{"id":2131,"date":"2026-03-25T09:38:42","date_gmt":"2026-03-25T00:38:42","guid":{"rendered":"https:\/\/cytur.net\/platform-overview\/"},"modified":"2026-04-08T03:34:59","modified_gmt":"2026-04-07T18:34:59","slug":"platform-overview","status":"publish","type":"page","link":"https:\/\/cytur.net\/en\/platform-overview\/","title":{"rendered":"Platform Overview"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2131\" class=\"elementor elementor-2131 elementor-16\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5c38972f e-flex e-con-boxed e-con e-parent\" data-id=\"5c38972f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-784f253f elementor-widget elementor-widget-text-editor\" data-id=\"784f253f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>PLATFORM<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d3c107a elementor-widget elementor-widget-heading\" data-id=\"d3c107a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">From Design to Operation.<br>One Platform.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-34dc5d98 elementor-widget elementor-widget-text-editor\" data-id=\"34dc5d98\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>From the first line of ship design through<\/p><p>decades of ocean operation, <br \/>the CYTUR platform embeds cybersecurity into every phase.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9764141 elementor-widget elementor-widget-text-editor\" data-id=\"9764141\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>9 purpose-built solutions work seamlessly<\/p><p>\u00a0across 4 lifecycle phases.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4c5d475 e-flex e-con-boxed e-con e-parent\" data-id=\"4c5d475\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c2240b elementor-widget elementor-widget-html\" data-id=\"6c2240b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<div style=\"background:#0A0E1A;\"><style>.po-fade{opacity:0;transform:translateY(40px);transition:opacity 0.8s ease,transform 0.8s ease;}\n.po-fade.visible{opacity:1;transform:translateY(0);}\n.po-d1{transition-delay:0.15s;}\n.po-d2{transition-delay:0.3s;}\n.po-d3{transition-delay:0.45s;}\n.po-phase{background:rgba(255,255,255,0.02);border:1px solid rgba(255,255,255,0.06);border-radius:16px;padding:48px 40px;margin-bottom:32px;transition:border-color 0.3s,transform 0.3s;}\n.po-phase:hover{border-color:rgba(92,184,196,0.25);transform:translateY(-4px);}\n.po-tag{display:inline-block;font-family:'Pretendard Variable',sans-serif;font-size:12px;font-weight:600;padding:4px 12px;border-radius:4px;margin-right:6px;margin-bottom:6px;}\n.po-feat{font-family:'Pretendard Variable',sans-serif;font-size:16px;color:#A0AEC0;line-height:2;margin:0;padding-left:18px;position:relative;}\n.po-feat::before{content:'';position:absolute;left:0;top:11px;width:6px;height:6px;border-radius:50%;}\n.po-circle{width:100px;height:100px;border-radius:50%;display:flex;align-items:center;justify-content:center;margin:0 auto 16px;box-shadow:0 0 0 8px #0A0E1A;position:relative;z-index:2;}\n.po-intel-band{background:rgba(92,184,196,0.06);border:1px solid rgba(92,184,196,0.2);border-radius:16px;padding:28px 40px;text-align:center;transition:border-color 0.3s;}\n.po-intel-band:hover{border-color:rgba(92,184,196,0.45);}\n.po-arrow-up{display:flex;justify-content:space-around;padding:0 60px;margin:-8px 0 -4px;}\n\n@media (max-width: 767px) {\n  div[style*=\"display:flex\"][style*=\"max-width:960px\"] {flex-direction: row !important;padding: 0 8px !important;gap: 8px !important;}\n  div[style*=\"display:flex\"][style*=\"max-width:960px\"] > a {flex: 1 !important;width: auto !important;}\n  .po-circle {width: 64px !important;height: 64px !important;}\n  .po-circle span {font-size: 20px !important;}\n  div[style*=\"display:flex\"][style*=\"max-width:960px\"] div[style*=\"font-size:22px\"] {font-size: 15px !important;}\n  div[style*=\"display:flex\"][style*=\"max-width:960px\"] div[style*=\"font-size:14px\"] {font-size: 11px !important;line-height: 1.4 !important;}\n  div[style*=\"display:flex\"][style*=\"max-width:960px\"] > div[style*=\"position:absolute\"][style*=\"height:3px\"] {top: 32px !important;left: 60px !important;right: 60px !important;}\n  .po-arrow-up {padding: 0 20px !important;}\n  .po-intel-band {padding: 20px 