{"id":3472,"date":"2026-04-13T17:10:50","date_gmt":"2026-04-13T08:10:50","guid":{"rendered":"https:\/\/cytur.net\/cytur-sc\/"},"modified":"2026-04-13T17:15:33","modified_gmt":"2026-04-13T08:15:33","slug":"cytur-sc","status":"publish","type":"page","link":"https:\/\/cytur.net\/en\/cytur-sc\/","title":{"rendered":"CYTUR-SC"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"3472\" class=\"elementor elementor-3472 elementor-3459\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c5d3220 e-flex e-con-boxed e-con e-parent\" data-id=\"c5d3220\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5cefe0a elementor-widget elementor-widget-html\" data-id=\"5cefe0a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<div style=\"background:#0A0E1A;overflow-x:hidden;\">\n<style>\n\/* \u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\n   CYTUR-SC\u2122 Product Page \u2014 English\n   Prefix: .sc-  |  Last updated: 2026-04-13\n   \u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550 *\/\n.sc-wrap{max-width:1280px;margin:0 auto;padding:0 40px;font-family:'Pretendard Variable',-apple-system,'Noto Sans',,sans-serif;color:#C9CED6;box-sizing:border-box;}\n.sc-section{padding:100px 0;border-bottom:1px solid rgba(255,255,255,0.04);text-align:center;}\n.sc-section:last-child{border-bottom:none;}\n.sc-fade{opacity:0;transform:translateY(40px);transition:opacity 0.8s ease,transform 0.8s ease;}\n.sc-fade.visible{opacity:1;transform:translateY(0);}\n.sc-d1{transition-delay:0.1s;}.sc-d2{transition-delay:0.2s;}.sc-d3{transition-delay:0.3s;}.sc-d4{transition-delay:0.4s;}\n.sc-label{display:inline-block;font-size:13px;font-weight:600;letter-spacing:2.5px;text-transform:uppercase;color:#5CB8C4;margin-bottom:16px;padding:6px 16px;border:1px solid rgba(92,184,196,0.25);border-radius:4px;background:rgba(92,184,196,0.06);}\n.sc-h1{font-size:48px;font-weight:800;color:#FFF;line-height:1.15;margin-bottom:12px;}\n.sc-h2{font-size:36px;font-weight:700;color:#FFF;line-height:1.2;margin-bottom:16px;}\n.sc-body{font-size:18px;color:#A0AEC0;line-height:1.8;}\n.sc-cyan{color:#5CB8C4;}.sc-white{color:#FFF;}\n\n\/* Hero *\/\n.sc-hero{position:relative;min-height:520px;display:flex;align-items:center;overflow:hidden;padding:160px 0 100px;}\n.sc-hero-bg{position:absolute;inset:0;overflow:hidden;}\n.sc-hero-circle{position:absolute;top:50%;left:50%;border-radius:50%;border:1px solid rgba(92,184,196,0.06);transform:translate(-50%,-50%);}\n.sc-hero-line{position:absolute;top:50%;left:0;right:0;height:1px;background:linear-gradient(90deg,transparent,rgba(92,184,196,0.08) 50%,transparent);}\n.sc-hero-glow{position:absolute;top:30%;right:5%;width:400px;height:400px;background:radial-gradient(circle,rgba(26,86,219,0.08) 0%,transparent 70%);border-radius:50%;}\n.sc-hero-content{position:relative;z-index:2;text-align:center;}\n.sc-hero-sub{font-size:24px;color:#5CB8C4;font-weight:500;margin-bottom:24px;}\n.sc-hero-desc{font-size:20px;color:#A0AEC0;line-height:1.8;max-width:800px;margin:0 auto;}\n.sc-phase-tag{display:inline-block;font-size:12px;font-weight:700;padding:4px 12px;border-radius:4px;background:rgba(26,86,219,0.15);color:#5CB8C4;letter-spacing:1px;margin-bottom:16px;}\n\n\/* Need (2 