{"id":2116,"date":"2026-03-25T09:39:05","date_gmt":"2026-03-25T00:39:05","guid":{"rendered":"https:\/\/cytur.net\/platform-design\/"},"modified":"2026-04-07T21:29:46","modified_gmt":"2026-04-07T12:29:46","slug":"platform-design","status":"publish","type":"page","link":"https:\/\/cytur.net\/en\/platform-design\/","title":{"rendered":"Platform Design"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2116\" class=\"elementor elementor-2116 elementor-18\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-062ee6f e-con-full e-flex e-con e-parent\" data-id=\"062ee6f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8715cba elementor-widget elementor-widget-html\" data-id=\"8715cba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<div style=\"background:#0A0E1A;\">\n<style>\n.pd-fade{opacity:0;transform:translateY(40px);transition:opacity 0.8s ease,transform 0.8s ease;}\n.pd-fade.visible{opacity:1;transform:translateY(0);}\n.pd-d1{transition-delay:0.15s;}\n.pd-d2{transition-delay:0.3s;}\n.pd-d3{transition-delay:0.45s;}\n.pd-card{background:rgba(255,255,255,0.02);border:1px solid rgba(255,255,255,0.06);border-radius:16px;padding:36px 32px;transition:border-color 0.3s,transform 0.3s;}\n.pd-card:hover{border-color:rgba(26,86,219,0.3);transform:translateY(-4px);}\n.pd-feat{font-family:'Pretendard Variable',sans-serif;font-size:16px;color:#A0AEC0;line-height:2;margin:0;padding-left:18px;position:relative;}\n.pd-feat::before{content:'';position:absolute;left:0;top:11px;width:6px;height:6px;border-radius:50%;background:#1A56DB;}\n.pd-tag{display:inline-block;font-family:'Pretendard Variable',sans-serif;font-size:14px;font-weight:700;letter-spacing:0.5px;padding:8px 18px;border-radius:8px;margin-bottom:12px;color:#FFFFFF;background:#1A56DB;}\n.pd-badge{display:inline-block;font-family:'Pretendard Variable',sans-serif;font-size:13px;font-weight:600;letter-spacing:2.5px;text-transform:uppercase;color:#FFFFFF;margin-bottom:16px;padding:10px 20px;border-radius:8px;}\n.pd-badge-red{background:rgba(229,62,62,0.3);border:1.5px solid rgba(229,62,62,0.5);}\n.pd-badge-blue{background:rgba(26,86,219,0.3);border:1.5px solid rgba(26,86,219,0.5);}\n.pd-wf{opacity:0;transform:translateX(-30px);transition:opacity 0.6s ease,transform 0.6s ease;}\n.pd-wf.visible{opacity:1;transform:translateX(0);}\n\n@media (max-width: 767px) {\n  div[style*=\"max-width:1280px\"][style*=\"padding:100px\"] {\n    padding: 48px 16px !important;\n  }\n  .pd-wf,\n  div[style*=\"align-items:flex-start\"][style*=\"gap:28px\"] {\n    flex-direction: row !important;\n    gap: 16px !important;\n    padding-bottom: 32px !important;\n  }\n  .pd-feat { font-size: 14px !important; line-height: 1.65 !important; padding-left: 14px !important; }\n  .pd-feat::before { top: 9px !important; width: 5px !important; height: 5px !important; }\n  .pd-card { padding: 24px 16px !important; }\n  .pd-val-grid { display: block !important; }\n  .pd-val-grid > div { margin-bottom: 12px; padding: 24px 20px !important; }\n  .pd-val-grid > div div[style*=\"font-size:36px\"] { font-size: 24px !important; }\n  .pd-val-grid > div div[style*=\"font-size:18px\"] { font-size: 15px !important; }\n  .pd-val-grid > div div[style*=\"font-size:16px\"] { font-size: 13px !important; }\n  .pd-wf div[style*=\"width:32px\"] {\n    width: 28px !important;\n    height: 28px !important;\n    min-width: 28px !important;\n    font-size: 12px !important;\n  }\n  .pd-wf h3 { font-size: 17px !important; }\n  .pd-wf p { font-size: 14px !important; }\n  div[style*=\"display:grid\"][style*=\"repeat(2\"] {\n    grid-template-columns: 1fr !important;\n  }\n  .sol-card,\n  div[style*=\"border-radius:16px\"][style*=\"padding:48px\"] {\n    