Founded on its data encryption technology in 1997, Penta Security is a leading provider of web and data security products, solutions, and services. Although Korea today is recognized as a global technology powerhouse, in 1990s there was very little knowledge about technology or cybersecurity. Founder Seokwoo Lee established the company with the vision of bringing security to the forefront.
As security threats rise, sensitive information becomes ever vulnerable to unwanted disclosure and tampering, and businesses and individuals may be tempted to become more reclusive. However, our society is one that should be open, relying on communication, interaction, and sharing among people in order to prosper and develop. Security is essential in order to continue developing a knowledgeable, informed society.
Therefore, the future of technology rests on research. Penta Security prides itself on the emphasis it places on research and development.
Core Technology
Development:
Through managing and further developing our core technologies, we innovate to bring new products and solutions to those who need it the most.
Comprehensive Management
System:
With roadmaps and R&D strategies, we make sure that our entire lineup is comprehensively managed in order to ensure compatibility, accessibility, and quality security.
Development-Oriented
Management:
We value successful introduction of products and services into the market through perfected marketing and distribution techniques.
Our Aim
Penta Security takes a holistic approach to cover all the bases for information security. The company has worked and is constantly working to ensure the safety of its customers behind the scenes through the wide range of IT-security offerings. As a result, with its headquarters in Korea, the company has expanded globally as a market share leader in the Asia-Pacific region.
As one of the first to make headway into information security in Korea, Penta Security has developed a wide range of fundamental technologies. Linking science, engineering, and management together to expand our technological capacity, we then make our critical decisions from a technological standpoint.
While the goal of technology-oriented management is to maximize the economic benefits of the investment, consequently we firmly believe the need to carry out societal responsibilities. Therefore, our goal is to grow long-term for economic, environmental, and technological success.
The importance of digitalized data has been rising in various fields. Whether it’s politics, economy, culture and the arts, or science, industrial infrastructures have gradually become more and more data-oriented, and our reliance on information assets have also been following suit.
Therefore, we have seen an increase in cyber-crime targeting these valuable information assets, pointing to the need for information security as a preemptive measure to prevent potential loss and theft of sensitive information. The dangers that threaten this data constantly change, so a security measure that guaranteed safety in the past might not do so anymore.
To respond to these situational changes, we need to constantly seek fundamental solutions to resolve the ever-changing problems. Penta Security promises to continue to deliver trustworthy and reliable technology through research, development, and management of our products and solutions.
Secure First,
Then Connect
Secure First,
Then Connect
Cloudbric presents a comprehensive all-in-one
platform for cloud-based security needs.
Security Platform
WAAP
Web Application and API Protection
The WAAP security solution is an advanced web firewall that effectively mitigates web attacks, bot attacks, DDoS attacks, and API attacks.

Cloudbric WAF+
SaaS-type web application and
API security platform.
Public Cloud Security
Public Cloud Security for AWS
Simplify the complex security policies of convenient cloud services.

Cloudbric Managed Rules
AWS-approved, high-performance security policies that ensure simplified AWS web security.

Cloudbric WAF+
SaaS-type
web application
and API
security platform.
ZTNA
Zero Trust Network Access
Protect enterprise networks with robust security, from user authentication to IoT devices.

Cloudbric PAS
Evolved VPN An Award-winning
SaaS-type ZTNA
solution with
implemented SDP

Cloudbric RAS
Easy-to-deploy SaaS-type ZTNA solution, offering from two-factor authentication (2FA) to DDoS/hacking block.
CTI Cloudbric Labs
Threat Intelligence collection·sharing platform
A platform that shares high-quality threat intelligence certified by the global security leadership organization, Cyber Threat Alliance (CTA). Proactively respond to cyber threats with Cloudbric Labs.

