Skip to content

The 28th Anniversary of Penta Security

28 anniversary logo penta security

Penta Security Marks 28 Years of Cybersecurity Leadership with a Vision for a Global, AI-Powered Future  

This July, as the world observes Information Security Month, Penta Security is proud to celebrate 28 years of innovation, leadership, and unwavering commitment to creating a safer digital world. Since 1997, our company has been a pioneer in the South Korean cybersecurity market, and today, we stand ready to embark on our next bold chapter.

In an anniversary address, CEO Tae Gyun Kim emphasized that the industry is at a pivotal turning point. “In our hyper-connected society, security is no longer a supplemental technology,” he stated. “It has become the foundation of innovation and the core of business survival. This transformation is our greatest opportunity.”

Building on its deep-rooted market leadership in Korea, Penta Security is accelerating its global expansion, with a strategic focus on its offices in Japan and Vietnam. The company is also enhancing its core capabilities to lead in the era of AI, continuing the pioneering spirit that has defined it for 28 years.

The celebration also honored the true driving force behind this success: the employees. This year, 29 team members were recognized with long-service awards for their five and ten years of dedicated service. Their passion and commitment are the bedrock of our company’s achievements.

Fueled by the unity and passion reaffirmed at our 28th-anniversary celebration, Penta Security is more prepared than ever to continue its journey as a trusted leader in global cybersecurity.

About Penta Security
Penta Security takes a holistic approach to cover all the bases for information security. The company has worked and is constantly working to ensure the safety of its customers behind the scenes through the wide range of IT-security offerings. As a result, with its headquarters in Korea, the company has expanded globally as a market share leader in the Asia-Pacific region.

As one of the first to make headway into information security in Korea, Penta Security has developed a wide range of fundamental technologies. Linking science, engineering, and management together to expand our technological capacity, we then make our critical decisions from a technological standpoint.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

AI BOM: Enhancing Transparency and Trust in the Age of Artificial Intelligence

The AI BOM: Unpacking the ‘Ingredient Label’ for Artificial Intelligence  

We use AI services like ChatGPT and Gemini daily, but what’s actually inside them? As AI systems become more powerful and integrated into our lives, a critical question has emerged: how can we trust a technology when its inner workings are often a black box, even to its creators?

In response to this challenge, a global movement toward AI transparency is taking shape, centered on the concept of an Artificial Intelligence Bill of Materials (AI BOM). Drawing inspiration from the Software Bill of Materials (SBOM) in cybersecurity, an AI BOM is a formal record that systematically documents every component of an AI system—from training data and algorithms to models and third-party libraries.

Why Now? The Perfect Storm Driving AI Transparency

The push for the AI BOM is driven by three main forces:

  1. Rising Complexity: Modern AI is a complex web of open-source models and vast datasets, making it difficult to track dependencies and vulnerabilities.
  2. New, AI-Specific Threats: Security risks like toxic data injection, model theft, and adversarial attacks require a more granular understanding of an AI’s composition.
  3. A Global Wave of Regulation: Governments are no longer leaving AI unchecked. Europe’s AI Act, U.S. executive orders, and South Korea’s national roadmap are all mandating greater transparency and accountability for AI systems, especially those deemed “high-risk.”

The Core Benefits of an AI BOM By providing a clear inventory of an AI system’s components, an AI BOM delivers powerful advantages:

  • Enhanced Transparency & Traceability: Understand how an AI system makes decisions and quickly identify the root cause of issues like bias or malfunction.
  • Proactive Risk Management: Identify and mitigate potential risks, such as biased training data or outdated libraries with security flaws, before they cause harm.
  • Streamlined Regulatory Compliance: Easily generate the documentation needed to comply with tightening global regulations and pass internal or external audits.
  • Secure Supply Chains: Verify the source and reliability of third-party and open-source components, strengthening defenses against vulnerabilities.

The Path Forward: Building a Trustworthy AI Ecosystem Global adoption of the AI BOM is accelerating, from the U.S. military to high-risk sectors in Europe like healthcare and finance. While challenges like standardization remain, the AI BOM is becoming a foundational tool for building a future where artificial intelligence is not only powerful but also transparent, accountable, and safe.