padding: 24px 16px !important;\n  }\n  div[style*=\"min-height\"] { min-height: 320px !important; }\n  div[style*=\"display:flex\"][style*=\"gap:16px\"][style*=\"align-items:center\"] {\n    flex-direction: row !important;\n  }\n}\n@media (max-width: 767px) {\n  .wf-step-circle,\n  div[style*=\"border-radius:50%\"] {\n    width: 48px !important;\n    height: 48px !important;\n    min-width: 48px !important;\n    border-radius: 50% !important;\n  }\n  .wf-step {\n    flex-direction: row !important;\n    gap: 16px !important;\n  }\n}\n<\/style>\n\n<!-- HERO -->\n<div style=\"position:relative;min-height:600px;display:flex;align-items:center;overflow:hidden;\">\n<div style=\"position:absolute;inset:0;\">\n<img decoding=\"async\" src=\"https:\/\/cytur.net\/wp-content\/uploads\/2026\/03\/batch_main-card1.png\" alt=\"\" style=\"width:100%;height:100%;object-fit:cover;display:block;\">\n<div style=\"position:absolute;inset:0;background:rgba(10,14,26,0.7);\"><\/div>\n<\/div>\n<div style=\"position:relative;z-index:1;max-width:1280px;margin:0 auto;padding:120px 40px;text-align:center;\">\n<div style=\"display:inline-block;font-family:'Pretendard Variable',sans-serif;font-size:13px;font-weight:600;letter-spacing:2.5px;text-transform:uppercase;color:#FFFFFF;margin-bottom:16px;padding:6px 16px;border:1px solid rgba(255,255,255,0.4);border-radius:4px;background:rgba(255,255,255,0.15);\">01 Design<\/div>\n<h1 style=\"font-family:'Pretendard Variable',sans-serif;font-size:48px;font-weight:700;color:#FFFFFF;margin:16px 0 16px;letter-spacing:-0.5px;line-height:1.15;text-shadow:0 2px 20px rgba(0,0,0,0.8);\">Eliminate Threats<br>at the Design Stage<\/h1>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:22px;color:#A0AEC0;margin:0 0 12px;line-height:1.6;text-shadow:0 2px 16px rgba(0,0,0,0.6);\">Security flaws discovered after construction<br>cost 10\u00d7 more to fix.<\/p>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:18px;color:#718096;margin:0;line-height:1.75;text-shadow:0 2px 16px rgba(0,0,0,0.6);\">CYTUR automatically analyzes ship networks<br>at the design stage and identifies vulnerabilities<br>through simulated attack scenarios.<\/p>\n<\/div>\n<\/div>\n\n<!-- PROBLEM -->\n<div style=\"border-top:1px solid rgba(255,255,255,0.05);\">\n<div style=\"max-width:1280px;margin:0 auto;padding:100px 40px;\">\n<div class=\"pd-fade\" style=\"display:flex;gap:60px;align-items:center;\">\n<div style=\"flex:1;\">\n<div class=\"pd-badge pd-badge-red\">Problem<\/div>\n<h2 style=\"font-family:'Pretendard Variable',sans-serif;font-size:36px;font-weight:700;color:#FFFFFF;margin:16px 0 20px;line-height:1.25;\">Without threat modeling at design,<br>you're embedding vulnerabilities into the ship's DNA<\/h2>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:18px;color:#A0AEC0;line-height:1.75;margin:0 0 16px 0;\">Most vessels still treat cybersecurity as an afterthought. When security is not considered at the design stage, fixing flaws discovered after construction requires enormous cost and time.<\/p>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:18px;color:#A0AEC0;line-height:1.75;margin:0;\">IACS UR E26\/E27 regulations require cybersecurity to be embedded from the design stage. Without compliance, class society certification itself becomes impossible.<\/p>\n<\/div>\n<div class=\"pd-fade pd-d1\" style=\"flex-shrink:0;width:380px;background:rgba(229,62,62,0.06);border:1px solid rgba(229,62,62,0.2);border-radius:16px;padding:60px 40px;text-align:center;\">\n<div class=\"pd-counter\" data-target=\"10\" data-suffix=\"\u00d7\" style=\"font-family:'Pretendard Variable',sans-serif;font-size:80px;font-weight:800;color:#E53E3E;line-height:1;margin-bottom:20px;\">0\u00d7<\/div>\n<div style=\"font-family:'Pretendard Variable',sans-serif;font-size:18px;color:#718096;line-height:1.6;\">Post-construction remediation cost<br>vs design-stage prevention cost<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<!