{"id":180,"date":"2025-06-03T13:00:23","date_gmt":"2025-06-03T13:00:23","guid":{"rendered":"https:\/\/procentric.my\/wp2\/?page_id=180"},"modified":"2025-06-03T13:00:23","modified_gmt":"2025-06-03T13:00:23","slug":"hiware","status":"publish","type":"page","link":"https:\/\/procentric.my\/wp2\/index.php\/hiware\/","title":{"rendered":"HIWARE"},"content":{"rendered":"\n<div class=\"wp-block-group alignfull has-background\" style=\"background-color:#f4f6fe;margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-container-core-group-is-layout-2bafd31c wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-4d397ad4 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"225\" height=\"225\" src=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/images.png\" alt=\"\" class=\"wp-image-189\" style=\"width:141px;height:auto\" srcset=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/images.png 225w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/images-150x150.png 150w\" sizes=\"auto, (max-width: 225px) 100vw, 225px\" \/><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\"><strong>Integrated Identity and Access Management solution actively responding to next-generation security paradigm<\/strong><\/h3>\n\n\n\n<p><strong>HIWARE<\/strong>, an integrated IAM solution which has adopted the latest technologies such as artificial intelligence and cloud, is the flagship product of NETAND that has developed various solutions with the best technology.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"709\" height=\"621\" src=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/sub01_09_el01.png\" alt=\"\" class=\"wp-image-183\" srcset=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/sub01_09_el01.png 709w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/sub01_09_el01-300x263.png 300w\" sizes=\"auto, (max-width: 709px) 100vw, 709px\" \/><\/figure>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-base-background-color has-background is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-ad07e9b7 wp-block-group-is-layout-flex\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>Under the gateway proxy approach in which the solution is positioned at the front of the IT infrastructure system, it has no effect on a conventional user\u2019s system. It is a \u2018gateway to security\u2019, making all system users go through HIWARE.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"694\" src=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/sub01_09_el02-1024x694.png\" alt=\"\" class=\"wp-image-186\" srcset=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/sub01_09_el02-1024x694.png 1024w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/sub01_09_el02-300x203.png 300w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/sub01_09_el02-768x520.png 768w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/sub01_09_el02.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-background\" style=\"background-color:#f4f6fe;margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-container-core-group-is-layout-2bafd31c wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-4d397ad4 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\"><strong>Privileged Session Management for System<\/strong><\/h2>\n\n\n\n<p style=\"font-size:1.2rem\"><strong>The beginning of the system security management are \u2018<em>Manage<\/em>\u2019 and \u2018<em>Audit<\/em>\u2019<\/strong><\/p>\n\n\n\n<p class=\"has-base-2-background-color has-background\">HIWARE Privileged Session Management for System enables the complete management and supervision of users by controlling all accesses to and operations of the IT infrastructure operating system such as network and server, monitoring work details in real-time and saving log records.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<h4 class=\"wp-block-heading\">Enhanced User Authentication<\/h4>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<ul class=\"wp-block-list\">\n<li>Blocks unauthenticated IP\/MAC address<\/li>\n\n\n\n<li>Support OTP authentication at solution login or individual system access<\/li>\n\n\n\n<li>Diverse authentication-linked APIs<\/li>\n\n\n\n<li>Diverse authentication combinations support(RSA OTP, Accredited Certificate, LDAP, etc.)