Threat DB
Threat Intelligence Big data

WAFER
Web-based WAF performance tester

Threat Index
Web-vulnerability search tool
Why Cloudbric
100,000 References Across 114 Countries
Expertise
Security experts with over 20 years of experience deliver cutting-edge security services to clients across the globe.
Technology
Internationally acclaimed security services with a history of winning prestigious awards
Easy
An intuitive UI that displays real-time security status to ensure convenience and simplicity for customers
WAPPLES
The Intelligent Web Application and API Protection WAPPLES Data Sheet
WAPPLES is a Web Application and API Protection solution(WAAP) that utilizes logical analysis to protect web applications, APIs, and mobile apps from cyber attacks.
As a market share leader in Asia-Pacific, WAPPLES is an effective solution against sensitive data exposure, website defacement, API schema protection, malicious bots, and DoS, helping organizations exceed regulatory compliance.
Powered by a logical COCEP™ engine, WAPPLES reponds newest threats, including attacks in Advanced Persistent Threats (APT) launched by malicious groups to thieve data assets of governmental organizations or enterprises. The Lower false-positive rate, based on the intelligent logical COCEP™ detection engine, of Penta Security’s WAAP solutions including Cloud based one is recognized by Gartner in 2023 market guide.
Intelligence Allows Top Performance
While traditional WAFs depend on high-maintenance signature updates for low-accuracy pattern-matching, WAPPLES uses a logic-based detection engine called COCEP™ (Contents Classification and Evaluation Processing).
Utilizing 39 pre-configured detection rules, modified and even unknown attacks are categorized and blocked heuristically and semantically. This proprietary technology allows WAPPLES to deliver superior security with industry-leading accuracy and low false positive rates under various network environments.
Through the analysis of an attack’s characteristics, WAPPLES is able to identify attacks that utilize new patterns of exploit that often bypass typical WAFs utilizing signature-based detection engines.
1st and 2nd generation WAFs that operate on blacklists and whitelists lag behind due to their reliance on signature updates to detect the latest threats. In comparison, the sophistication of security that WAPPLES can provide greatly surpasses that of signature-based WAFs.
WAPPLES Product Family and Related Services
WAPPLES
Appliance-type WAAP product
WAPPLES SA
Virtual WAAP Solution optimized for cloud environment
Features
Appliance-type WAAP Solution
· Logic-analysis based COCEP™ engine protects websites against various cyber threats including OWASP Top 10 and API Security Risks
· Extremely low false-positive rates through heuristic and semantic traffic analysis
· Utilizes 39 detection rules that can be fine-tuned to create robust custom security policies
· Defense from known, zero-day, and HTTP DoS attacks
· Validity testing (Luhn: ISO/IEC7812) prevents leakage of sensitive data
Easy to Install & Configure
· Minimal changes to existing systems
· Quick setup with pre-configured security policies
· Statistics visualized on a centralized dashboard
· Intuitive and easy-to-use GUI management console
· Increases efficiency in web security management
Supports Various Environments
· Can be deployed in Reverse proxy, Inline, or High Availability (HA) configuration modes
· Support for EtherChannel and Multi-Segment
· Integration with SIEM
High Performance and Stability
· Optimized core provides enhanced performance
· High processing power with in-memory computing capability
· Stable performance even with strict security policy settings enabled
· Increased bandwidth through bonding technology
Deployment
Specifications
Economy
Value
Performance
High-End
*Specifications subject to change without notice.
Implementation
When a customer chooses to deploy WAPPLES, a thorough analysis of the customer environment will be conducted prior to installation. This is important for optimizing policy settings tailored to specific operational and business needs to achieve an optimal configuration. Post-installation, detection logs are also monitored over a period of time and analyzed to further fine-tune the security policies and complete the implementation process.