-- SOLUTIONS 2x2 -->\n<div style=\"border-top:1px solid rgba(255,255,255,0.05);\">\n<div style=\"max-width:1280px;margin:0 auto;padding:100px 40px;\">\n<div class=\"pd-fade\" style=\"text-align:center;margin-bottom:60px;\">\n<div class=\"pd-badge pd-badge-blue\">Solution<\/div>\n<h2 style=\"font-family:'Pretendard Variable',sans-serif;font-size:36px;font-weight:700;color:#FFFFFF;margin:16px 0 0;line-height:1.15;\">Design Phase Solutions<\/h2>\n<\/div>\n<div style=\"display:grid;grid-template-columns:repeat(2,1fr);gap:24px;\">\n<div class=\"pd-fade pd-card\">\n<span class=\"pd-tag\">CYTUR-TM\u2122<\/span>\n<h3 style=\"font-family:'Pretendard Variable',sans-serif;font-size:22px;font-weight:700;color:#FFFFFF;margin:0 0 4px;\">Threat Modeler<\/h3>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:15px;color:#5CB8C4;margin:0 0 16px;font-weight:500;\">Digital security design tool for vessels<\/p>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:16px;color:#A0AEC0;line-height:1.75;margin:0 0 16px 0;\">Creates a virtual network map based on ship design data and simulates how cyberattacks could propagate through the vessel.<\/p>\n<div class=\"pd-feat\">Zone-based network visualization & simulated attack scenarios<\/div>\n<div class=\"pd-feat\">IACS UR E26\/E27 automated risk assessment reports<\/div>\n<div class=\"pd-feat\">Incident propagation path identification & containment strategies<\/div>\n<\/div>\n<div class=\"pd-fade pd-d1 pd-card\">\n<span class=\"pd-tag\">CYTUR-ASA\u2122<\/span>\n<h3 style=\"font-family:'Pretendard Variable',sans-serif;font-size:22px;font-weight:700;color:#FFFFFF;margin:0 0 4px;\">Attack Surface Analyzer<\/h3>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:15px;color:#5CB8C4;margin:0 0 16px;font-weight:500;\">Maritime cyber attack surface analysis<\/p>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:16px;color:#A0AEC0;line-height:1.75;margin:0 0 16px 0;\">Proactively identifies potential security vulnerabilities in onboard asset software and firmware. Uses Bayesian networks to predict even unknown threats.<\/p>\n<div class=\"pd-feat\">ARIA encryption-based secure data collection<\/div>\n<div class=\"pd-feat\">Bayesian AI threat probability prediction<\/div>\n<div class=\"pd-feat\">CIS, MITRE, IACS-based automated response playbooks<\/div>\n<\/div>\n<div class=\"pd-fade pd-d2 pd-card\">\n<span class=\"pd-tag\">CYTUR-SCS<\/span>\n<h3 style=\"font-family:'Pretendard Variable',sans-serif;font-size:22px;font-weight:700;color:#FFFFFF;margin:0 0 4px;\">Ship Equipment Cybersecurity Compliance Assessment System<\/h3>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:15px;color:#5CB8C4;margin:0 0 16px;font-weight:500;\">Integrated CBS asset & system management<\/p>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:16px;color:#A0AEC0;line-height:1.75;margin:0 0 16px 0;\">Centrally manages all CBS assets onboard. Establishes a vendor equipment security verification framework, unifying asset inventories and security status from design through delivery.