16px !important;}\n  .po-phase {padding: 28px 20px !important;}\n  .po-phase[style*=\"display:flex\"] {flex-direction: column !important;}\n  .po-phase > div[style*=\"width:400px\"] {width: 100% !important;height: 200px !important;flex-shrink: 1 !important;}\n  .po-phase > div[style*=\"flex:1\"] {padding: 24px 20px !important;}\n  .po-tag {font-size: 11px !important;padding: 3px 8px !important;}\n  .po-feat {font-size: 14px !important;line-height: 1.7 !important;}\n  div[style*=\"max-width:1280px\"][style*=\"padding:100px\"] {padding: 48px 16px !important;}\n  .po-phase span[style*=\"font-size:48px\"],.po-phase span[style*=\"font-size: 48px\"] {font-size: 28px !important;}\n  div[style*=\"display:flex\"][style*=\"gap:16px\"][style*=\"justify-content:center\"] {flex-direction: column !important;align-items: center !important;}\n  div[style*=\"display:flex\"][style*=\"gap:16px\"][style*=\"justify-content:center\"] a {width: 100% !important;text-align: center !important;}\n}\n<\/style>\n\n<!-- SECTION 1: LIFECYCLE DIAGRAM -->\n<div style=\"border-top:1px solid rgba(255,255,255,0.05);\"><div style=\"max-width:1280px;margin:0 auto;padding:100px 40px;text-align:center;\"><div class=\"po-fade\"><div style=\"display:inline-block;font-family:'Pretendard Variable',sans-serif;font-size:13px;font-weight:600;letter-spacing:2.5px;text-transform:uppercase;color:#5CB8C4;margin-bottom:16px;padding:6px 16px;border:1px solid rgba(92,184,196,0.25);border-radius:4px;background:rgba(92,184,196,0.06);\">Lifecycle<\/div><h2 style=\"font-family:'Pretendard Variable',sans-serif;font-size:36px;font-weight:700;color:#FFFFFF;margin:16px 0 12px;line-height:1.15;\">Full Ship Lifecycle Security<\/h2><p style=\"font-family:'Pretendard Variable',sans-serif;font-size:18px;color:#718096;max-width:640px;margin:0 auto 60px;line-height:1.6;\">Sequentially connected from design to operation,<br>with Intelligence supplying threat data to every phase.<\/p><\/div>\n\n<!-- 3-Phase Row -->\n<div class=\"po-fade\" style=\"position:relative;display:flex;align-items:flex-start;justify-content:center;padding:0 40px;max-width:960px;margin:0 auto;\"><div style=\"position:absolute;top:50px;left:120px;right:120px;height:3px;background:linear-gradient(90deg,#1A56DB,#3B8FD4,#5CB8C4);z-index:1;\"><div style=\"position:absolute;right:-8px;top:-5px;width:0;height:0;border-left:12px solid #5CB8C4;border-top:6px solid transparent;border-bottom:6px solid transparent;\"><\/div><\/div>\n\n<a href=\"https:\/\/cytur.net\/en\/platform-design\/\" style=\"text-decoration:none;text-align:center;position:relative;z-index:2;flex:1;\"><div class=\"po-circle\" style=\"border:3px solid #1A56DB;background:#102B67;\"><span style=\"font-family:'Pretendard Variable',sans-serif;font-size:32px;font-weight:800;color:#FFFFFF;\">01<\/span><\/div><div style=\"font-family:'Pretendard Variable',sans-serif;font-size:22px;font-weight:700;color:#FFFFFF;margin-bottom:8px;\">Design<\/div><div style=\"font-family:'Pretendard Variable',sans-serif;font-size:14px;color:#718096;line-height:1.6;\">Threat modeling \u00b7 Attack surface analysis<br>CBS asset management \u00b7 Equipment exposure check<\/div><\/a>\n\n<a href=\"https:\/\/cytur.net\/en\/platform-build\/\" style=\"text-decoration:none;text-align:center;position:relative;z-index:2;flex:1;\"><div class=\"po-circle\" style=\"border:3px solid #3B8FD4;background:#1E4264;\"><span style=\"font-family:'Pretendard Variable',sans-serif;font-size:32px;font-weight:800;color:#FFFFFF;\">02<\/span><\/div><div style=\"font-family:'Pretendard Variable',sans-serif;font-size:22px;font-weight:700;color:#FFFFFF;margin-bottom:8px;\">Build<\/div><div style=\"font-family:'Pretendard Variable',sans-serif;font-size:14px;color:#718096;line-height:1.6;\">Security scanning \u00b7 FAT\/SAT verification<br>Class submission evidence generation<\/div><\/a>\n\n<a href=\"https:\/\/cytur.net\/en\/platform-operate\/\" style=\"text-decoration:none;text-align:center;position:relative;z-index:2;flex:1;\"><div class=\"po-circle\" style=\"border:3px solid #5CB8C4;background:#1A3D45;\"><span style=\"font-family:'Pretendard Variable',sans-serif;font-size:32px;font-weight:800;color:#FFFFFF;\">03<\/span><\/div><div style=\"font-family:'Pretendard Variable',sans-serif;font-size:22px;font-weight:700;color:#FFFFFF;margin-bottom:8px;\">Operate<\/div><div style=\"font-family:'Pretendard Variable',sans-serif;font-size:14px;color:#718096;line-height:1.6;\">Real-time monitoring \u00b7 Intrusion detection<br>Deception defense \u00b7 AI security \u00b7 Risk management<\/div><\/a><\/div>\n\n<!