Key services of KTC

Testing and inspection
  1. 1. Electrical and Electronic
  2. 2. Meters
  3. 3. Chemical and environment
  4. 4. Bio and medical
  5. 5. Information and Communications
  6. 6. Energy
  7. 7. Renewable
  8. 8. Specialized Public Procurement
  9. 9. Verification
  10. 10. Calibration
  11. 11. International standard
  12. 12. Software and security test
  13. 13. Inspection of the playground facilities for children
  14. 14. Safety inspection of amusement facility
Certification and assessment
  1. 1. KC Product Certification
  2. 2. KS Product Certification
  3. 3. Q-mark
  4. 4. EMF certification
  5. 5. V-check product certification marks
  6. 6. Performance Certification
  7. 7. Medical device assessment
  8. 8. International standard certification새창
  9. 9. View the GCC certification status
R&D
  1. 1. Technical regulations impact evaluation
  2. 2. Intellectual Property evaluation support (Patent technical evaluation)
  3. 3. Standard Technology Development Type
  4. 4. SME Technological Innovation R&D Program
  5. 5. New-Product Development Support with an Off-Take Arrangement
  6. 6. The 4th Industries and Smart City

Announcements

KTC News

사이트맵 닫기

Key services of KTC

KTC, the World’s No. 1 Testing Certification Institute Leading the Way to the 4th Industrial Revolution

HOME

Print

본문 시작

The performance evaluation of the IT security products

About the Performance Evaluation Program for IT security Products

A program in which the performance evaluation of an IT security product is evaluated according to standards and procedures, and report the result how the product responds to normal and harmful traffic in the operating environment.

The purpose of the program

  • 1. To support the technical improvement of Information security businesses and help buyer(=demander) select better products when they purchase IT security products.
  • 2. Based on verified performance evaluation, objectivity is secured to shift the focus of the market from price to performance, enhancing the nature of Information security industries.

Related laws and regulations (legal foundation)

  • Article 38 (The Announcement of the Standards for Information Protection Systems) THE FRAMEWORK ACT ON NATIONAL INFORMATIZATION
  • Article 35 (The Complementation of Information Protection Systems) of the Enforcement Decree of THE FRAMEWORK ACT ON NATIONAL INFORMATIZATION
  • Article 52 of the Act on Promotion of Information and Communications Network utilization and information protection, etc. (KISA)
  • Article 17 (Supporting Performance Tests,) ACT ON THE PROMOTION OF INFORMATION SECURITY INDUSTRY
  • Article 10 (The Method of Performance Evaluation and Designation of Performance Evaluation Agencies,) the Enforcement Decree of ACT ON THE PROMOTION OF INFORMATION SECURITY INDUSTRY

An overview of our Evaluation services

An overview of our Evaluation services image

The evaluation and certification processes

The evaluation and certification processes image

The scope of the performance evaluation

The classification of performance evaluation Description
Key functions Assesses the normal operation of the key functions used to evaluate the network and security performance.
Network processing performance Network traffic processing performance
  • CPS
  • TPS
  • CC
  • Traffic throughput (BW)
Security functions processing performance Measures the rate of blockage based on whether the DUT (the product to be assessed) detects and blocks various attacks within the evaluation environment.
Efficiency (the resources of the product) Measure the processing rate and usage rate of the resources, including the CPU and the memory.
Items Products
The product types of performance FW, DDoS defense equipment, APT response equipment based on the sandbox, WebFW, IPS, NGFW, VPN, NAC, anti-virus, and the tools to analyze the weak security points in the source code.

Equipments of the performance evaluation

Equipments of
the performance evaluation
The Equipment name of
the performance evaluation
The images of the instruments
The performance tester for the performance against attacks (L2~L7) BreakingPoint(BP) – Perfect Storm One Equipments image1
L4~L7 performance instrument Sprient – SPT-C100-S3-MP Equipments image2
L2~L4 performance instrument Sprient – SPT-C50 Equipments image3
Fuzzing 및 Stress test instrument Beyond Security -

Inquiry and Contact Information

Responsible organization Person-in-charge Contact / Fax E-mail
Information Security Center Principal Researcher
Hyeonmee Park
031-428-3765 / 031-455-7156 hmpark@ktc.re.kr
Information Security Center Junior Researcher
Dowon Kim
031-428-3767 / 031-455-7156 dwkim@ktc.re.kr

Visit the website of the responsible department

Click the button below to jump to the main webpage of the responsible department, where you can find the contact information of the officers in charge.

Visit the website of the responsible department

The performance evaluation of the IT security products Jump to the Information Security Center.

최종수정일: 2020-11-04 오후 4:11:13