<\/p>\n<div class=\"pd-feat\">Unified CBS asset inventory & security status tracking<\/div>\n<div class=\"pd-feat\">Vendor equipment security requirements gap analysis<\/div>\n<div class=\"pd-feat\">Automated compliance documentation & class report generation<\/div>\n<\/div>\n<div class=\"pd-fade pd-d3 pd-card\">\n<span class=\"pd-tag\">CYTUR-TI\u2122<\/span>\n<h3 style=\"font-family:'Pretendard Variable',sans-serif;font-size:22px;font-weight:700;color:#FFFFFF;margin:0 0 4px;\">Threat Intelligence<\/h3>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:13px;color:#718096;margin:0 0 2px;font-weight:500;\">Design phase application<\/p>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:15px;color:#5CB8C4;margin:0 0 16px;font-weight:500;\">Pre-check planned equipment exposure<\/p>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:16px;color:#A0AEC0;line-height:1.75;margin:0 0 16px 0;\">Pre-screens planned equipment for external exposure vulnerabilities, supporting decisions to update or replace at-risk equipment before installation.<\/p>\n<div class=\"pd-feat\">CVE & external exposure lookup for planned equipment<\/div>\n<div class=\"pd-feat\">Dark web \/ deep web monitoring of equipment manufacturers<\/div>\n<div class=\"pd-feat\">Security intelligence-informed equipment selection at design stage<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<!-- WORKFLOW -->\n<div style=\"border-top:1px solid rgba(255,255,255,0.05);\">\n<div style=\"max-width:1280px;margin:0 auto;padding:100px 40px;\">\n<div class=\"pd-fade\" style=\"text-align:center;margin-bottom:60px;\">\n<div class=\"pd-badge pd-badge-blue\">Workflow<\/div>\n<h2 style=\"font-family:'Pretendard Variable',sans-serif;font-size:36px;font-weight:700;color:#FFFFFF;margin:16px 0 0;line-height:1.15;\">Design Phase Security Process<\/h2>\n<\/div>\n<div style=\"display:flex;justify-content:center;\">\n<div style=\"display:inline-block;position:relative;\">\n<div style=\"position:absolute;left:15px;top:16px;bottom:16px;width:2px;background:rgba(26,86,219,0.3);\"><\/div>\n\n<div class=\"pd-wf\" style=\"display:flex;align-items:flex-start;gap:28px;padding-bottom:48px;position:relative;\">\n<div style=\"flex-shrink:0;width:32px;height:32px;border-radius:50%;background:#1A56DB;display:flex;align-items:center;justify-content:center;font-family:'Pretendard Variable',sans-serif;font-size:14px;font-weight:700;color:#FFFFFF;position:relative;z-index:1;\">01<\/div>\n<div style=\"padding-top:2px;\">\n<h3 style=\"font-family:'Pretendard Variable',sans-serif;font-size:22px;font-weight:700;color:#FFFFFF;margin:0 0 8px;line-height:1.3;\">Equipment Intelligence Pre-Check<\/h3>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:16px;color:#A0AEC0;line-height:1.75;margin:0;\">TI verifies planned equipment for CVE and dark web exposure, supporting decisions to replace or remediate at-risk components.<\/p>\n<\/div>\n<\/div>\n\n<div class=\"pd-wf\" style=\"display:flex;align-items:flex-start;gap:28px;padding-bottom:48px;position:relative;\">\n<div style=\"flex-shrink:0;width:32px;height:32px;border-radius:50%;background:#1A56DB;display:flex;align-items:center;justify-content:center;font-family:'Pretendard Variable',sans-serif;font-size:14px;font-weight:700;color:#FFFFFF;position:relative;z-index:1;\">02<\/div>\n<div style=\"padding-top:2px;\">\n<h3 style=\"font-family:'Pretendard Variable',sans-serif;font-size:22px;font-weight:700;color:#FFFFFF;margin:0 0 8px;line-height:1.3;\">Threat Modeling & Network Design<\/h3>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:16px;color:#A0AEC0;line-height:1.75;margin:0;\">TM generates a virtual network map from ship design data and simulates zone-by-zone attack propagation paths.