Quad-core 2.0GHz
52, Achasan-ro 15-gil, Seongdong-gu,
Seoul, Republic of Korea
(Samhwan Digital Venture Tower 2nd floor)
Secure and Distinctive
Security Solution
with PQC Encryption Algorithm
Uses Post-Quantum Cryptography (PQC) algorithms to create a secure,
encrypted tunnel, perfectly protecting communication between client
and server against unauthorized access, providing enhanced
security with high-performance encryption features.
Q Care Connect
Key Features
Robust Security
Provides strong security using PQC algorithms resistant to quantum computer attacks.Disaster Recovery System Support
Supports a 1LS VPN disaster recovery system through DR center features.Network Optimization
Guarantees optimized performance for large-scale environments through multicore distributed processing.Integrity
Implements non-repudiation functions for endpoints.Secure Network Environment
Creates an encrypted tunnel between the client and server for a secure network environment.Supports Various OS
Compatible with Windows, Linux, Android, and iOS.Diverse User Support Methods
Supports clients through WEB/CS.Remote Access Security
Supports blocking of the remote desktop clipboard.Load Balancing
Supports inherent client load balancing.Detailed Features and Advantages
Detailed Features and Advantages
Support for Various Applications and Servers
Supports a wide range of applications in Web, Web Application, and Non-Web environments (FTP, Tel-Net, file servers, etc.).
File Transfer Protocol Support: Supports Active/passive FTP TLS 1.2 / 1.3 SNMP V3.
Support for Various User OS Environments: Supports Windows 2000, Win7 (32bit/64bit), Win8, Win10, Mac OS X 10.10 and above.
Linux (kernel 3.0 and above), and
Mobile OS (Android 10.x (TLS 1.2) / iOS).
High Availability and Load Distribution (HA) Redundancy Supported.
Pre-login Feature for Customer Convenience.
Access Control
IP/Port Access Control Per Server
User/Group-Specific Access Rights
User Access Limitations by Time Period
Forced Termination and Idle Timeout for Users (Data transmission, Input events)
User PC Authentication (Collects unique MAC values from user PCs to control access)
Access Control on Expired OS like Windows 7
Controlled Login Based on User PC Antivirus Installation (Regulates login processes based on the presence of antivirus software such as V3/ALYac among eight standard setups)
Login Control Based on Personal Firewall Usage on Windows
Authentication and Encryption
Encryption algorithms AES192, SEED, ARIA128, ARIA192, ARIA256
Support for easy changes of encryption algorithms through GUI
Support for nationally accredited security algorithms (SEED, ARIA)
Various authentication methods (self-authentication, Active Directory, RADIUS integration, etc.)
Support for simultaneous multi-factor authentication
Support for unlimited issuance and management of private certificates
Authentication support through integration with Post-Quantum Cryptography (PQC)
Convenience
Provision of user connection/authentication logs
Provision of system logs (CPU, Memory, HDD)
Collection of user PC information (OS, CPU, Memory)
Log backup function and integration with syslog server
Support for a unified management tool in redundant configurations
Network traffic inspection by interface