- Pre-Inspection
– Pre-inspection - Install and Configuration
– WAPPLES installation
– WAPPLES configuration
– Operation testing and demonstration - Supplement Policy
– Detection log analysis
– Analysis report
– Policy modification
WAPPLES SA
Virtual Web Application and API Protection for your cloud
WAPPLES SA (Software Appliance) is a virtual Web Application and API Protection (WAAP) that can be seamlessly integrated with cloud systems and other virtual environments. This solution is a great fit for enterprise customers such as data centers and hosting providers as well as SMBs such as managed security service providers and private cloud business infrastructures. WAPPLES SA has support for popular hypervisors including KVM, XenServer, and vSphere.
Convenient Scalability
WAPPLES SA (Software Appliance) generally provides all the capabilities of the hardware WAPPLES appliance with the added ability to scale as your business grows. Based on the same award-winning WAPPLES technology, WAPPLES SA can detect and block known, modified and zero-day attacks with its Contents Classification and Evaluation Processing (COCEP™) engine.
- 39 preconfigured detection rules heuristically and semantically protect websites at extremely low false positive rates
- Validity testing mechanism (Luhn : ISO/IEC7812) prevents leakage of sensitive data
- Centralized dashboard aids visualization of threat data
- Supports log searches by period/source/URI/country
- Exports logs in Excel format and supports backup/deletion/recovery of logs
- Easily operable without maintenance by web security experts
Matching the dynamic scalability of the Cloud, WAPPLES SA provides the most appropriate level of protection for any sized company.
Easy Installation and Configuration
Unlike deploying a hardware appliance, implementing WAPPLES SA is an extremely straightforward process. When a client decides to deploy WAPPLES SA, the client receives a DVD file that can simply be imported through supported virtual platforms.
The benefits are:
- Minimal changes to existing systems
- Quick setup with preconfigured security policies
- Intuitive GUI management console allows users to further fine-tune and create robust custom security policies
- Independently managed H/W servers and S/W protection with a reverse proxy IP
- Increased efficiency in web security management
WAPPLES SA runs as a virtual appliance on the same layer as other virtual images. Therefore, there is no need for the installation of another agent or any other modification of the virtual platform/hypervisor.
Once the proxy IP of the web server is registered in WAPPLES, the logic-based detection engine of WAPPLES SA will immediately begin examining all web traffic sent to the registered web server.
In general, performance degradation may be experienced when a security solution has more than 3,000 patterns. With WAPPLES SA, however, such pattern updates are no longer required.
Benefits to Cloud Service Providers
Optimized for integration with cloud systems, cloud providers are able to provide their clients with high-end security services:
1. Increase reliability of cloud service through improved security
2. Build customized management pages with WAPPLES SA’s Web API
3. Reduce TCO by utilizing a virtual appliance instead of H/W model
4. Support high availability, complete with policy and log synchronization in real-time
5. Receive web attack analysis report for cloud service providers
Benefits to Cloud Service Providers
Specifications
*Actual performance may vary depending on multiple factors including system configuration, hardware specifications, and network traffic.
| File Type | File Name | Download | Share |
|---|---|---|---|
| Brochure | Finance-meritz_CaseStudy_120112(PDF) | ||
| Brochure | Frost-Sullivan-Penta-Security-White-Paper-Digital(PDF) | ||
| Data Sheet | WAPPLES_DataSheet_20240406(PDF) | ||
| Case Study | Airlines-AsianaIDT_CaseStudy_110928_EN_V1.0(PDF) | ||
| Case Study | Airport-IIAC_CaseStudy_110929_EN_V1.0(PDF) | ||
| Case Study | Data-Center-TecSeed_CaseStudy_110930(PDF) | ||