<\/p>\n<\/div>\n<\/div>\n\n<div class=\"pd-wf\" style=\"display:flex;align-items:flex-start;gap:28px;padding-bottom:48px;position:relative;\">\n<div style=\"flex-shrink:0;width:32px;height:32px;border-radius:50%;background:#1A56DB;display:flex;align-items:center;justify-content:center;font-family:'Pretendard Variable',sans-serif;font-size:14px;font-weight:700;color:#FFFFFF;position:relative;z-index:1;\">03<\/div>\n<div style=\"padding-top:2px;\">\n<h3 style=\"font-family:'Pretendard Variable',sans-serif;font-size:22px;font-weight:700;color:#FFFFFF;margin:0 0 8px;line-height:1.3;\">Attack Surface Analysis & Threat Prediction<\/h3>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:16px;color:#A0AEC0;line-height:1.75;margin:0;\">ASA analyzes the attack surface of each CBS device,<br>while Bayesian AI predicts threat probability and prioritizes response items.<\/p>\n<\/div>\n<\/div>\n\n<div class=\"pd-wf\" style=\"display:flex;align-items:flex-start;gap:28px;position:relative;\">\n<div style=\"flex-shrink:0;width:32px;height:32px;border-radius:50%;background:#1A56DB;display:flex;align-items:center;justify-content:center;font-family:'Pretendard Variable',sans-serif;font-size:14px;font-weight:700;color:#FFFFFF;position:relative;z-index:1;\">04<\/div>\n<div style=\"padding-top:2px;\">\n<h3 style=\"font-family:'Pretendard Variable',sans-serif;font-size:22px;font-weight:700;color:#FFFFFF;margin:0 0 8px;line-height:1.3;\">Unified Asset Management & Documentation<\/h3>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:16px;color:#A0AEC0;line-height:1.75;margin:0;\">SCS centrally manages all CBS assets and<br>auto-generates IACS UR E26\/E27 compliance documentation.<\/p>\n<\/div>\n<\/div>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<!-- VALUE -->\n<div style=\"border-top:1px solid rgba(255,255,255,0.05);\">\n<div style=\"max-width:1280px;margin:0 auto;padding:100px 40px;text-align:center;\">\n<div class=\"pd-fade\">\n<div class=\"pd-badge pd-badge-blue\">Value<\/div>\n<h2 style=\"font-family:'Pretendard Variable',sans-serif;font-size:36px;font-weight:700;color:#FFFFFF;margin:16px 0 48px;line-height:1.15;\">Expected Outcomes<\/h2>\n<\/div>\n<div class=\"pd-val-grid\" style=\"display:grid;grid-template-columns:repeat(3,1fr);gap:24px;\">\n<div class=\"pd-fade\" style=\"background:rgba(255,255,255,0.02);border:1px solid rgba(255,255,255,0.06);border-radius:16px;padding:36px 28px;text-align:center;\">\n<div style=\"font-family:'Pretendard Variable',sans-serif;font-size:36px;font-weight:800;color:#1A56DB;margin-bottom:12px;\">10\u00d7<\/div>\n<div style=\"font-family:'Pretendard Variable',sans-serif;font-size:18px;font-weight:700;color:#FFFFFF;margin-bottom:8px;\">Minimize Retrofit Risk<\/div>\n<div style=\"font-family:'Pretendard Variable',sans-serif;font-size:16px;color:#718096;line-height:1.6;\">Eliminate flaws at design stage,<br>saving 10\u00d7 in post-construction costs<\/div>\n<\/div>\n<div class=\"pd-fade pd-d1\" style=\"background:rgba(255,255,255,0.02);border:1px solid rgba(255,255,255,0.06);border-radius:16px;padding:36px 28px;text-align:center;\">\n<div style=\"font-family:'Pretendard Variable',sans-serif;font-size:36px;font-weight:800;color:#1A56DB;margin-bottom:12px;\">Fast<\/div>\n<div style=\"font-family:'Pretendard Variable',sans-serif;font-size:18px;font-weight:700;color:#FFFFFF;margin-bottom:8px;\">Faster Class Approval<\/div>\n<div style=\"font-family:'Pretendard Variable',sans-serif;font-size:16px;color:#718096;line-height:1.6;\">Automated risk assessment and<br>documentation streamline audits<\/div>\n<\/div>\n<div class=\"pd-fade pd-d2\" style=\"background:rgba(255,255,255,0.02);border:1px solid rgba(255,255,255,0.06);border-radius:16px;padding:36px 28px;text-align:center;\">\n<div style=\"font-family:'Pretendard Variable',sans-serif;font-size:36px;font-weight:800;color:#1A56DB;margin-bottom:12px;\">360\u00b0<\/div>\n<div style=\"font-family:'Pretendard Variable',sans-serif;font-size:18px;font-weight:700;color:#FFFFFF;margin-bottom:8px;\">Full Security Visibility<\/div>\n<div style=\"font-family:'Pretendard Variable',sans-serif;font-size:16px;color:#718096;line-height:1.6;\">Visualized security controls<br>strengthen fleet-wide incident response<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<!