About Penta Security
Penta Security takes a holistic approach to cover all the bases for information security. The company has worked and is constantly working to ensure the safety of its customers behind the scenes through the wide range of IT-security offerings. As a result, with its headquarters in Korea, the company has expanded globally as a market share leader in the Asia-Pacific region.

As one of the first to make headway into information security in Korea, Penta Security has developed a wide range of fundamental technologies. Linking science, engineering, and management together to expand our technological capacity, we then make our critical decisions from a technological standpoint.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Hackers Now Use AI: Evolving Cyber Attacks and Emerging AI Security Threats

The AI-Powered Heist: How Artificial Intelligence is Arming the Next Generation of Cybercriminals 

In Hong Kong, a finance officer transferred $25 million after receiving instructions on a video call from his CFO. The only problem? The CFO was an AI-generated deepfake. This isn’t science fiction; it’s a stark example of a new era in cybersecurity, where Artificial Intelligence is both a powerful tool and a formidable weapon.

As AI weaves itself into society, it is reshaping the threat landscape on two fronts: by supercharging traditional hacking methods and by creating entirely new ways to attack.

The Old Playbook, Supercharged by AI

Adversaries are now using AI to refine and automate age-old attack methods with terrifying efficiency.

  • Hyper-Personalized Social Engineering: Forget typos and generic greetings. AI-powered phishing emails now perfectly mimic human communication, using a target’s social media data to craft deeply personal and convincing messages that bypass traditional filters. Deepfake technology takes this further, allowing attackers to clone executives’ voices and faces for video calls, making fraudulent requests for funds or data alarmingly persuasive.
  • Automated, Large-Scale Attacks: AI algorithms can operate 24/7, scanning thousands of systems for vulnerabilities and cracking passwords with an intelligence that surpasses brute-force methods. By analyzing behavioral patterns, AI can predict and test highly probable passwords, undermining conventional security policies at an unprecedented scale.

Attacking the Brain: The New Frontier of AI-Specific Threats

Beyond enhancing old methods, entirely new threats are emerging that target the AI models themselves.

  • Model Integrity Attacks: Adversaries are learning to fool AI systems. An adversarial attack might use a strategically placed sticker to make a self-driving car misread a stop sign. Model poisoning involves corrupting an AI’s training data to create hidden backdoors, such as teaching a security system to recognize a specific virus as “safe.”
  • Unprecedented Privacy Risks: AI’s ability to process massive datasets poses a severe privacy threat. Model inversion attacks can reconstruct sensitive personal data (e.g., medical records) from an AI’s public outputs. Furthermore, by correlating anonymized data points—like location history and credit card use—AI can infer sensitive personal traits, effectively de-anonymizing individuals.
  • The “Black Box” Dilemma: Our growing dependence on AI is risky because we often don’t understand why it makes certain decisions. This “black box” nature complicates incident response, as demonstrated by historical examples like Microsoft’s chatbot turning hateful or Amazon’s recruitment AI developing a gender bias.

A New Call for Holistic Security The rise of AI-driven threats means purely technical defenses are no longer sufficient. To stay resilient, organizations must adopt a holistic strategy that treats AI not just as a tool to be defended, but as a potential attack vector in its own right—one that requires a new framework of legal, ethical, and security governance.

About Penta Security
Penta Security takes a holistic approach to cover all the bases for information security. The company has worked and is constantly working to ensure the safety of its customers behind the scenes through the wide range of IT-security offerings. As a result, with its headquarters in Korea, the company has expanded globally as a market share leader in the Asia-Pacific region.

As one of the first to make headway into information security in Korea, Penta Security has developed a wide range of fundamental technologies. Linking science, engineering, and management together to expand our technological capacity, we then make our critical decisions from a technological standpoint.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Firewall vs Web Application Firewall (WAF): What’s the Difference?

