
Data breaches, hacking incidents, and infections from viruses or ransomware through your website can damage corporate credibility and cause significant financial loss.


Data breaches, hacking incidents, and infections from viruses or ransomware through your website
can damage corporate credibility and cause significant financial loss.
Offers complete protection and response against the latest cyber threats (OWASP Top 10), zero-day attacks, and unknown vulnerabilities, with 24/7 support from security experts.
Scale as needed and pay only for what you use. Covers essential security requirements without overspending.
Simply drag and click to activate. Unnecessary
procedures have been removed to maintain a
secure environment with ease.
No specialized knowledge required. Register your URL without complicated installation steps to quickly activate the service.
Offers complete protection and response against the latest cyber threats (OWASP Top 10), zero-day attacks, and unknown vulnerabilities, with 24/7 support from security experts.
Simply drag and click to activate. Unnecessary procedures have been removed to maintain a secure environment with ease.
Scale as needed and pay only for what you use. Covers essential security requirements without overspending.
No specialized knowledge required. Register your URL without complicated installation steps to quickly activate the service.
Cloud WAF |
![]() |
|
On-Premise WAF |
![]() |
|
Optimized for web hosting providers and companies operating their own web servers |
Endpoint Lab’s CloudWAF is operated
in partnership with Korea’s No. 1
WAF monitoring company.
⦁ Manage and view information for registered service domains.
· View : Service ports, traffic, visit counts, number of threats,
service usage status (including domain server changes)
· Manage : Service protocols and ports, SSL/TLS certificates,
server information, and load balancing
1. Domain Info⦁ Manage and view information for registered service domains.
· View : Service ports, traffic, visit counts, number of threats,
service usage status (including domain server changes)
· Manage : Service protocols and ports, SSL/TLS certificates,
server information, and load balancing
⦁ Domain-specific dashboards.
· General : Web traffic visits/threat counts, cached traffic queries
· Threats: Top detected URLs, top detection policies,
top attacker IPs, attacker countries
2. Dashboard⦁ Domain-specific dashboards.
· General : Web traffic visits/threat counts, cached traffic queries
· Threats: Top detected URLs, top detection policies,
top attacker IPs, attacker countries
⦁ View and download detection event logs.
· Contents : Time, country, IP, URL, detection policy, detection evidence, request data
3. Log⦁ View and download detection event logs.
· Contents : Time, country, IP, URL, detection policy, detection evidence, request data
⦁ Security
· Protects against common web vulnerabilities such as SQLi, Command injection, XSS, and CSRF attacks.
⦁ User-Defined Rules
· Create custom security rules based on parameters
such as Header, Method, User Agent, and Query.
⦁ Access Control
· Restrict service access based on IP, URL, or country.
4. WEB Security ⦁ Security
· Protects against common web vulnerabilities such as SQLi, Command injection, XSS, and CSRF attacks.
⦁ User-Defined Rules
· Create custom security rules based on parameters
such as Header, Method, User Agent, and Query.
⦁ Access Control
· Restrict service access based on IP, URL, or country.
⦁ Securityy
· Protects against attacks based on vulnerabilities in JSON/XML parsing and analysis.
⦁ Access Control
· Restrict API connections based on IP address or country.
⦁ User-Defined Rules
· Limit service access based on IP, URL, or country conditions. ⦁ Discovery
· Upload OpenAPI specifications and output a list of APIs.
5. API Security⦁ Securityy
· Protects against attacks based on vulnerabilities in JSON/XML parsing and analysis.
⦁ Access Control
· Restrict API connections based on IP address or country.
⦁ User-Defined Rules
· Limit service access based on IP, URL, or country conditions. ⦁ Discovery
· Upload OpenAPI specifications and output a list of APIs.
⦁ Detects and mitigates malicious traffic such as Credential Stuffing, Brute Force attacks, RUDY, and Slowloris.
6. Bot & Abuse⦁ Detects and mitigates malicious traffic such as Credential Stuffing, Brute Force attacks, RUDY, and Slowloris.
⦁Enable web caching for JS, CSS, and images, and purge cached content when necessary.
7. Web Cache⦁Enable web caching for JS, CSS, and images, and purge cached content when necessary.
⦁ Generate and download statistical reports (PDF, DOC) on web traffic and threats.
8. Report⦁ Generate and download statistical reports (PDF, DOC) on web traffic and threats.