-- CTA -->\n<div style=\"border-top:1px solid rgba(255,255,255,0.05);\">\n<div style=\"max-width:1280px;margin:0 auto;padding:100px 40px;text-align:center;\" class=\"pd-fade\">\n<div class=\"pd-badge pd-badge-blue\">Get Started<\/div>\n<h2 style=\"font-family:'Pretendard Variable',sans-serif;font-size:36px;font-weight:700;color:#FFFFFF;margin:16px 0 12px;line-height:1.15;\">Start Securing the Design Phase<\/h2>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:18px;color:#718096;margin:0 0 36px;line-height:1.6;\">See how to embed security from the design stage<br>with a personalized demo.<\/p>\n<div>\n<a href=\"https:\/\/cytur.net\/en\/book-a-demo\/\" style=\"display:inline-block;padding:16px 36px;font-family:'Pretendard Variable',sans-serif;font-size:17px;font-weight:600;color:#FFFFFF;background:#1A56DB;border:none;border-radius:8px;text-decoration:none;letter-spacing:0.3px;margin-right:12px;\">Book a Demo \u2192<\/a>\n<a href=\"https:\/\/cytur.net\/en\/contact-sales\/\" style=\"display:inline-block;padding:16px 36px;font-family:'Pretendard Variable',sans-serif;font-size:17px;font-weight:600;color:#FFFFFF;background:transparent;border:1px solid rgba(26,86,219,0.5);border-radius:8px;text-decoration:none;letter-spacing:0.3px;\">Contact Sales<\/a>\n<\/div>\n<\/div>\n<\/div>\n\n<\/div>\n\n<script>\n(function(){\nvar obs=new IntersectionObserver(function(entries){entries.forEach(function(e){if(e.isIntersecting)e.target.classList.add('visible');});},{threshold:0.1});\ndocument.querySelectorAll('.pd-fade').forEach(function(el){obs.observe(el);});\nvar wfItems=document.querySelectorAll('.pd-wf');\nvar wfObs=new IntersectionObserver(function(entries){entries.forEach(function(e){if(e.isIntersecting){var idx=Array.from(wfItems).indexOf(e.target);setTimeout(function(){e.target.classList.add('visible');},idx*200);}});},{threshold:0.1});\nwfItems.forEach(function(el){wfObs.observe(el);});\nvar cObs=new IntersectionObserver(function(entries){entries.forEach(function(e){if(e.isIntersecting&&!e.target.dataset.done){e.target.dataset.done='1';var t=parseInt(e.target.dataset.target);var suffix=e.target.dataset.suffix;var dur=1500,st=null;function step(ts){if(!st)st=ts;var p=Math.min((ts-st)\/dur,1);var eased=1-Math.pow(1-p,3);var cur=Math.round(eased*t);e.target.textContent=cur+suffix;if(p<1)requestAnimationFrame(step);}requestAnimationFrame(step);}});},{threshold:0.3});\ndocument.querySelectorAll('.pd-counter').forEach(function(el){cObs.observe(el);});\n})();\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>01 Design Eliminate Threatsat the Design Stage Security flaws discovered after constructioncost 10\u00d7 more to fix. CYTUR automatically analyzes ship networksat the design stage and identifies vulnerabilitiesthrough simulated attack scenarios. Problem Without threat modeling at design,you&#8217;re embedding vulnerabilities into the ship&#8217;s DNA Most vessels still treat cybersecurity as an afterthought. When security is not considered [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2116","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Platform Design - Cyber Trust &amp; Resilience for Maritime<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cytur.net\/en\/platform-design\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Platform Design - Cyber Trust &amp; Resilience for Maritime\" \/>\n<meta