Firewall vs. WAF: Your Building’s Security Guard vs. Your VIP Event’s Bodyguard

Securing your digital assets is like securing a high-rise building. You wouldn’t rely on just one lock on the front door; you need multiple, specialized layers of defense. In cybersecurity, two of the most critical layers are the traditional Firewall and the Web Application Firewall (WAF). Understanding the difference is key to protecting your business effectively.

The Traditional Firewall: The Building’s Security Guard

Think of a traditional firewall as the security guard at your building’s main entrance. Their job is to control who comes in and out based on a fundamental set of rules. They check IDs (IP addresses) and what floor people are authorized to visit (network ports). They are essential for stopping obviously unauthorized traffic at the perimeter, but they don’t inspect the contents of a visitor’s briefcase.

The Web Application Firewall (WAF): The VIP Event’s Bodyguard

Now, imagine you’re hosting an exclusive, high-stakes VIP event on the top floor (your web application). You need more than the lobby guard. You need a specialized bodyguard—the WAF—stationed right at the event’s entrance.

This bodyguard is an expert in the specific threats that target your event. They don’t just check names on a list; they understand the conversations (HTTP traffic), inspect everything coming into the room (data requests), and know how to spot and stop sophisticated attacks designed to disrupt your application (like SQL injection and cross-site scripting).

From WAF to WAAP: Securing the Entire VIP Experience As your VIP event expands to include a private data lounge (your API) and faces coordinated disruptions (DDoS attacks), your security needs to evolve. This is where WAF expands into WAAP (Web Application and API Protection), adding critical protection for APIs, managing malicious crowds (bot mitigation), and defending against network-overwhelming attacks.

Penta Security’s WAPPLES solution acts as that elite security detail. As a next-generation WAAP, it provides the intelligent, specialized protection needed to shield your most critical applications and APIs from today’s most advanced threats.

About Penta Security
Penta Security takes a holistic approach to cover all the bases for information security. The company has worked and is constantly working to ensure the safety of its customers behind the scenes through the wide range of IT-security offerings. As a result, with its headquarters in Korea, the company has expanded globally as a market share leader in the Asia-Pacific region.

As one of the first to make headway into information security in Korea, Penta Security has developed a wide range of fundamental technologies. Linking science, engineering, and management together to expand our technological capacity, we then make our critical decisions from a technological standpoint.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Penta Security Named ‘Company of the Year in the WAF Industry’

Penta Security Achieves ‘Triple Crown,’ Named Frost & Sullivan’s WAF Company of the Year for Third Consecutive Year

Recognition highlights the market leadership of Penta Security’s advanced WAAP solutions, WAPPLES and Cloudbric WAF+.

For the third straight year, global research firm Frost & Sullivan has named Penta Security the 2025 South Korea Company of the Year in the Web Application Firewall (WAF) Industry. This prestigious award recognizes sustained excellence in leadership, technological innovation, and customer value.

Frost & Sullivan, a firm with over 60 years of history, conducts deep analysis to identify companies at the forefront of their industries. Penta Security was recognized for delivering robust and secure solutions that meet the diverse needs of customers in the rapidly evolving cloud security market.

This consistent recognition is driven by our commitment to next-generation web security, embodied by our two flagship solutions:

  • WAPPLES (Intelligent WAAP for the Enterprise): An evolution of traditional WAFs, WAPPLES is an advanced Web Application and API Protection (WAAP) solution built on a cloud-native architecture. Its proprietary intelligent detection engine, COCEP, provides real-time defense against emerging attack patterns. WAPPLES has held the #1 market share in the Korean WAF sector for 17 consecutive years.
  • Cloudbric WAF+ (Accessible All-in-One Web Security): As Korea’s first Security-as-a-Service (SECaaS) platform, Cloudbric WAF+ offers instant deployment via DNS redirection. It consolidates WAF, bot mitigation, DDoS protection, and more into a single, intuitive platform for businesses of all sizes.

This award demonstrates that Penta Security’s technology is not only a domestic leader but also globally recognized for its innovation. We remain committed to building a safer future, backed by trusted security performance and proven quality.

