security Team | |
Homepage Chief Privacy Officer’s | Public Relations Team | mediapr@lgcns.com |
Homepage Personal Data Protection Cfficer | PR Team |
Please note that this Privacy Policy does not apply to the collection of personal information by websites linked to the Company’s website.
In case of any additions, deletions, or modifications to the current Privacy Policy, the Company will notify you in advance through the Notification section of its website.
Date of enforcement: 2019.9.20
The collection and use of personal information by LG CNS Co., Ltd. (hereafter referred to as the “Company”) require the consent of the user in accordance with the “Act on the Promotion of Information and Communications Network Utilization and Information Protection, etc.” I consent to the collection and use of my personal information by the Company.
The collected personal information is processed for the following purposes.
The Company consigns personal information processing as described below for the improvement of its services and stipulates the necessary matters to ensure that personal information is safely managed upon conclusion of consignment contracts (prohibiting the processing of personal information for purposes other than fulfilling the consignment contract, restricting re-consignment, and taking measures to ensure stability) pursuant to the relevant laws. In the event of a change of consignee, the Company shall disclose such fact through this Privacy Policy without delay.
The Company shall destroy your personal information without delay after achieving the purpose of collecting and using such personal information. Nonetheless, the information below shall be retained for the specified period for the following reasons.
For more information on the collection and use of personal information, please refer to the <Privacy Policy> published on LG CNS's website (www.lgcns.com)
Collection and use of personal information by LG CNS Co., Ltd. (hereafter referred to as the “Company”) requires consent of the user in accordance with the “Act on Promotion of Information and Communications Network Utilization and Information Protection, etc.” I consent to collection and use of my personal information by the Company.
Collected personal information is processed for the following purposes.
The Company consigns personal information processing as follows for improving its services and stipulates matters necessary to ensure that personal information is safely managed upon consignment contracts (prohibiting processing of personal information for other purposes than fulfilling the consignment contract, restricting re-consignment, taking measures to ensure stability) pursuant to the relevant laws. In the event there is a change of consignee, the Company shall disclose this fact through this Privacy Policy without delay.
The Company shall destroy personal information without delay after achieving the purpose of collecting and using this personal information. However, the information below shall be retained for the specified period for the following reasons:
For more information on collection and use of personal information, please refer to the <Privacy Policy> published on the LG CNS website (www.lgcns.com).
The collection and use of personal information by LG CNS Co., Ltd. (hereinafter referred to as the “Company”) require the consent of the user in accordance with the “Act on the Promotion of Information and Communications Network Utilization and Information Protection, etc.” I consent to the collection and use of my personal information by the Company.
Collected personal information is processed for the following purposes:
The Company consigns personal information processing as described below for the improvement of its services and stipulates the necessary matters to ensure that personal information is safely managed upon conclusion of consignment contracts (prohibiting the processing of personal information for purposes other than fulfilling the consignment contract, restricting re-consignment, taking measures to ensure stability) pursuant to relevant laws. In the event of a change of consignee, the Company shall disclose such fact through this Privacy Policy without delay.
The Company shall destroy personal information without delay after achieving the purpose of collecting and using such personal information. Nonetheless, the information below shall be retained for the specified period for the following reasons:
If you do not agree, however, receipt of LG CNS’s solution and event information may be restricted.
For more information on the collection and use of personal information, please refer to the <Privacy Policy> published on the LG CNS website (www.lgcns.com)