property=\"og:description\" content=\"01 Design Eliminate Threatsat the Design Stage Security flaws discovered after constructioncost 10\u00d7 more to fix. CYTUR automatically analyzes ship networksat the design stage and identifies vulnerabilitiesthrough simulated attack scenarios. Problem Without threat modeling at design,you&#8217;re embedding vulnerabilities into the ship&#8217;s DNA Most vessels still treat cybersecurity as an afterthought. When security is not considered [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cytur.net\/en\/platform-design\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Trust &amp; Resilience for Maritime\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-07T12:29:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cytur.net\/wp-content\/uploads\/2026\/03\/batch_main-card1.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cytur.net\\\/en\\\/platform-design\\\/\",\"url\":\"https:\\\/\\\/cytur.net\\\/en\\\/platform-design\\\/\",\"name\":\"Platform Design - Cyber Trust &amp; Resilience for Maritime\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cytur.net\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cytur.net\\\/en\\\/platform-design\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cytur.net\\\/en\\\/platform-design\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cytur.net\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/batch_main-card1.png\",\"datePublished\":\"2026-03-25T00:39:05+00:00\",\"dateModified\":\"2026-04-07T12:29:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cytur.net\\\/en\\\/platform-design\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cytur.net\\\/en\\\/platform-design\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cytur.net\\\/en\\\/platform-design\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cytur.net\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/batch_main-card1.png\",\"contentUrl\":\"https:\\\/\\\/cytur.net\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/batch_main-card1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cytur.net\\\/en\\\/platform-design\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\ud648\",\"item\":\"https:\\\/\\\/cytur.net\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Platform Design\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cytur.net\\\/#website\",\"url\":\"https:\\\/\\\/cytur.net\\\/\",\"name\":\"CYTUR Cyber Trust & Resilience for Maritime\",\"description\":\"End-to-End Cybersecurity for the Maritime Industry \uc120\ubc15 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc194\ub8e8\uc158 \ubc0f \ucee8\uc124\ud305 \uc804\ubb38 \uae30\uc5c5\",\"publisher\":{\"@id\":\"https:\\\/\\\/cytur.net\\\/#organization\"},\"alternateName\":\"CYTUR \uc2f8\uc774\ud130\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cytur.net\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cytur.net\\\/#organization\",\"name\":\"CYTUR\",\"alternateName\":\"CYTUR, \uc2f8\uc774\ud130\",\"url\":\"https:\\\/\\\/cytur.net\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cytur.net\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cytur.net\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/CYTUR_Logo.png\",\"contentUrl\":\"https:\\\/\\\/cytur.net\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/CYTUR_Logo.png\",\"width\":250,\"height\":250,\"caption\":\"CYTUR\"},\"image\":{\"@id\":\"https:\\\/\\\/cytur.net\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cytur\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Platform Design - Cyber Trust &amp; Resilience for Maritime","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cytur.net\/en\/platform-design\/","og_locale":"en_US","og_type":"article","og_title":"Platform