Lionic Corporation
Zero Trust Defense Infrastructure for the Semiconductor Industry
Tera-UTM 12 provides protection for various scenarios of industrial areas. The comprehensive security features include Anti-Virus, Anti-Intrusion, Anti-WebThreat, Anti-Region, Firewall and so on. It includes industrial control system (ICS) protection and Hardware Bypass to effectively safeguard semiconductor equipment from external attacks and threats, ensuring uninterrupted network protection for endpoint devices and production lines.
Assisting semiconductor equipment manufacturers in achieving SEMI-E187 compliance and enhancing cybersecurity defenses in smart manufacturing and the semiconductor industry.
Lionic OT defense solutions:
- Computer operating system compliance > Windows vulnerability pattern
- Network security > DPI detection, filtering transmission data
- Endpoint protection > Bridge mode connection to endpoint devices
Information security monitoring > Central Management System
Flowring Technology
Semiconductor Supply Chain Cybersecurity Threat Hunting and Compliance Services
Semiconductor Supply Chain Cybersecurity Threat Hunting and Compliance Services is a
NDR (Network Detection Response) solution. It include network detection and response, vulnerability assessment, security rating, and attack surface risk assessment. By continuously monitoring network traffic and employing threat hunting techniques, we promptly respond to potential cybersecurity threats, ensuring the secure operation of the supply chain. Additionally, conducting comprehensive vulnerability assessments and providing patching recommendations, along with attack surface risk assessment, allows us to formulate tailored defense strategies, enhancing overall cybersecurity protection.
Moreover, leveraging blockchain scalability, we store detected events on the Ethereum public blockchain, providing secure and compliant evidence preservation services for supply chain data. We are committed to safeguarding the security of the semiconductor supply chain, ensuring compliance with international standards and regulations, establishing robust cybersecurity policies, reducing potential risks, and safeguarding corporate reputation and competitiveness.