POSCO Deploys ConSentry SwitchesPOSCO Deploys ConSentry Switches
ConSentry Networks announced that the POSCO steel company of Pohang, South Korea, has deployed its LANShield Switches
June 11, 2007
MILPITAS, Calif. -- ConSentry Networks, the leader in secure switching, announced today that the POSCO steel company of Pohang, South Korea, has deployed its LANShield(TM) Switches to provide network admission control, gain visibility into the LAN, and enable identity-based access control across the LAN. POSCO, the third largest steel producer in the world, chose the ConSentry wiring closet secure switches to ensure compliance with governmental data security regulations, safeguard the LAN from unauthorized users, and protect its valuable corporate data by restricting access based on the roles of authorized users.
Today, POSCO employs nearly 60,000 people, including those at subsidiaries and affiliates. In addition to its many offices, the company operates two steel mills in South Korea - one in Pohang and the other in Gwangyang - and has provided steel to Korea's shipbuilding and automobile industries for the past 40 years. ConSentry's LANShield Switches will secure information in these two locations as well as a data center in Seoul. POSCO's growing network spans many geographic locations and serves as the hub of communications to its employees, customers, and partners. When the organization's lease on its switches came to term, the company recognized the opportunity to upgrade its security capabilities and decided to deploy ConSentry, combining security and switching.
"LAN security was a top concern as we investigated our options for upgrading our switches," said Mr. Lee, vice president and CIO at POSCO. "These days, most of a company's value derives from its corporate data, yet information risk continues to grow, both from outside and internal attacks. If the wrong person accesses the network, or company secrets are sent to competitors, the company would suffer serious financial and regulatory consequences. Therefore, the switch upgrade provided the ideal time to protect corporate information from attacks such as worms and from the insider threat."
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023