-- Arrows -->\n<div class=\"po-fade po-d1\" style=\"max-width:960px;margin:24px auto 0;padding:0 40px;\"><div class=\"po-arrow-up\"><svg width=\"20\" height=\"32\" viewBox=\"0 0 20 32\"><line x1=\"10\" y1=\"32\" x2=\"10\" y2=\"6\" stroke=\"#5CB8C4\" stroke-width=\"1.5\" stroke-dasharray=\"4 3\"\/><polygon points=\"5,8 10,0 15,8\" fill=\"#5CB8C4\"\/><\/svg><svg width=\"20\" height=\"32\" viewBox=\"0 0 20 32\"><line x1=\"10\" y1=\"32\" x2=\"10\" y2=\"6\" stroke=\"#5CB8C4\" stroke-width=\"1.5\" stroke-dasharray=\"4 3\"\/><polygon points=\"5,8 10,0 15,8\" fill=\"#5CB8C4\"\/><\/svg><svg width=\"20\" height=\"32\" viewBox=\"0 0 20 32\"><line x1=\"10\" y1=\"32\" x2=\"10\" y2=\"6\" stroke=\"#5CB8C4\" stroke-width=\"1.5\" stroke-dasharray=\"4 3\"\/><polygon points=\"5,8 10,0 15,8\" fill=\"#5CB8C4\"\/><\/svg><\/div><\/div>\n\n<!-- Intelligence Band -->\n<div class=\"po-fade po-d2\" style=\"max-width:960px;margin:0 auto;padding:0 40px;\"><a href=\"https:\/\/cytur.net\/en\/platform-intelligence\/\" style=\"text-decoration:none;display:block;\"><div class=\"po-intel-band\"><div style=\"display:flex;align-items:center;justify-content:center;gap:12px;margin-bottom:8px;\"><div style=\"flex:1;height:1px;background:linear-gradient(90deg,transparent,rgba(92,184,196,0.3));\"><\/div><span style=\"font-family:'Pretendard Variable',sans-serif;font-size:22px;font-weight:700;color:#5CB8C4;\">Intelligence<\/span><div style=\"flex:1;height:1px;background:linear-gradient(270deg,transparent,rgba(92,184,196,0.3));\"><\/div><\/div><div style=\"font-family:'Pretendard Variable',sans-serif;font-size:14px;color:#718096;line-height:1.6;\">Dark web monitoring \u00b7 Maritime CTI \u00b7 Supply chain visibility \u00b7 OT-TI analysis<\/div><div style=\"font-family:'Pretendard Variable',sans-serif;font-size:13px;color:rgba(92,184,196,0.5);margin-top:6px;\">Supplying real-time threat intelligence to every phase<\/div><\/div><\/a><\/div><\/div><\/div>\n\n<!-- SECTION 2: DESIGN -->\n<div style=\"border-top:1px solid rgba(255,255,255,0.05);\"><div style=\"max-width:1280px;margin:0 auto;padding:100px 40px;\"><div class=\"po-fade po-phase\" style=\"padding:0;overflow:hidden;display:flex;\"><div style=\"width:400px;flex-shrink:0;overflow:hidden;\"><img decoding=\"async\" src=\"https:\/\/cytur.net\/wp-content\/uploads\/2026\/03\/batch_main-card1.png\" alt=\"Design\" style=\"width:100%;height:100%;object-fit:cover;display:block;\"><\/div><div style=\"flex:1;padding:40px 40px;\"><div style=\"font-family:'Pretendard Variable',sans-serif;font-size:13px;font-weight:700;color:#1A56DB;letter-spacing:2px;margin-bottom:8px;\">01 DESIGN<\/div><h2 style=\"font-family:'Pretendard Variable',sans-serif;font-size:36px;font-weight:700;color:#FFFFFF;margin:0 0 16px;line-height:1.15;\">Design Phase Security<\/h2><p style=\"font-family:'Pretendard Variable',sans-serif;font-size:18px;color:#A0AEC0;line-height:1.75;margin:0 0 20px 0;\">Security flaws discovered after construction cost 10\u00d7 more to fix.<br>Without threat modeling at design, you're embedding vulnerabilities into the ship's DNA.<\/p><div style=\"margin-bottom:16px;\"><span class=\"po-tag\" style=\"color:#1A56DB;background:rgba(26,86,219,0.15);\">TM\u2122<\/span><span class=\"po-tag\" style=\"color:#1A56DB;background:rgba(26,86,219,0.15);\">ASA\u2122<\/span><span class=\"po-tag\" style=\"color:#1A56DB;background:rgba(26,86,219,0.15);\">SCS<\/span><span class=\"po-tag\" style=\"color:#5CB8C4;background:rgba(92,184,196,0.15);\">TI\u2122<\/span><\/div><div class=\"po-feat\"><span style=\"position:absolute;left:0;top:11px;width:6px;height:6px;border-radius:50%;background:#1A56DB;\"><\/span>Threat modeling \u00b7 Attack path simulation<\/div><div class=\"po-feat\"><span style=\"position:absolute;left:0;top:11px;width:6px;height:6px;border-radius:50%;background:#1A56DB;\"><\/span>Attack surface analysis \u00b7 AI threat probability prediction<\/div><div class=\"po-feat\"><span style=\"position:absolute;left:0;top:11px;width:6px;height:6px;border-radius:50%;background:#1A56DB;\"><\/span>Unified CBS asset management \u00b7 Vendor security verification<\/div><div class=\"po-feat\"><span style=\"position:absolute;left:0;top:11px;width:6px;height:6px;border-radius:50%;background:#1A56DB;\"><\/span>IACS UR E26\/E27 automated risk assessment reports<\/div><div style=\"margin-top:20px;\"><a href=\"https:\/\/cytur.net\/en\/platform-design\/\" style=\"font-family:'Pretendard Variable',sans-serif;font-size:15px;font-weight:600;color:#1A56DB;text-decoration:none;\">Learn more \u2192<\/a><\/div><\/div><\/div><\/div><\/div>\n\n<!