| Case Study | Data-Center-TecSeed_CaseStudy(PDF) | ||
| Case Study | FS-White-Paper-Developing-a-Resilient-Web-Defense(PDF) | ||
| Case Study | Game-Company-Smilegate_-WAPPLES-Case-Study(PDF) | ||
| Case Study | High-School-ISKL_CaseStudy_v1-1(PDF) | ||
| Case Study | Insurance-ING_CaseStudy_111216(PDF) | ||
| Case Study | Insurance-MetLife_CaseStudy_111216(PDF) | ||
| Case Study | Telecom-SKTelecom_CaseStudy_120228(PDF) | ||
| Case Study | University-Hoseo_University_CaseStudy_120517(PDF) |
日期
標題
Founded on its data encryption technology in 1997, Penta Security is a leading provider of web and data security products, solutions, and services. Although Korea today is recognized as a global technology powerhouse, in 1990s there was very little knowledge about technology or cybersecurity. Founder Seokwoo Lee established the company with the vision of bringing security to the forefront.
As security threats rise, sensitive information becomes ever vulnerable to unwanted disclosure and tampering, and businesses and individuals may be tempted to become more reclusive. However, our society is one that should be open, relying on communication, interaction, and sharing among people in order to prosper and develop. Security is essential in order to continue developing a knowledgeable, informed society.
Therefore, the future of technology rests on research. Penta Security prides itself on the emphasis it places on research and development.
Core Technology
Development:
Through managing and further developing our core technologies, we innovate to bring new products and solutions to those who need it the most.
Comprehensive Management
System:
With roadmaps and R&D strategies, we make sure that our entire lineup is comprehensively managed in order to ensure compatibility, accessibility, and quality security.
Development-Oriented
Management:
We value successful introduction of products and services into the market through perfected marketing and distribution techniques.
Our Aim
Penta Security takes a holistic approach to cover all the bases for information security. The company has worked and is constantly working to ensure the safety of its customers behind the scenes through the wide range of IT-security offerings. As a result, with its headquarters in Korea, the company has expanded globally as a market share leader in the Asia-Pacific region.
As one of the first to make headway into information security in Korea, Penta Security has developed a wide range of fundamental technologies. Linking science, engineering, and management together to expand our technological capacity, we then make our critical decisions from a technological standpoint.
While the goal of technology-oriented management is to maximize the economic benefits of the investment, consequently we firmly believe the need to carry out societal responsibilities. Therefore, our goal is to grow long-term for economic, environmental, and technological success.
The importance of digitalized data has been rising in various fields. Whether it’s politics, economy, culture and the arts, or science, industrial infrastructures have gradually become more and more data-oriented, and our reliance on information assets have also been following suit.
Therefore, we have seen an increase in cyber-crime targeting these valuable information assets, pointing to the need for information security as a preemptive measure to prevent potential loss and theft of sensitive information. The dangers that threaten this data constantly change, so a security measure that guaranteed safety in the past might not do so anymore.
To respond to these situational changes, we need to constantly seek fundamental solutions to resolve the ever-changing problems. Penta Security promises to continue to deliver trustworthy and reliable technology through research, development, and management of our products and solutions.
Secure First,
Then Connect
Secure First,
Then Connect
Cloudbric presents a comprehensive all-in-one
platform for cloud-based security needs.
Security Platform
WAAP
Web Application and API Protection
The WAAP security solution is an advanced web firewall that effectively mitigates web attacks, bot attacks, DDoS attacks, and API attacks.