About Penta Security
Penta Security takes a holistic approach to cover all the bases for information security. The company has worked and is constantly working to ensure the safety of its customers behind the scenes through the wide range of IT-security offerings. As a result, with its headquarters in Korea, the company has expanded globally as a market share leader in the Asia-Pacific region.

As one of the first to make headway into information security in Korea, Penta Security has developed a wide range of fundamental technologies. Linking science, engineering, and management together to expand our technological capacity, we then make our critical decisions from a technological standpoint.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Cloudbric Surpasses 1,100 Global Enterprise Clients with AWS Security Solutions

Penta Security AWS Cloudbric Managed Rules

Penta Security’s Cloudbric Surpasses 1,100 Global Enterprise Customers on AWS Marketplace

Flagship ‘Managed Rules’ solution drives 156% year-over-year global revenue growth, validating worldwide demand for simplified, high-performance web security.

Penta Security today announced that its cloud security platform, Cloudbric, has surpassed 1,100 global enterprise customers, driven by the remarkable international success of its Cloudbric Managed Rules for AWS WAF. This milestone highlights the soaring demand for security solutions that simplify the complexity of cloud environments.

Cloudbric Managed Rules removes the need for advanced cybersecurity knowledge and dedicated staff to manually configure AWS Web Application Firewall (WAF) rules. Instead, enterprises can subscribe to pre-configured, high-performance rule groups directly from the AWS Marketplace, achieving robust web protection with minimal effort.

This approach has resonated globally, with 98% of Cloudbric Managed Rules customers based outside of Korea. The solution’s effectiveness is further validated by the Tolly Group, a renowned IT benchmarking firm, which found its detection accuracy to be up to 40 percentage points higher than competing solutions.

“Since launching Cloudbric as Korea’s first Security-as-a-Service (SECaaS) platform in 2015, our goal has always been to make enterprise-grade security accessible,” said a spokesperson for Penta Security. “Surpassing 1,100 global clients for our AWS solution proves that businesses worldwide are looking for effective, easy-to-deploy security. We are proud to deliver that.”

As an official AWS Partner, Penta Security is committed to providing borderless, trusted SaaS security that scales across markets and industries.

About Penta Security
Penta Security takes a holistic approach to cover all the bases for information security. The company has worked and is constantly working to ensure the safety of its customers behind the scenes through the wide range of IT-security offerings. As a result, with its headquarters in Korea, the company has expanded globally as a market share leader in the Asia-Pacific region.

As one of the first to make headway into information security in Korea, Penta Security has developed a wide range of fundamental technologies. Linking science, engineering, and management together to expand our technological capacity, we then make our critical decisions from a technological standpoint.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Emerging Cyber Threat: USB Port Hacking

The USB Trojan Horse: How Juice Jacking and BadUSB Turn Everyday Ports into Major Threats

The humble USB port, a symbol of convenience, is being weaponized by cybercriminals at an alarming rate. From public charging stations to discarded flash drives, these everyday connectors are becoming a major vector for malware and data theft, prompting official warnings from agencies like the FBI and FCC. This is no longer a theoretical threat—it’s a clear and present danger in our digital landscape.

The Modern USB Threat Landscape

Attackers are exploiting USB connections through several sophisticated methods:

  • Juice Jacking: The Public Charging Trap. This well-known technique involves compromising public USB charging stations in airports, hotels, and cafes. By embedding malicious code into these ports, attackers can install malware or siphon personal data and passwords from any device that plugs in to charge. The FBI considers this risk so significant that it has advised the public to avoid these stations entirely.
  • BadUSB and Malicious Drives: Deceptive Hardware. More advanced than simple malware, a BadUSB attack alters a device’s firmware, making it impersonate a trusted peripheral like a keyboard while secretly executing malicious commands. This type of attack is incredibly dangerous as it can bypass standard antivirus software. Hacking groups like UNC4990 have been observed using this method, alongside the simpler tactic of “baiting”—deliberately dropping infected USB drives in public areas, waiting for a curious individual to plug it into a computer.
  • Targeting the Enterprise. These threats are not limited to individuals. A recently discovered vulnerability in the iPhone’s USB-C port demonstrated how malicious code could bypass even Apple’s strict security measures. For organizations, the risk is magnified when employees unknowingly introduce a “bait USB” into the corporate network, potentially compromising the entire system.