-- SECTION 3: BUILD -->\n<div style=\"border-top:1px solid rgba(255,255,255,0.05);\"><div style=\"max-width:1280px;margin:0 auto;padding:100px 40px;\"><div class=\"po-fade po-phase\" style=\"padding:0;overflow:hidden;display:flex;\"><div style=\"width:400px;flex-shrink:0;overflow:hidden;\"><img decoding=\"async\" src=\"https:\/\/cytur.net\/wp-content\/uploads\/2026\/03\/batch_main-card2.png\" alt=\"Build\" style=\"width:100%;height:100%;object-fit:cover;display:block;\"><\/div><div style=\"flex:1;padding:40px 40px;\"><div style=\"font-family:'Pretendard Variable',sans-serif;font-size:13px;font-weight:700;color:#3B8FD4;letter-spacing:2px;margin-bottom:8px;\">02 BUILD<\/div><h2 style=\"font-family:'Pretendard Variable',sans-serif;font-size:36px;font-weight:700;color:#FFFFFF;margin:0 0 16px;line-height:1.15;\">Build & Sea Trial Security<\/h2><p style=\"font-family:'Pretendard Variable',sans-serif;font-size:18px;color:#A0AEC0;line-height:1.75;margin:0 0 20px 0;\">During construction and sea trials, frequent equipment changes create rapidly expanding security blind spots.<br>Without automated verification, passing class society audits becomes increasingly risky.<\/p><div style=\"margin-bottom:16px;\"><span class=\"po-tag\" style=\"color:#3B8FD4;background:rgba(59,143,212,0.15);\">SC\u2122<\/span><span class=\"po-tag\" style=\"color:#3B8FD4;background:rgba(59,143,212,0.15);\">SCS<\/span><\/div><div class=\"po-feat\"><span style=\"position:absolute;left:0;top:11px;width:6px;height:6px;border-radius:50%;background:#3B8FD4;\"><\/span>Automated onboard CBS asset discovery \u00b7 Network change tracking<\/div><div class=\"po-feat\"><span style=\"position:absolute;left:0;top:11px;width:6px;height:6px;border-radius:50%;background:#3B8FD4;\"><\/span>Security vulnerability & configuration assessment<\/div><div class=\"po-feat\"><span style=\"position:absolute;left:0;top:11px;width:6px;height:6px;border-radius:50%;background:#3B8FD4;\"><\/span>FAT\/SAT security test procedure setup & execution<\/div><div class=\"po-feat\"><span style=\"position:absolute;left:0;top:11px;width:6px;height:6px;border-radius:50%;background:#3B8FD4;\"><\/span>IACS UR E26\/E27 on-site verification evidence generation<\/div><div style=\"margin-top:20px;\"><a href=\"https:\/\/cytur.net\/en\/platform-build\/\" style=\"font-family:'Pretendard Variable',sans-serif;font-size:15px;font-weight:600;color:#3B8FD4;text-decoration:none;\">Learn more \u2192<\/a><\/div><\/div><\/div><\/div><\/div>\n\n<!-- SECTION 4: OPERATE -->\n<div style=\"border-top:1px solid rgba(255,255,255,0.05);\"><div style=\"max-width:1280px;margin:0 auto;padding:100px 40px;\"><div class=\"po-fade po-phase\" style=\"padding:0;overflow:hidden;display:flex;\"><div style=\"width:400px;flex-shrink:0;overflow:hidden;\"><img decoding=\"async\" src=\"https:\/\/cytur.net\/wp-content\/uploads\/2026\/03\/batch_main-card3.png\" alt=\"Operate\" style=\"width:100%;height:100%;object-fit:cover;display:block;\"><\/div><div style=\"flex:1;padding:40px 40px;\"><div style=\"font-family:'Pretendard Variable',sans-serif;font-size:13px;font-weight:700;color:#5CB8C4;letter-spacing:2px;margin-bottom:8px;\">03 OPERATE<\/div><h2 style=\"font-family:'Pretendard Variable',sans-serif;font-size:36px;font-weight:700;color:#FFFFFF;margin:0 0 16px;line-height:1.15;\">Operate Phase Security<\/h2><p style=\"font-family:'Pretendard Variable',sans-serif;font-size:18px;color:#A0AEC0;line-height:1.75;margin:0 0 20px 0;\">Vessels in operation must respond to real-time threats in connectivity-limited environments,<br>requiring unified monitoring and automated defense to protect the entire fleet.