Cloudbric WAF+
SaaS-type web application and
API security platform.
Public Cloud Security
Public Cloud Security for AWS
Simplify the complex security policies of convenient cloud services.

Cloudbric Managed Rules
AWS-approved, high-performance security policies that ensure simplified AWS web security.

Cloudbric WAF+
SaaS-type
web application
and API
security platform.
ZTNA
Zero Trust Network Access
Protect enterprise networks with robust security, from user authentication to IoT devices.

Cloudbric PAS
Evolved VPN An Award-winning
SaaS-type ZTNA
solution with
implemented SDP

Cloudbric RAS
Easy-to-deploy SaaS-type ZTNA solution, offering from two-factor authentication (2FA) to DDoS/hacking block.
CTI Cloudbric Labs
Threat Intelligence collection·sharing platform
A platform that shares high-quality threat intelligence certified by the global security leadership organization, Cyber Threat Alliance (CTA). Proactively respond to cyber threats with Cloudbric Labs.

Threat DB
Threat Intelligence Big data

WAFER
Web-based WAF performance tester

Threat Index
Web-vulnerability search tool
Why Cloudbric
100,000 References Across 114 Countries
Expertise
Security experts with over 20 years of experience deliver cutting-edge security services to clients across the globe.
Technology
Internationally acclaimed security services with a history of winning prestigious awards
Easy
An intuitive UI that displays real-time security status to ensure convenience and simplicity for customers
WAPPLES
The Intelligent Web Application and API Protection WAPPLES Data Sheet
WAPPLES is a Web Application and API Protection solution(WAAP) that utilizes logical analysis to protect web applications, APIs, and mobile apps from cyber attacks.
As a market share leader in Asia-Pacific, WAPPLES is an effective solution against sensitive data exposure, website defacement, API schema protection, malicious bots, and DoS, helping organizations exceed regulatory compliance.
Powered by a logical COCEP™ engine, WAPPLES reponds newest threats, including attacks in Advanced Persistent Threats (APT) launched by malicious groups to thieve data assets of governmental organizations or enterprises. The Lower false-positive rate, based on the intelligent logical COCEP™ detection engine, of Penta Security’s WAAP solutions including Cloud based one is recognized by Gartner in 2023 market guide.
Intelligence Allows Top Performance
While traditional WAFs depend on high-maintenance signature updates for low-accuracy pattern-matching, WAPPLES uses a logic-based detection engine called COCEP™ (Contents Classification and Evaluation Processing).
Utilizing 39 pre-configured detection rules, modified and even unknown attacks are categorized and blocked heuristically and semantically. This proprietary technology allows WAPPLES to deliver superior security with industry-leading accuracy and low false positive rates under various network environments.
Through the analysis of an attack’s characteristics, WAPPLES is able to identify attacks that utilize new patterns of exploit that often bypass typical WAFs utilizing signature-based detection engines.
1st and 2nd generation WAFs that operate on blacklists and whitelists lag behind due to their reliance on signature updates to detect the latest threats. In comparison, the sophistication of security that WAPPLES can provide greatly surpasses that of signature-based WAFs.
WAPPLES Product Family and Related Services
WAPPLES
Appliance-type WAAP product
WAPPLES SA
Virtual WAAP Solution optimized for cloud environment
Features
Appliance-type WAAP Solution
· Logic-analysis based COCEP™ engine protects websites against various cyber threats including OWASP Top 10 and API Security Risks
· Extremely low false-positive rates through heuristic and semantic traffic analysis
· Utilizes 39 detection rules that can be fine-tuned to create robust custom security policies
· Defense from known, zero-day, and HTTP DoS attacks
· Validity testing (Luhn: ISO/IEC7812) prevents leakage of sensitive data
Easy to Install & Configure
· Minimal changes to existing systems
· Quick setup with pre-configured security policies
· Statistics visualized on a centralized dashboard
· Intuitive and easy-to-use GUI management console
· Increases efficiency in web security management
Supports Various Environments
· Can be deployed in Reverse proxy, Inline, or High Availability (HA) configuration modes
· Support for EtherChannel and Multi-Segment
· Integration with SIEM
High Performance and Stability
· Optimized core provides enhanced performance
· High processing power with in-memory computing capability
· Stable performance even with strict security policy settings enabled
· Increased bandwidth through bonding technology
Deployment
Specifications
Economy
Value
Performance
High-End
*Specifications subject to change without notice.
Implementation