Security Plus is SK Broadband’s brand encompassing its information security services. Its name carries the meaning of “Security, and adding even more value.”
Unlike security vendors that supply only limited equipment, Security Plus offers a wide range of services and devices, expanding customer choice. All related maintenance and support are provided through a one-stop service, adding convenience to security management.
Integrated Security
DDoS Clean Zone
Custom Network Security
Endpoint Security
UTM (Unified Threat Management) Security
Free Security Check
PC Forensics
Cloud WAF |
![]() |
|
On-Premise WAF |
![]() |
|
Optimized for web hosting providers and companies operating their own web servers |
Endpoint Lab’s CloudWAF is operated in partnership with
Korea’s No. 1 WAF monitoring company.
⦁ Manage and view information for registered service domains.
· View : Service ports, traffic, visit counts, number of threats,
service usage status (including domain server changes)
· Manage : Service protocols and ports, SSL/TLS certificates,
server information, and load balancing
1. Domain Info⦁ Manage and view information for registered service domains.
· View : Service ports, traffic, visit counts, number of threats,
service usage status (including domain server changes)
· Manage : Service protocols and ports, SSL/TLS certificates,
server information, and load balancing
⦁ Domain-specific dashboards.
· General : Web traffic visits/threat counts, cached traffic queries
· Threats: Top detected URLs, top detection policies,
top attacker IPs, attacker countries
2. Dashboard⦁ Domain-specific dashboards.
· General : Web traffic visits/threat counts, cached traffic queries
· Threats: Top detected URLs, top detection policies,
top attacker IPs, attacker countries
⦁ View and download detection event logs.
· Contents : Time, country, IP, URL, detection policy, detection evidence, request data
3. Log⦁ View and download detection event logs.
· Contents : Time, country, IP, URL, detection policy, detection evidence, request data
⦁ Security
· Protects against common web vulnerabilities such as SQLi, Command injection, XSS, and CSRF attacks.
⦁ User-Defined Rules
· Create custom security rules based on parameters
such as Header, Method, User Agent, and Query.
⦁ Access Control
· Restrict service access based on IP, URL, or country.
4. WEB Security ⦁ Security
· Protects against common web vulnerabilities such as SQLi, Command injection, XSS, and CSRF attacks.
⦁ User-Defined Rules
· Create custom security rules based on parameters
such as Header, Method, User Agent, and Query.
⦁ Access Control
· Restrict service access based on IP, URL, or country.
⦁ Securityy
· Protects against attacks based on vulnerabilities in JSON/XML parsing and analysis.
⦁ Access Control
· Restrict API connections based on IP address or country.
⦁ User-Defined Rules
· Limit service access based on IP, URL, or country conditions. ⦁ Discovery
· Upload OpenAPI specifications and output a list of APIs.
5. API Security⦁ Securityy
· Protects against attacks based on vulnerabilities in JSON/XML parsing and analysis.
⦁ Access Control
· Restrict API connections based on IP address or country.
⦁ User-Defined Rules
· Limit service access based on IP, URL, or country conditions. ⦁ Discovery
· Upload OpenAPI specifications and output a list of APIs.
⦁ Detects and mitigates malicious traffic such as Credential Stuffing, Brute Force attacks, RUDY, and Slowloris.
6. Bot & Abuse⦁ Detects and mitigates malicious traffic such as Credential Stuffing, Brute Force attacks, RUDY, and Slowloris.
⦁Enable web caching for JS, CSS, and images, and purge cached content when necessary.
7. Web Cache⦁Enable web caching for JS, CSS, and images, and purge cached content when necessary.
⦁ Generate and download statistical reports (PDF, DOC) on web traffic and threats.
8. Report⦁ Generate and download statistical reports (PDF, DOC) on web traffic and threats.

Security Plus is SK Broadband’s brand encompassing its information security services.
Its name carries the meaning of “Security, and adding even more value.”
Unlike security vendors that supply only limited equipment, Security Plus offers a wide range of services and devices,
expanding customer choice. All related maintenance and support are provided through a one-stop service,
adding convenience to security management.
Integrated Security
DDoS Clean Zone
Custom Network Security
Endpoint Security
UTM (Unified Threat Management) Security
Free Security Check
PC Forensics


주식회사 엔드포인트랩 | 대표이사 : 조용덕 | 대표번호 : 031-625-1001
주소 : 경기도 용인시 기흥구 강남서로 20, 104호(강남대학교 창조산학관)