A Multi-Layered Defense is Crucial

In response, governments are issuing alerts, and manufacturers are releasing security patches like Apple’s USB Restricted Mode. However, no single solution is foolproof. A robust defense requires vigilance at both the organizational and individual levels.

For businesses, the most effective strategy is to establish clear policies on USB usage, provide comprehensive employee training on these specific threats, and accelerate the transition to secure, cloud-based platforms for data storage and file sharing.

For individuals, the rules are simple: avoid public USB charging ports, carry your own charger and power bank, and never plug in a USB device from an unknown source. Using a “USB data blocker” can also provide a physical barrier against data transfer when using untrusted ports. By treating every unknown USB port and device as a potential threat, we can mitigate this rapidly emerging risk.

 

About Penta Security
Penta Security takes a holistic approach to cover all the bases for information security. The company has worked and is constantly working to ensure the safety of its customers behind the scenes through the wide range of IT-security offerings. As a result, with its headquarters in Korea, the company has expanded globally as a market share leader in the Asia-Pacific region.

As one of the first to make headway into information security in Korea, Penta Security has developed a wide range of fundamental technologies. Linking science, engineering, and management together to expand our technological capacity, we then make our critical decisions from a technological standpoint.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

The End of the Password Era: What the Breach of 16 Billion Accounts Tells Us

The 16 Billion Credential Breach: A Final Wake-Up Call for the Password Era

The recent exposure of 16 billion login credentials from services including Google, Apple, and Facebook is more than just another data breach; it is the definitive event signaling the end of the password era. Caused by infostealer malware and now actively traded on the dark web, this incident reveals a systemic failure in our digital identity infrastructure. The age of password-based security is over.

The Inherent Flaw: Why Passwords Were Doomed to Fail

For years, passwords have been the weakest link in digital security. They are fundamentally vulnerable to an ever-growing list of threats, from brute-force attacks to sophisticated phishing scams. Human psychology is the core of the problem; we create simple, predictable patterns or reuse the same password across multiple services out of convenience. This turns a single compromised password into a master key that can unlock an individual’s entire digital life, leading to identity theft, financial fraud, and catastrophic corporate data breaches.

The New Paradigm: Authentication Without Passwords

In response, a new security paradigm has become essential: passwordless authentication. Based on global standards like FIDO2, this method verifies users without a password, instead leveraging factors that can’t be easily stolen or guessed: what you are (biometrics like a fingerprint), what you have (a device like a smartphone), or where you are (geolocation).

The benefits are transformative. Since no password exists, all attacks targeting them are rendered obsolete. User convenience is dramatically improved, eliminating the need to remember complex credentials. For IT teams, it means an end to enforcing frustrating password policies and managing endless reset requests, freeing them to focus on more critical security tasks.

From Theory to Enterprise Reality with iSIGN Password-less

Adopting a passwordless future requires a solution built for the complexities of the enterprise. Penta Security’s iSIGN Password-less is designed to bridge this gap, delivering both enhanced security and seamless user convenience. It goes beyond simply removing the OS password by integrating deep Single Sign-On (SSO) functionality. A single, simple login to a device grants a user automatic, authenticated access to all their critical business platforms, from groupware and ERP to email.

This platform provides the granular policy controls, integrated monitoring, and anomaly detection that enterprises need to manage their security environment with precision. Backed by global security certifications (Common Criteria, Good Software) and robust encryption modules, iSIGN. Password-less is an enterprise-ready solution for a post-password world.

Passwordless authentication is no longer an option—it is the new standard for security and operational efficiency.

 

About Penta Security
Penta Security takes a holistic approach to cover all the bases for information security. The company has worked and is constantly working to ensure the safety of its customers behind the scenes through the wide range of IT-security offerings. As a result, with its headquarters in Korea, the company has expanded globally as a market share leader in the Asia-Pacific region.

