PRODUCTS

SOFTWARE

We install software along with our own solutions to help our clients achieve improved
performance and the best data-based environment through continuous collaboration
and research and development with our professional partners.

Security Solution

CipherTrust Data Security
Platform

Keeping confidential information safe has become critical to every company as data breaches continue to proliferate. Companies are working to comply as global and local privacy regulations continue to evolve.

CipherTrust Data Security Platform is a next-generation platform that enables rapid and secure cloud migration based on microservice architecture (MSA). BMtech System Co., Ltd. utilizes Thales’ CipherTrust data security to provide high-level security solutions that span from existing on-premise environments to cloud environments.

01

The Global Leader
in the Security Industry,
Thales

Thales provides security and control services in various high-tech industries and is considered to be the best global company in the field of HSM (hardware security modules).

02

The Ultimate Security Solution,
CipherTrust Data Security
Platform

CipherTrust Data Security Platform combines data-centric security products and solutions to effectively integrate data discovery, protection, and control functions.

Benefits

CipherTrust Manager is the core key management solution of CipherTrust Data Secure Platform.
We help companies centrally manage encryption keys and establish access control and security policies.

  • 1
    Key Management

    Capable of providing centralized key
    management and control for
    role-based policies.

  • 2
    Access Policy Management

    Compatible with a variety of Thales
    encryption products including file
    encryption and integrated management
    features.

  • 3
    Audit Report

    Support for various log formats to
    provide improved audit and reporting
    functions and customized alarm functions.

  • 4
    Flexible API

    Supports a variety of flexible
    REST APIs for implementing automated
    encryption and management functions.

Privacy Policy

Close

Refusal of Unauthorized Collection of Email Addresses

We refuse unauthorized collection of e-mail addresses posted on this website using e-mail collection programs or other technical devices, and please keep in mind that violations will result in criminal penalties under the Information and Communication Network Act

※ Act on Promotion of Information and Communications Network Utilization and Information Protection, etc.

* Article 50-2 (Prohibition of unauthorized collection of e-mail addresses, etc.)
  • No one shall collect e-mail addresses using a program or other technical device that automatically collects e-mail addresses from an Internet homepage where the intention to refuse collection of e-mail addresses is stated.
  • No one shall sell or distribute the e-mail addresses collected in violation of the provisions of Paragraph 1.
  • Anyone who knows that the collection, sale, and distribution of the e-mail address is prohibited in accordance with the provisions of paragraphs 1 and 2 shall not use it for information transmission.

* Article 74 (Penalty) A person who falls under any of the following subparagraphs shall be punished by a fine not exceeding 10 million won.
  • A person who displays, sells, or displays for sale in violation of Article 8 (4)
  • A person who distributes, sells, rents, or publicly displays obscene code, words, sound, image, or video in violation of Article 44-7 (1) 1
  • A person who repeatedly reaches the other party with code, words, sound, image, or video that induces fear or anxiety in violation of Article 44-7 (1) 3
  • A person who takes technical measures in violation of Article 50 (6)
  • A person who transmits advertising information in violation of Article 50-8 A person who collects, sells, distributes, or uses e-mail addresses for information transmission in violation of Article 50-2
  • A person who transmits advertising information in violation of Article 50-8
  • A person who fails to register changes in registered matters, transfer or acquisition of business, or report merger or inheritance in violation of Article 53 (4)
닫기