AI is being used across industries, and both governments and private companies are moving to implement DX (digital transformation) and AX (artificial intelligence transformation).
According to global IT market research firm IDC, Korea's DX service market will be worth 38 trillion won in 2023 and is expected to grow to 61 trillion won by 2028. In addition, according to market research firm Research and Markets, the AI agent market is expected to grow more than nine-fold from 5.1 billion dollars (approximately 7.495 trillion won) in 2024 to 47.1 billion dollars (approximately 69.2 trillion won) in 2030. The average annual growth rate is 44.8%.
In particular, at the 'CES 2025' home appliance and IT exhibition held in Las Vegas, USA in January, DX and AX attracted attention and became essential strategies for business innovation.
As DX·AX implementation accelerates, the need for a strong security environment that prevents leakage of important information in each area such as infrastructure, personal information, data, and applications is being raised. Accordingly, as interest in security increases, the domestic information security industry is also showing an upward curve in sales and number of companies.
According to the '2024 Information Security Industry Survey' published by the Ministry of Science and ICT and the Korea Information Security Industry Association, the number of domestic information security companies increased by approximately 7.2% from the previous year (1,594 companies) to 1,708. In addition, the total sales of the information security market last year were approximately KRW 16.831 trillion, up 4% from the previous year.
In this environment, companies that are introducing security solutions are putting all their efforts into introducing a 'Zero Trust' security model for thorough data protection. While past security methods clearly distinguished between the inside and the outside and trusted only internal users, Zero Trust security does not classify the inside and the outside separately and conducts thorough verification. As network boundaries become ambiguous due to the development of AI and cloud technologies, Zero Trust security has become established as a new security paradigm.

◆ ' AhnLab XDR' indexes security risks
There are also solutions that help users intuitively understand the priority and impact of threats by indexing risks. AhnLab introduced AhnLab XDR, a cloud-based SaaS platform that can effectively manage security threats within an organization and identify priorities. This platform collects and analyzes threat information generated from various systems to intuitively present security risks and even enables automated responses.
AhnLab's XDR is characterized by analyzing and detecting threats based on 'scenario rules' that utilize accumulated threat response know-how. For example, a scenario that detects external leakage of key data by an insider analyzes user behavior patterns to automatically detect and block abnormal signs. Through this, security personnel can reduce the worry about prioritizing numerous security events and focus on responding to important risks.
◆ Trend Micro 's 'Trend Vision One', a security solution made more powerful by AI
Trend Micro unveiled its latest security solution, Trend Vision One, based on artificial intelligence (AI) technology at CES 2025. This solution, combined with Intel's Threat Detection Technology (TDT), effectively responds to complex and intelligent cyber threats such as ransomware and fileless attacks.
Intel TDT is a hardware-based security technology built into the CPU that identifies threats that software antiviruses have difficulty detecting. The technology uses CPU telemetry data to detect attacks and improves memory scan speeds by up to 10 times compared to previous versions. This blocks fileless attacks and increases ransomware detection performance by 24%.
This solution, which combines AI and hardware-based technology, analyzes and blocks threats in real time without performance degradation, and effectively responds to the latest cyber threats that are difficult to detect with existing methods through software bypass. Through this, Trend Vision One helps companies build a more robust security system and maintain a safe environment.
◆ Data Leak Post-Security and Project Cost Management at Once, Korea Fujifilm BI 's 'AWMS'
EDR (Endpoint Detection and Response), the core of the zero trust security model, is a solution that detects and responds to threats by making each device (endpoint) the front line of security. The target of endpoint security is not only user devices such as computers and smartphones, but also includes Internet of Things (IoT) devices and output devices such as multi-function printers and printers. Among them, output devices can be vulnerable to data leakage in the process of converting sensitive data into physical form, so thorough security management and continuous monitoring are required.
Accordingly, Korea Fujifilm Business Innovation (CEO Jun Hatogai, hereinafter referred to as Korea Fujifilm BI) has released 'AWMS (ApeosWare Management Suite 2)', an integrated document management software with enhanced information leak prevention and tracking functions. AWMS comprehensively manages network-connected devices such as copiers and printers and their users, and provides various functions such as user authentication when printing, log collection, and document distribution. In addition, it saves the document copying, printing, fax transmission/reception, and scanning history by device as image data, allowing log managers to systematically manage and monitor the accumulated data by group. Through this, companies can quickly identify and respond to information leak routes.
AWMS also has the advantage of being able to calculate costs by project. For example, if a company such as a law firm or an architectural firm is working on multiple projects at the same time, they can register accounts for each project in advance, and then calculate costs based on the aggregated results by selecting and printing the project.
In addition, Korea Fujifilm BI operates 'IT Expert Services (ITESs)' for small and medium-sized enterprises with limited IT personnel and budgets. ITESs provides unified threat management solutions (UTM) and remote IT help desks to strengthen corporate data protection and support rapid responses to security issues.
- See more related articles
You must be logged in to post a comment.