As one of the first to make headway into information security in Korea, Penta Security has developed a wide range of fundamental technologies. Linking science, engineering, and management together to expand our technological capacity, we then make our critical decisions from a technological standpoint.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

WAPPLES Wins 2025 National Service Awards for the Second Consecutive Year

WAPPLES Wins 2025 National Service Award

Penta Security’s WAPPLES Marks 20th Anniversary with Second Consecutive National Service Award Win

Intelligent WAAP solution honored for superior customer satisfaction and market leadership, reaffirming its status as the sole winner in the award’s cybersecurity category.

Penta Security’s intelligent WAAP (Web Application and API Protection) solution, WAPPLES, has once again been honored at the 2025 National Service Awards, winning the Cybersecurity Solution category for the second consecutive year. This recognition coincides with the 20th anniversary of WAPPLES, marking two decades of market leadership and innovation in web security.

The National Service Awards recognize organizations that have earned exceptional consumer support, evaluating them on criteria such as customer satisfaction, competitive advantage, and service management. The cybersecurity category was established in 2024, with WAPPLES being its inaugural and, to date, only winner.

Since its launch in 2005, WAPPLES has maintained its position as the #1 web security solution in the Korean market for 17 straight years, renowned for its high detection accuracy and low false positive rate. Today, it is a top-tier global WAAP solution deployed in 171 countries and serves as the core engine for the Cloudbric SECaaS platform, which protects over 700,000 internet businesses worldwide.

“Winning this award as we celebrate the 20th anniversary of WAPPLES is incredibly meaningful,” said a spokesperson for Penta Security. “It validates two decades of customer trust and our commitment to innovation. We will continue to build on this legacy to deliver the highest level of satisfaction and security.”

About Penta Security
Penta Security takes a holistic approach to cover all the bases for information security. The company has worked and is constantly working to ensure the safety of its customers behind the scenes through the wide range of IT-security offerings. As a result, with its headquarters in Korea, the company has expanded globally as a market share leader in the Asia-Pacific region.

As one of the first to make headway into information security in Korea, Penta Security has developed a wide range of fundamental technologies. Linking science, engineering, and management together to expand our technological capacity, we then make our critical decisions from a technological standpoint.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

“In the End, Encryption Is the Ultimate Solution to Cybersecurity”

Encryption

Data Encryption D.AMO

Beyond Compliance: Why Encryption is the Ultimate Answer to Modern Cybersecurity

The recent security incident at SK Telecom serves as a stark reminder of a fundamental truth in cybersecurity: compliance is not the same as security. As Penta Security’s Executive Director Taejun Jung explains, true data protection requires a proactive mindset where encryption is seen not as a regulatory burden, but as the ultimate line of defense.

In the SKT case, the leaked USIM data was not legally required to be encrypted. However, Jung notes that when combined with other information, such data can easily lead to personal identification. This highlights the critical danger of a check-box approach to security and why companies must proactively expand their encryption coverage beyond minimum legal requirements.

Many organizations hesitate to encrypt broadly due to fears of performance degradation, but Jung argues this is a misconception. “With proper system optimization, performance can often be maintained or even improved,” he stated, reframing encryption as “a form of insurance, not a cost.”

Looking ahead, the security landscape will be defined by connectivity, driven by AI, autonomous driving, IoT, and the cloud. “As a result, the importance of encryption to securely protect connected data will only grow,” Jung predicted. This is why Penta Security is actively researching next-generation technologies like homomorphic encryption and post-quantum cryptography.

The lesson is clear. In a world of evolving threats, perimeter defenses will inevitably be breached. Jung’s final message is a call for a paradigm shift: “In the end, encryption is the last line of defense… encryption is the answer.”

About Penta Security
Penta Security takes a holistic approach to cover all the bases for information security. The company has worked and is constantly working to ensure the safety of its customers behind the scenes through the wide range of IT-security offerings. As a result, with its headquarters in Korea, the company has expanded globally as a market share leader in the Asia-Pacific region.

As one of the first to make headway into information security in Korea, Penta Security has developed a wide range of fundamental technologies. Linking science, engineering, and management together to expand our technological capacity, we then make our critical decisions from a technological standpoint.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.