<\/p><div style=\"margin-bottom:16px;\"><span class=\"po-tag\" style=\"color:#5CB8C4;background:rgba(92,184,196,0.15);\">MG<\/span><span class=\"po-tag\" style=\"color:#5CB8C4;background:rgba(92,184,196,0.15);\">SD<\/span><span class=\"po-tag\" style=\"color:#5CB8C4;background:rgba(92,184,196,0.15);\">SHIPPOT<\/span><span class=\"po-tag\" style=\"color:#5CB8C4;background:rgba(92,184,196,0.15);\">SAVD\u2122<\/span><\/div><div class=\"po-feat\"><span style=\"position:absolute;left:0;top:11px;width:6px;height:6px;border-radius:50%;background:#5CB8C4;\"><\/span>Real-time onboard network monitoring \u00b7 Anomaly detection<\/div><div class=\"po-feat\"><span style=\"position:absolute;left:0;top:11px;width:6px;height:6px;border-radius:50%;background:#5CB8C4;\"><\/span>DPI-based intrusion detection \u00b7 Automated blocking<\/div><div class=\"po-feat\"><span style=\"position:absolute;left:0;top:11px;width:6px;height:6px;border-radius:50%;background:#5CB8C4;\"><\/span>Cyber deception (honeypot) \u00b7 Attacker behavior analysis<\/div><div class=\"po-feat\"><span style=\"position:absolute;left:0;top:11px;width:6px;height:6px;border-radius:50%;background:#5CB8C4;\"><\/span>AI visual security \u00b7 Physical access control<\/div><div class=\"po-feat\"><span style=\"position:absolute;left:0;top:11px;width:6px;height:6px;border-radius:50%;background:#5CB8C4;\"><\/span>Unified risk management \u00b7 Automated report generation<\/div><div style=\"margin-top:20px;\"><a href=\"https:\/\/cytur.net\/en\/platform-operate\/\" style=\"font-family:'Pretendard Variable',sans-serif;font-size:15px;font-weight:600;color:#5CB8C4;text-decoration:none;\">Learn more \u2192<\/a><\/div><\/div><\/div><\/div><\/div>\n\n<!-- SECTION 5: INTELLIGENCE -->\n<div style=\"border-top:1px solid rgba(255,255,255,0.05);\"><div style=\"max-width:1280px;margin:0 auto;padding:100px 40px;\"><div class=\"po-fade po-phase\" style=\"padding:0;overflow:hidden;display:flex;\"><div style=\"width:400px;flex-shrink:0;overflow:hidden;\"><img decoding=\"async\" src=\"https:\/\/cytur.net\/wp-content\/uploads\/2026\/03\/batch_main-card4.png\" alt=\"Intelligence\" style=\"width:100%;height:100%;object-fit:cover;display:block;\"><\/div><div style=\"flex:1;padding:40px 40px;\"><div style=\"font-family:'Pretendard Variable',sans-serif;font-size:13px;font-weight:700;color:#5CB8C4;letter-spacing:2px;margin-bottom:8px;\">INTELLIGENCE<\/div><h2 style=\"font-family:'Pretendard Variable',sans-serif;font-size:36px;font-weight:700;color:#FFFFFF;margin:0 0 16px;line-height:1.15;\">Threat Intelligence<\/h2><p style=\"font-family:'Pretendard Variable',sans-serif;font-size:18px;color:#A0AEC0;line-height:1.75;margin:0 0 20px 0;\">Proactive preparation, not reactive response \u2014 dark web and deep web monitoring<br>with maritime-specific CTI to identify threats before they materialize.<\/p><div style=\"margin-bottom:16px;\"><span class=\"po-tag\" style=\"color:#5CB8C4;background:rgba(92,184,196,0.15);\">TI\u2122<\/span><\/div><div class=\"po-feat\"><span style=\"position:absolute;left:0;top:11px;width:6px;height:6px;border-radius:50%;background:#5CB8C4;\"><\/span>24\/7 dark web \/ deep web maritime threat monitoring<\/div><div class=\"po-feat\"><span style=\"position:absolute;left:0;top:11px;width:6px;height:6px;border-radius:50%;background:#5CB8C4;\"><\/span>Maritime-specific CTI \u00b7 Customized threat reports<\/div><div class=\"po-feat\"><span style=\"position:absolute;left:0;top:11px;width:6px;height:6px;border-radius:50%;background:#5CB8C4;\"><\/span>Supply chain visibility \u00b7 Vendor exposure monitoring<\/div><div class=\"po-feat\"><span style=\"position:absolute;left:0;top:11px;width:6px;height:6px;border-radius:50%;background:#5CB8C4;\"><\/span>OT-TI cross-analysis \u00b7 Proactive defense strategies<\/div><div style=\"margin-top:20px;\"><a href=\"https:\/\/cytur.net\/en\/platform-intelligence\/\" style=\"font-family:'Pretendard Variable',sans-serif;font-size:15px;font-weight:600;color:#5CB8C4;text-decoration:none;\">Learn more \u2192<\/a><\/div><\/div><\/div><\/div><\/div>\n\n<!