[Photo: WithNetworks]

AI-based cybersecurity and IT infrastructure integrated platform company WithNetworks presented ways to build a data-driven security governance framework through its integrated asset and vulnerability management solution withVTM and threat exposure assessment service withREX at the security exhibition eGISEC 2026 (Electronic Government Information Security Solution Fair) held at KINTEX in Ilsan from March 18 to 20.

At the exhibition, WithNetworks introduced a methodology that goes beyond regulatory compliance, providing a reference point for security decision-making through advanced asset identification and AI-based risk assessment.

withVTM identifies all assets, including shadow IT and shadow APIs. Using an AI-generated risk score (VRS) as a baseline, it supports the implementation of data-driven security governance so that existing security solutions such as SIEM, SOAR, EDR and NAC respond differentially under consistent criteria.

The company explained that it can serve as an asset and risk intelligence engine supporting the requirements of the National Network Security Framework (N2SF) guidelines and the pan-ministerial comprehensive information protection measures, including a full IT asset survey and inventorying, network asset management, risk-based differentiated controls and network threat detection.

withVTM applies global NIST standards to provide complete visibility of logical assets, covering not only servers but also applications, processes and accounts.

WithNetworks CEO Jong-eop Ahn (안종업) said, "N2SF and the pan-ministerial comprehensive information protection measures require a paradigm of 'security that starts from assets, not networks.'" He added, "We will support customers in building a data-driven governance framework that intelligently links existing security systems through accurate asset and risk data provided by withVTM and withREX."

Keyword

#WithNetworks #eGISEC 2026 #withVTM #withREX #N2SF
Copyright © DigitalToday. All rights reserved. Unauthorized reproduction and redistribution are prohibited.