메인콘텐츠 바로가기


Trip

Witness the current state of the global
security industry

SECON 2018

An emphasis on security is never excessive. If you let down your guard, everything that you have worked for can be snatched away in an instant. Every year, security issues have caused companies to close down and resulted in significant damage at the national level. The problem is that security incidents today involve more complex hacking operations, and are expected to increase in severity with the development of IoT an essential technology in the fourth industrial revolution. The convenience gained by IoT may be manipulated for malicious purposes, leading to serious privacy infringement and major accidents. Various defense technologies against increasingly sophisticated security threats were introduced during the International Security Exhibition & Conference(SECON) 2018 held from March 14 to 16 at the Korea International Exhibition Center(KINTEX) in Ilsan.

01

SECON, Asia’s leading security exhibition

Supported by the Ministry of Science and ICT, the Ministry of the Interior and Safety, and the Ministry of Land, Infrastructure and Transport, SECON 2018 is the largest security-related exhibition in Korea. This year, more than 500 companies from 20 countries attended the event to showcase their technologies.
SECON serves as an arena of competition for new security technologies that have emerged following the convergence of physical security and information security. Launched in 2012, the event has seen an annual growth of at least 13%. It was jointly held with the eGISEC FAIR 2018 this year, and participants were given the opportunity to compare solutions developed for information protection and mobile/web accessibility enhancement.
Security experts from around the world engaged actively in discussions at SECON 2018 and other concurrent events, including the Security World Conference.

02

Advancements in security technology for the fourth industrial revolution

This year’s SECON focused on security technologies for the age of the fourth industrial revolution, characterized by developments such as artificial intelligence, big data, and IoT. Intelligent Video Analysis(IVA) was one of the most popular among various security technology solutions related to facial recognition systems and smart cities. This technology, which involves the use of an AI camera to analyze and categorize people and objects, is widely utilized in unmanned stores and public security.
Many visitors were captivated by a company’s integrated gate management solution, which features not only facial recognition, but also visitor management, safety management of persons remaining in buildings, and mobile employee IDs.
Visitors had a taste of the future at unmanned stores, which rely on AI for all processes from entry to payment. This experience raised the visitors’ expectations of how security technology can change our lives for the better.
Interested buyers attended one-to-one overseas buyer matchmaking sessions and invited buyer consulting forums to explore opportunities for the acquisition and commercialization of new technologies.

03

ETRI prepares for the future with advanced security technology

At this year’s conference, ETRI showcased its Unidirectional data transfer gateWAY(UNIWAY) and Context-aware FIDO Authentication Technology at the 2018 National Information Protection R&D Exhibition Booth.
UNIWAY is a hardware-based data transmission technology that prevents data transmission in a certain direction. It is a unidirectional security gateway that works against external threats by blocking physical connections and examining firmware integrity.
The unidirectional data transmission technology offers outstanding performance with a network interface card for 10G unidirectional transmission, and supports multiplexing of 32 logical channels. It is not only highly reliable thanks to forward error correction and re-transmission functions, but also compatible with various middleware services. It is expected to have a wide range of applications, from national infrastructure such as nuclear power plants, power plants, and water treatment plants, to smart factories and national defense networks.

ETIR’s Context-aware FIDO Authentication Technology enhances security through human identification technology and multi-factor authentication, and supports the dynamic security policies of mobile applications. It is compatible with the FIDO protocol, and monitors user circumstances to provide continuous authentication. With a simple click, users can integrate the FIDO authentication technology into existing mobile applications. The technology can be widely applied to public authentication services in fintech, simple payments, online banking, securities, and insurance.
The exhibition booth was jointly prepared with the National Security Research Institute(NSR) and Korea Internet & Security Agency(KISA). The organizations captured the attention of visitors by introducing information protection R&D and effective strategies against cyber attacks.
As the saying goes, “If you know both your enemy and yourself, you can win a hundred battles without jeopardy.” SECON is the perfect opportunity to protect yourself against the increasingly complex security threats in the age of the fourth industrial revolution.

TOP