-- SECTION 6: SECURE BY DESIGN -->\n<div style=\"border-top:1px solid rgba(255,255,255,0.05);\"><div style=\"max-width:1280px;margin:0 auto;padding:100px 40px;text-align:center;\"><div class=\"po-fade\"><div style=\"display:inline-block;font-family:'Pretendard Variable',sans-serif;font-size:13px;font-weight:600;letter-spacing:2.5px;text-transform:uppercase;color:#5CB8C4;margin-bottom:16px;padding:6px 16px;border:1px solid rgba(92,184,196,0.25);border-radius:4px;background:rgba(92,184,196,0.06);\">Philosophy<\/div><h2 style=\"font-family:'Pretendard Variable',sans-serif;font-size:36px;font-weight:700;color:#FFFFFF;margin:16px 0 16px;line-height:1.15;\">Secure by Design<\/h2><p style=\"font-family:'Pretendard Variable',sans-serif;font-size:18px;color:#A0AEC0;max-width:900px;margin:0 auto 48px;line-height:1.75;\">CYTUR does not bolt on security as an afterthought.<br>We follow a \"Secure by Design\" philosophy that embeds cybersecurity from the ship's design stage.<br>This is why we build an integrated platform that spans the entire ship lifecycle \u2014 not just another security tool.<\/p><\/div><div style=\"display:flex;flex-direction:row;gap:20px;max-width:960px;margin:0 auto;\"><div class=\"po-fade\" style=\"background:rgba(255,255,255,0.02);border:1px solid rgba(255,255,255,0.06);border-radius:16px;padding:36px 28px;text-align:center;flex:1;\"><div style=\"font-family:'Pretendard Variable',sans-serif;font-size:36px;font-weight:800;color:#5CB8C4;margin-bottom:12px;\">9<\/div><div style=\"font-family:'Pretendard Variable',sans-serif;font-size:18px;font-weight:700;color:#FFFFFF;margin-bottom:8px;\">Purpose-Built Solutions<\/div><div style=\"font-family:'Pretendard Variable',sans-serif;font-size:16px;color:#718096;line-height:1.6;\">9 specialized solutions<br>optimized for each phase<\/div><\/div><div class=\"po-fade po-d1\" style=\"background:rgba(255,255,255,0.02);border:1px solid rgba(255,255,255,0.06);border-radius:16px;padding:36px 28px;text-align:center;flex:1;\"><div style=\"font-family:'Pretendard Variable',sans-serif;font-size:36px;font-weight:800;color:#5CB8C4;margin-bottom:12px;\">3+1<\/div><div style=\"font-family:'Pretendard Variable',sans-serif;font-size:18px;font-weight:700;color:#FFFFFF;margin-bottom:8px;\">Lifecycle Structure<\/div><div style=\"font-family:'Pretendard Variable',sans-serif;font-size:16px;color:#718096;line-height:1.6;\">Design \u2192 Build \u2192 Operate<br>+ Intelligence foundation<\/div><\/div><div class=\"po-fade po-d2\" style=\"background:rgba(255,255,255,0.02);border:1px solid rgba(255,255,255,0.06);border-radius:16px;padding:36px 28px;text-align:center;flex:1;\"><div style=\"font-family:'Pretendard Variable',sans-serif;font-size:36px;font-weight:800;color:#5CB8C4;margin-bottom:12px;\">1<\/div><div style=\"font-family:'Pretendard Variable',sans-serif;font-size:18px;font-weight:700;color:#FFFFFF;margin-bottom:8px;\">Unified Platform<\/div><div style=\"font-family:'Pretendard Variable',sans-serif;font-size:16px;color:#718096;line-height:1.6;\">Complete security management<br>from a single platform<\/div><\/div><\/div><\/div><\/div>\n\n<!-- SECTION 7: CTA -->\n<div style=\"border-top:1px solid rgba(255,255,255,0.05);\"><div style=\"max-width:1280px;margin:0 auto;padding:100px 40px;text-align:center;\" class=\"po-fade\"><div style=\"display:inline-block;font-family:'Pretendard Variable',sans-serif;font-size:13px;font-weight:600;letter-spacing:2.5px;text-transform:uppercase;color:#5CB8C4;margin-bottom:16px;padding:6px 16px;border:1px solid rgba(92,184,196,0.25);border-radius:4px;background:rgba(92,184,196,0.06);\">Get Started<\/div><h2 style=\"font-family:'Pretendard Variable',sans-serif;font-size:36px;font-weight:700;color:#FFFFFF;margin:16px 0 12px;line-height:1.15;\">See the Platform in Action<\/h2><p style=\"font-family:'Pretendard Variable',sans-serif;font-size:18px;color:#718096;margin:0 0 36px;line-height:1.6;\">Book a personalized demo and discover how<br>the CYTUR platform protects every phase<br>of the ship lifecycle.