Design - Cyber Trust &amp; Resilience for Maritime","og_description":"01 Design Eliminate Threatsat the Design Stage Security flaws discovered after constructioncost 10\u00d7 more to fix. CYTUR automatically analyzes ship networksat the design stage and identifies vulnerabilitiesthrough simulated attack scenarios. Problem Without threat modeling at design,you&#8217;re embedding vulnerabilities into the ship&#8217;s DNA Most vessels still treat cybersecurity as an afterthought. When security is not considered [&hellip;]","og_url":"https:\/\/cytur.net\/en\/platform-design\/","og_site_name":"Cyber Trust &amp; Resilience for Maritime","article_modified_time":"2026-04-07T12:29:46+00:00","og_image":[{"url":"https:\/\/cytur.net\/wp-content\/uploads\/2026\/03\/batch_main-card1.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cytur.net\/en\/platform-design\/","url":"https:\/\/cytur.net\/en\/platform-design\/","name":"Platform Design - Cyber Trust &amp; Resilience for Maritime","isPartOf":{"@id":"https:\/\/cytur.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cytur.net\/en\/platform-design\/#primaryimage"},"image":{"@id":"https:\/\/cytur.net\/en\/platform-design\/#primaryimage"},"thumbnailUrl":"https:\/\/cytur.net\/wp-content\/uploads\/2026\/03\/batch_main-card1.png","datePublished":"2026-03-25T00:39:05+00:00","dateModified":"2026-04-07T12:29:46+00:00","breadcrumb":{"@id":"https:\/\/cytur.net\/en\/platform-design\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cytur.net\/en\/platform-design\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cytur.net\/en\/platform-design\/#primaryimage","url":"https:\/\/cytur.net\/wp-content\/uploads\/2026\/03\/batch_main-card1.png","contentUrl":"https:\/\/cytur.net\/wp-content\/uploads\/2026\/03\/batch_main-card1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/cytur.net\/en\/platform-design\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\ud648","item":"https:\/\/cytur.net\/en\/"},{"@type":"ListItem","position":2,"name":"Platform Design"}]},{"@type":"WebSite","@id":"https:\/\/cytur.net\/#website","url":"https:\/\/cytur.net\/","name":"CYTUR Cyber Trust & Resilience for Maritime","description":"End-to-End Cybersecurity for the Maritime Industry \uc120\ubc15 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc194\ub8e8\uc158 \ubc0f \ucee8\uc124\ud305 \uc804\ubb38 \uae30\uc5c5","publisher":{"@id":"https:\/\/cytur.net\/#organization"},"alternateName":"CYTUR \uc2f8\uc774\ud130","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cytur.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cytur.net\/#organization","name":"CYTUR","alternateName":"CYTUR, \uc2f8\uc774\ud130","url":"https:\/\/cytur.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cytur.net\/#\/schema\/logo\/image\/","url":"https:\/\/cytur.net\/wp-content\/uploads\/2026\/04\/CYTUR_Logo.png","contentUrl":"https:\/\/cytur.net\/wp-content\/uploads\/2026\/04\/CYTUR_Logo.png","width":250,"height":250,"caption":"CYTUR"},"image":{"@id":"https:\/\/cytur.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cytur"]}]}},"_links":{"self":[{"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/pages\/2116","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/comments?post=2116"}],"version-history":[{"count":4,"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/pages\/2116\/revisions"}],"predecessor-version":[{"id":2120,"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/pages\/2116\/revisions\/2120"}],"wp:attachment":[{"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/media?parent=2116"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}