When a customer chooses to deploy WAPPLES, a thorough analysis of the customer environment will be conducted prior to installation. This is important for optimizing policy settings tailored to specific operational and business needs to achieve an optimal configuration. Post-installation, detection logs are also monitored over a period of time and analyzed to further fine-tune the security policies and complete the implementation process.
- Pre-Inspection
– Pre-inspection - Install and Configuration
– WAPPLES installation
– WAPPLES configuration
– Operation testing and demonstration - Supplement Policy
– Detection log analysis
– Analysis report
– Policy modification
WAPPLES SA
Virtual Web Application and API Protection for your cloud
WAPPLES SA (Software Appliance) is a virtual Web Application and API Protection (WAAP) that can be seamlessly integrated with cloud systems and other virtual environments. This solution is a great fit for enterprise customers such as data centers and hosting providers as well as SMBs such as managed security service providers and private cloud business infrastructures. WAPPLES SA has support for popular hypervisors including KVM, XenServer, and vSphere.
Convenient Scalability
WAPPLES SA (Software Appliance) generally provides all the capabilities of the hardware WAPPLES appliance with the added ability to scale as your business grows. Based on the same award-winning WAPPLES technology, WAPPLES SA can detect and block known, modified and zero-day attacks with its Contents Classification and Evaluation Processing (COCEP™) engine.
- 39 preconfigured detection rules heuristically and semantically protect websites at extremely low false positive rates
- Validity testing mechanism (Luhn : ISO/IEC7812) prevents leakage of sensitive data
- Centralized dashboard aids visualization of threat data
- Supports log searches by period/source/URI/country
- Exports logs in Excel format and supports backup/deletion/recovery of logs
- Easily operable without maintenance by web security experts
Matching the dynamic scalability of the Cloud, WAPPLES SA provides the most appropriate level of protection for any sized company.
Easy Installation and Configuration
Unlike deploying a hardware appliance, implementing WAPPLES SA is an extremely straightforward process. When a client decides to deploy WAPPLES SA, the client receives a DVD file that can simply be imported through supported virtual platforms.
The benefits are:
- Minimal changes to existing systems
- Quick setup with preconfigured security policies
- Intuitive GUI management console allows users to further fine-tune and create robust custom security policies
- Independently managed H/W servers and S/W protection with a reverse proxy IP
- Increased efficiency in web security management
WAPPLES SA runs as a virtual appliance on the same layer as other virtual images. Therefore, there is no need for the installation of another agent or any other modification of the virtual platform/hypervisor.
Once the proxy IP of the web server is registered in WAPPLES, the logic-based detection engine of WAPPLES SA will immediately begin examining all web traffic sent to the registered web server.
In general, performance degradation may be experienced when a security solution has more than 3,000 patterns. With WAPPLES SA, however, such pattern updates are no longer required.
Benefits to Cloud Service Providers
Optimized for integration with cloud systems, cloud providers are able to provide their clients with high-end security services:
1. Increase reliability of cloud service through improved security
2. Build customized management pages with WAPPLES SA’s Web API
3. Reduce TCO by utilizing a virtual appliance instead of H/W model
4. Support high availability, complete with policy and log synchronization in real-time
5. Receive web attack analysis report for cloud service providers
Benefits to Cloud Service Providers
Specifications
*Actual performance may vary depending on multiple factors including system configuration, hardware specifications, and network traffic.
| File Type | File Name | Download | Share |
|---|---|---|---|
| Brochure | Finance-meritz_CaseStudy_120112(PDF) | ||
| Brochure | Frost-Sullivan-Penta-Security-White-Paper-Digital(PDF) | ||
| Data Sheet | WAPPLES_DataSheet_20240406(PDF) | ||
| Case Study | Airlines-AsianaIDT_CaseStudy_110928_EN_V1.0(PDF) | ||
| Case Study | Airport-IIAC_CaseStudy_110929_EN_V1.0(PDF) | ||
| Case Study | Data-Center-TecSeed_CaseStudy_110930(PDF) | ||
| Case Study | Data-Center-TecSeed_CaseStudy(PDF) | ||
| Case Study | FS-White-Paper-Developing-a-Resilient-Web-Defense(PDF) | ||
| Case Study | Game-Company-Smilegate_-WAPPLES-Case-Study(PDF) | ||
| Case Study | High-School-ISKL_CaseStudy_v1-1(PDF) | ||
| Case Study | Insurance-ING_CaseStudy_111216(PDF) | ||
| Case Study | Insurance-MetLife_CaseStudy_111216(PDF) | ||
| Case Study | Telecom-SKTelecom_CaseStudy_120228(PDF) | ||
| Case Study | University-Hoseo_University_CaseStudy_120517(PDF) |
日期
標題
產品查詢
電話:(886) 02 7722 6899
電郵:sales@version-2.com.tw