<\/p><div><a href=\"https:\/\/cytur.net\/en\/book-a-demo\/\" style=\"display:inline-block;padding:16px 36px;font-family:'Pretendard Variable',sans-serif;font-size:17px;font-weight:600;color:#FFFFFF;background:#1A56DB;border:none;border-radius:8px;text-decoration:none;letter-spacing:0.3px;margin-right:12px;\">Book a Demo \u2192<\/a><a href=\"https:\/\/cytur.net\/en\/contact-sales\/\" style=\"display:inline-block;padding:16px 36px;font-family:'Pretendard Variable',sans-serif;font-size:17px;font-weight:600;color:#FFFFFF;background:transparent;border:1px solid rgba(92,184,196,0.5);border-radius:8px;text-decoration:none;letter-spacing:0.3px;\">Contact Sales<\/a><\/div><\/div><\/div><\/div>\n\n<script>(function(){\n  var obs=new IntersectionObserver(function(entries){entries.forEach(function(e){if(e.isIntersecting)e.target.classList.add('visible');});},{threshold:0.1});\n  document.querySelectorAll('.po-fade').forEach(function(el){obs.observe(el);});\n})();\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>PLATFORM From Design to Operation.One Platform. From the first line of ship design through decades of ocean operation, the CYTUR platform embeds cybersecurity into every phase. 9 purpose-built solutions work seamlessly \u00a0across 4 lifecycle phases. Lifecycle Full Ship Lifecycle Security Sequentially connected from design to operation,with Intelligence supplying threat data to every phase. 01DesignThreat modeling [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2131","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Platform Overview - Cyber Trust &amp; Resilience for Maritime<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cytur.net\/platform-overview\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Platform Overview - Cyber Trust &amp; Resilience for Maritime\" \/>\n<meta property=\"og:description\" content=\"PLATFORM From Design to Operation.One Platform. From the first line of ship design through decades of ocean operation, the CYTUR platform embeds cybersecurity into every phase. 9 purpose-built solutions work seamlessly \u00a0across 4 lifecycle phases. Lifecycle Full Ship Lifecycle Security Sequentially connected from design to operation,with Intelligence supplying threat data to every phase. 01DesignThreat modeling [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cytur.net\/platform-overview\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Trust &amp; Resilience for Maritime\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-07T18:34:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cytur.net\/wp-content\/uploads\/2026\/03\/batch_main-card1.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cytur.net\\\/platform-overview\\\/\",\"url\":\"https:\\\/\\\/cytur.net\\\/platform-overview\\\/\",\"name\":\"Platform Overview - Cyber Trust &amp; Resilience for Maritime\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cytur.net\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cytur.net\\\/platform-overview\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cytur.net\\\/platform-overview\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cytur.net\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/batch_main-card1.png\",\"datePublished\":\"2026-03-25T00:38:42+00:00\",\"dateModified\":\"2026-04-07T18:34:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cytur.net\\\/platform-overview\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cytur.net\\\/platform-overview\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cytur.net\\\/platform-overview\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cytur.net\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/batch_main-card1.png\",\"contentUrl\":\"https:\\\/\\\/cytur.net\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/batch_main-card1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cytur.net\\\/platform-overview\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\ud648\",\"item\":\"https:\\\/\\\/cytur.net\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Platform Overview\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cytur.net\\\/#website\",\"url\":\"https:\\\/\\\/cytur.net\\\/\",\"name\":\"CYTUR Cyber Trust & Resilience for Maritime\",\"description\":\"End-to-End Cybersecurity for the Maritime Industry \uc120\ubc15 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc194\ub8e8\uc158 \ubc0f \ucee8\uc124\ud305 \uc804\ubb38 \uae30\uc5c5\",\"publisher\":{\"@id\":\"https:\\\/\\\/cytur.net\\\/#organization\"},\"alternateName\":\"CYTUR \uc2f8\uc774\ud130\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cytur.net\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cytur.net\\\/#organization\",\"name\":\"CYTUR\",\"alternateName\":\"CYTUR, \uc2f8\uc774\ud130\",\"url\":\"https:\\\/\\\/cytur.net\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cytur.net\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cytur.net\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/CYTUR_Logo.png\",\"contentUrl\":\"https:\\\/\\\/cytur.net\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/CYTUR_Logo.png\",\"width\":250,\"height\":250,\"caption\":\"CYTUR\"},\"image\":{\"@id\":\"https:\\\/\\\/cytur.net\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cytur\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Platform Overview - Cyber Trust &amp; Resilience for Maritime","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cytur.net\/platform-overview\/","og_locale":"en_US","og_type":"article","og_title":"Platform Overview - Cyber Trust &amp; Resilience for Maritime","og_description":"PLATFORM From Design to Operation.One Platform. From the first line of ship design through decades of ocean operation, the CYTUR platform embeds cybersecurity into every phase. 9 purpose-built solutions work seamlessly \u00a0across 4 lifecycle phases. Lifecycle Full Ship Lifecycle Security Sequentially connected from design to operation,with Intelligence supplying threat data to every phase. 01DesignThreat modeling [&hellip;]","og_url":"https:\/\/cytur.net\/platform-overview\/","og_site_name":"Cyber Trust &amp; Resilience for Maritime","article_modified_time":"2026-04-07T18:34:59+00:00","og_image":[{"url":"https:\/\/cytur.net\/wp-content\/uploads\/2026\/03\/batch_main-card1.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cytur.net\/platform-overview\/","url":"https:\/\/cytur.net\/platform-overview\/","name":"Platform Overview - Cyber Trust &amp; Resilience for Maritime","isPartOf":{"@id":"https:\/\/cytur.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cytur.net\/platform-overview\/#primaryimage"},"image":{"@id":"https:\/\/cytur.net\/platform-overview\/#primaryimage"},"thumbnailUrl":"https:\/\/cytur.net\/wp-content\/uploads\/2026\/03\/batch_main-card1.png","datePublished":"2026-03-25T00:38:42+00:00","dateModified":"2026-04-07T18:34:59+00:00","breadcrumb":{"@id":"https:\/\/cytur.net\/platform-overview\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cytur.net\/platform-overview\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cytur.net\/platform-overview\/#primaryimage","url":"https:\/\/cytur.net\/wp-content\/uploads\/2026\/03\/batch_main-card1.png","contentUrl":"https:\/\/cytur.net\/wp-content\/uploads\/2026\/03\/batch_main-card1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/cytur.net\/platform-overview\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\ud648","item":"https:\/\/cytur.net\/en\/"},{"@type":"ListItem","position":2,"name":"Platform Overview"}]},{"@type":"WebSite","@id":"https:\/\/cytur.net\/#website","url":"https:\/\/cytur.net\/","name":"CYTUR Cyber Trust & Resilience for Maritime","description":"End-to-End Cybersecurity for the Maritime Industry \uc120\ubc15 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc194\ub8e8\uc158 \ubc0f \ucee8\uc124\ud305 \uc804\ubb38 \uae30\uc5c5","publisher":{"@id":"https:\/\/cytur.net\/#organization"},"alternateName":"CYTUR \uc2f8\uc774\ud130","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cytur.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cytur.net\/#organization","name":"CYTUR","alternateName":"CYTUR, \uc2f8\uc774\ud130","url":"https:\/\/cytur.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cytur.net\/#\/schema\/logo\/image\/","url":"https:\/\/cytur.net\/wp-content\/uploads\/2026\/04\/CYTUR_Logo.png","contentUrl":"https:\/\/cytur.net\/wp-content\/uploads\/2026\/04\/CYTUR_Logo.png","width":250,"height":250,"caption":"CYTUR"},"image":{"@id":"https:\/\/cytur.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cytur"]}]}},"_links":{"self":[{"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/pages\/2131","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/comments?post=2131"}],"version-history":[{"count":10,"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/pages\/2131\/revisions"}],"predecessor-version":[{"id":2359,"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/pages\/2131\/revisions\/2359"}],"wp:attachment":[{"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/media?parent=2131"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}