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-border-color is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-color:#f4f6fe;border-width:1px\">\n<div class=\"wp-block-column has-base-2-background-color has-background is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<h4 class=\"wp-block-heading\">Access Authority Management<\/h4>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<ul class=\"wp-block-list\">\n<li>Manages each user according to the policy<\/li>\n\n\n\n<li>Centralized access authority allocation and management (access IP, access MAC, access time, 2-factor authentication)<\/li>\n\n\n\n<li>Diverse protocols support(Telnet, SSH, FTP, SFTP, rlogin, Windows Terminal Service, etc.)<\/li>\n\n\n\n<li>Unifies all remote accesses<\/li>\n\n\n\n<li>Alarms the access and automatically blocks it when attempted by an unauthorized user<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<h4 class=\"wp-block-heading\">Realtime Session Management<\/h4>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<ul class=\"wp-block-list\">\n<li>Realtime monitoring on ongoing sessions<\/li>\n\n\n\n<li>Sends a one-on-one message to users<\/li>\n\n\n\n<li>Auto blocking a session in the event of an illegal activity<\/li>\n\n\n\n<li>Sets work hours or idle time by the hour\/ day\/ date<\/li>\n\n\n\n<li>Blocks an overtime session<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-border-color is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-color:#f4f6fe;border-width:1px\">\n<div class=\"wp-block-column has-base-2-background-color has-background is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<h4 class=\"wp-block-heading\">System Command Management<\/h4>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<ul class=\"wp-block-list\">\n<li>Command authority setting and control under diverse conditions such as group\/ device<\/li>\n\n\n\n<li>Banned keywords(white-list\/ black-list)<\/li>\n\n\n\n<li>Bans Telnet command and restricts leapfrog in case of a CLI-based server<\/li>\n\n\n\n<li>Warns and blocks the session as soon as a banned keyword is entered<\/li>\n\n\n\n<li>Immediately contacts the manager by text or email and requests approval when an important commnad is entered<\/li>\n\n\n\n<li>Manages all history of the commands use<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<h4 class=\"wp-block-heading\">Log Recording \/ Audit<\/h4>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<ul class=\"wp-block-list\">\n<li>Saves log records on all work details from login to logout<\/li>\n\n\n\n<li>Searches the log records which have been stored by user\/ system\/ command through a inquiry filter<\/li>\n\n\n\n<li>Inquires logs in text\/ video format<\/li>\n\n\n\n<li>Speed control and split screen replay at save log replay time<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-base-2-background-color has-background\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-container-core-group-is-layout-2bafd31c wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-4d397ad4 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\"><strong>Privileged Session Management for Database<\/strong><\/h2>\n\n\n\n<p style=\"font-size:1.2rem\"><strong>There should be the least authority concerning the company\u2019s core information<\/strong><\/p>\n\n\n\n<p class=\"has-base-2-color has-text-color has-background has-link-color wp-elements-2dec317d2de2842eeaf10d70c02b959d\" style=\"background-color:#178fcd\">In an era of explosive data growth, companies are exposed to a threat of diverse forms of data leak accidents such as leak of personal information and confidential documents. With the concentration of DBA authority, in addition, the leak of administrator account can cause a huge damage.<br>HIWARE Privileged Session Management for Database grants access to personal information database and authority differentially by each user and prevents such information leak through SQL audit and log records.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<h4 class=\"wp-block-heading\">Enhanced User Authentication<\/h4>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<ul class=\"wp-block-list\">\n<li>Blocks unauthenticated IP\/MAC address<\/li>\n\n\n\n<li>Support OTP authentication at solution login or individual system access<\/li>\n\n\n\n<li>Diverse authentication-linked APIs<\/li>\n\n\n\n<li>Diverse authentication combinations support(RSA OTP, Accredited Certificate, LDAP, etc.)