logologo
라이트 테마 버튼다크 테마 버튼
#Website
#Admin System
#Public / Government Agencies
#Utility Features
#React
#Vite
#Node.js
#Server Optimization
#Security Certification
#Performance Optimization
Threat Intelligence Management System
Financial Security Institute
portfolio-top-image/file/2025_05_12/1747036320501_위협인텔리전스-1.webp
Year of Production2022
Production Period2 months
Technologies UsedReact.js, TypeScript, Vite
ABOUT

This project involved developing a comprehensive Threat Intelligence (TI) management system designed to meet the specialized security requirements of the financial industry.


The client required an end-to-end platform capable of identifying threats across multiple sources—such as IP addresses, files, emails, URLs, and domains—and establishing a proactive security posture through real-time analysis and detection to prevent security incidents before they occur.


In addition, the client requested a finance-security-optimized TI system featuring structured classification by threat type, severity labeling, and statistics-based visualizations. A key requirement was an intuitive, user-friendly interface that enables security operators to take immediate action during threat events. The scope also included real-time alerting and log tracing for continuous monitoring, along with threat history management and report generation capabilities.


In response to these requirements, we delivered the design and implementation of TI data collection and analysis capabilities, an integrated dashboard with visual analytics, and end-to-end alerting and management features—resulting in an intelligent security management platform tailored for financial-sector operations.

Client Requirements

1️⃣ Build a multi-source threat identification system

A comprehensive system was required to identify threats across diverse sources, including IPs, files, emails, URLs, and domains. The platform needed real-time analysis and detection to support a preventative security framework and integrate multiple intelligence sources into a unified threat identification solution.


2️⃣ Deliver finance-security-optimized threat intelligence

The client required a TI system tailored to financial security operations, including structured classification by threat type, severity indicators, and statistics-based visualizations. An intuitive and user-friendly interface was necessary so security teams could respond immediately during threat situations, supported by customized TI workflows aligned with financial-industry practices.


3️⃣ Implement real-time monitoring and alerting

A monitoring system capable of real-time alerts and log tracing upon threat detection was required. The system also needed threat history management and automated report generation to support full lifecycle tracking and analysis of security incidents, enabling continuous monitoring and structured threat response through an integrated management platform.

Key Deliverables

💡 Built a threat intelligence data collection and analysis system

We implemented an automated pipeline to collect and normalize threat-related data from multiple sources such as IPs and URLs. A machine-learning-based detection logic was applied to analyze the collected data and systematically classify threat levels, establishing a foundation for accurate and rapid threat identification.


💡 Delivered an integrated dashboard and visual analytics

We developed a monitoring interface that allows security operators to understand the real-time threat landscape at a glance. The dashboard includes visualizations such as threat statistics, trend analysis, and severity distribution, transforming complex security data into clear graphics to support fast situational awareness and decision-making.


💡 Implemented alerting and management features

We implemented real-time alerting that notifies administrators immediately when threats are detected, enabling rapid response. We also developed automated report generation based on detection results to streamline reporting workflows. In addition, we provided a user-friendly UI with search and filtering by risk indicators, enabling efficient threat investigation and management within a unified security operations environment.

OUTPUT
portfolio-image/file/2024_11_27/1732693990543_1728970683438_위협인텔리전스_1.webp
portfolio-image/file/2024_11_27/1732693990543_1728970683438_위협인텔리전스_2.webp
portfolio-image/file/2024_11_27/1732693990543_1728970683438_위협인텔리전스_3.webp
portfolio-image/file/2024_11_27/1732693990543_1728970683438_위협인텔리전스_4.webp
wave-imagewave-image
Contact Us
Considering starting a project? Start your project perfectly with DevFive.
/images/main/contact_us/guide-icon.webp
GuidelinesPreparing your first project? Refer to DevFive's guide to understand everything from development process to technology stack at a glance.
CC
hh
ee
cc
kk
GG
uu
ii
dd
ee
ll
ii
nn
ee
ss
/images/main/contact_us/inquiry-icon.webp
Quote and InquiryStart your project with DevFive with a quick and easy quote.
RR
ee
qq
uu
ee
ss
tt
QQ
uu
oo
tt
ee