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-horizontal is-content-justification-left is-nowrap is-layout-flex wp-container-core-group-is-layout-e0598304 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-columns has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"background-color:#178fcd\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<h4 class=\"wp-block-heading has-base-2-color has-text-color has-link-color wp-elements-8bc7b9d67b972c72c097cf2a5e33d29a\">Access Authority Management<\/h4>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<ul class=\"wp-block-list\">\n<li class=\"has-base-2-color has-text-color has-link-color wp-elements-b64bacd82f74b00136e2b69929179afc\">Manages each user according to the policy<\/li>\n\n\n\n<li class=\"has-base-2-color has-text-color has-link-color wp-elements-4bd5616ca08dc982004e61686be9acf3\">Centralized access authority allocation and management (access IP, access MAC, access time, 2-factor authentication)<\/li>\n\n\n\n<li class=\"has-base-2-color has-text-color has-link-color wp-elements-949b81c1e388de3a923bc15f9727a922\">Diverse protocols support(Telnet, SSH, FTP, SFTP, rlogin, Windows Terminal Service, etc.)<\/li>\n\n\n\n<li class=\"has-base-2-color has-text-color has-link-color wp-elements-18a0ba54744a83bc826fa8b20ec8b6a2\">Unifies all remote accesses<\/li>\n\n\n\n<li class=\"has-base-2-color has-text-color has-link-color wp-elements-6bfa54f7bb7d48d0f5b91fdb2f3a8dec\">Alarms the access and automatically blocks it when attempted by an unauthorized user<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<h4 class=\"wp-block-heading\">Realtime Session Management<\/h4>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<ul class=\"wp-block-list\">\n<li>Realtime monitoring on ongoing sessions<\/li>\n\n\n\n<li>Sends a one-on-one message to users<\/li>\n\n\n\n<li>Auto blocking a session in the event of an illegal activity<\/li>\n\n\n\n<li>Sets work hours or idle time by the hour\/ day\/ date<\/li>\n\n\n\n<li>Blocks an overtime session<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-horizontal is-content-justification-left is-nowrap is-layout-flex wp-container-core-group-is-layout-e0598304 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-columns has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"background-color:#178fcd\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<h4 class=\"wp-block-heading has-base-2-color has-text-color has-link-color wp-elements-a007317141e9434d33cfffeb472d87fb\">DBMS Query Management<\/h4>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<ul class=\"wp-block-list\">\n<li class=\"has-base-2-color has-text-color has-link-color wp-elements-3afd7d2db4020d0aab3eed3cb0a65cfb\">Query authority setting and control under diverse conditions such as group\/ device<\/li>\n\n\n\n<li class=\"has-base-2-color has-text-color has-link-color wp-elements-6bab7aeb21c211fc42bb45608a2519be\">Banned keywords(white-list\/ black-list)<\/li>\n\n\n\n<li class=\"has-base-2-color has-text-color has-link-color wp-elements-b8863d4c9dd8f8c581e33b6e71b70b50\">Warns and blocks the session as soon as a banned query is entered<\/li>\n\n\n\n<li class=\"has-base-2-color has-text-color has-link-color wp-elements-da7561066e21b9c51ffd3a52dd4e7ec9\">Immediately contacts the manager by text or email and requests approval when an important query is entered<\/li>\n\n\n\n<li class=\"has-base-2-color has-text-color has-link-color wp-elements-ac37489402751ce3b33f7196deafa394\">Manages all history of the query use<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Integrated Identity and Access Management solution actively responding to next-generation security paradigm HIWARE, an integrated IAM solution which has adopted the latest technologies such as artificial intelligence and cloud, is the flagship product of NETAND that has developed various solutions with the best technology. Under the gateway proxy approach in which the solution is positioned [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-180","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/procentric.my\/wp2\/index.php\/wp-json\/wp\/v2\/pages\/180","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/procentric.my\/wp2\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/procentric.my\/wp2\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/procentric.my\/wp2\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/procentric.my\/wp2\/index.php\/wp-json\/wp\/v2\/comments?post=180"}],"version-history":[{"count":24,"href":"https:\/\/procentric.my\/wp2\/index.php\/wp-json\/wp\/v2\/pages\/180\/revisions"}],"predecessor-version":[{"id":208,"href":"https:\/\/procentric.my\/wp2\/index.php\/wp-json\/wp\/v2\/pages\/180\/revisions\/208"}],"wp:attachment":[{"href":"https:\/\/procentric.my\/wp2\/index.php\/wp-json\/wp\/v2\/media?parent=180"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}