cards) *\/\n.sc-need-grid{display:grid;grid-template-columns:1fr 1fr;gap:24px;margin-top:48px;}\n.sc-need-card{background:rgba(255,255,255,0.02);border:1px solid rgba(255,255,255,0.06);border-radius:12px;padding:32px 28px;transition:border-color 0.3s;text-align:left;}\n.sc-need-card:hover{border-color:rgba(229,62,62,0.3);}\n.sc-need-icon{font-size:32px;margin-bottom:16px;}\n.sc-need-title{font-size:20px;font-weight:700;color:#E53E3E;margin-bottom:12px;line-height:1.4;word-break:break-word;}\n.sc-need-desc{font-size:18px;color:#A0AEC0;line-height:1.75;word-break:break-word;}\n\n\/* Benefits (3 numbered) *\/\n.sc-ben-list{display:flex;flex-direction:column;gap:32px;margin-top:48px;}\n.sc-ben-item{display:grid;grid-template-columns:80px 1fr;gap:32px;align-items:start;padding:36px 32px;background:rgba(255,255,255,0.02);border:1px solid rgba(255,255,255,0.06);border-radius:12px;transition:border-color 0.3s;text-align:left;}\n.sc-ben-item:hover{border-color:rgba(92,184,196,0.2);}\n.sc-ben-num{font-size:48px;font-weight:800;color:rgba(92,184,196,0.55);line-height:1;}\n.sc-ben-tag{display:inline-block;font-size:13px;font-weight:700;padding:4px 12px;border-radius:4px;margin-bottom:12px;letter-spacing:0.5px;}\n.sc-tag-blue{background:rgba(26,86,219,0.15);color:#5CB8C4;}\n.sc-tag-green{background:rgba(72,187,120,0.15);color:#48BB78;}\n.sc-tag-purple{background:rgba(159,122,234,0.15);color:#9F7AEA;}\n.sc-ben-title{font-size:22px;font-weight:700;color:#FFF;margin-bottom:12px;line-height:1.35;}\n.sc-ben-body{font-size:18px;color:#A0AEC0;line-height:1.75;}\n\n\/* Features (4 image+text rows) *\/\n.sc-feat-list{display:flex;flex-direction:column;gap:48px;margin-top:48px;}\n.sc-feat-row{display:grid;grid-template-columns:1fr 1fr;gap:48px;align-items:center;padding:36px 32px;background:rgba(255,255,255,0.02);border:1px solid rgba(255,255,255,0.06);border-radius:12px;transition:border-color 0.3s;text-align:left;}\n.sc-feat-row:hover{border-color:rgba(92,184,196,0.2);}\n.sc-feat-row>div{min-width:0;}\n.sc-feat-row:nth-child(even){direction:rtl;}\n.sc-feat-row:nth-child(even)>*{direction:ltr;}\n.sc-feat-img{width:100%;border-radius:8px;}\n.sc-feat-title{font-size:22px;font-weight:700;color:#FFF;margin-bottom:8px;line-height:1.3;}\n.sc-feat-sub{font-size:16px;color:#5CB8C4;font-weight:500;margin-bottom:16px;}\n.sc-feat-desc{font-size:18px;color:#A0AEC0;line-height:1.75;word-break:break-word;}\n\n\/* Use Cases *\/\n.sc-uc-list{display:flex;flex-direction:column;gap:28px;margin-top:48px;}\n.sc-uc-card{display:grid;grid-template-columns:48px 1fr;gap:24px;padding:36px 32px;background:rgba(255,255,255,0.02);border:1px solid rgba(255,255,255,0.06);border-radius:12px;transition:border-color 0.3s;text-align:left;}\n.sc-uc-card:hover{border-color:rgba(92,184,196,0.2);}\n.sc-uc-card>div{min-width:0;}\n.sc-uc-icon{width:48px;height:48px;border-radius:10px;background:rgba(92,184,196,0.1);display:flex;align-items:center;justify-content:center;font-size:22px;}\n.sc-uc-title{font-size:22px;font-weight:700;color:#FFF;margin-bottom:12px;word-break:break-word;}\n.sc-uc-grid{display:grid;grid-template-columns:1fr 1fr 1fr;gap:16px;margin-top:16px;min-width:0;}\n.sc-uc-block{padding:16px;min-width:0;background:rgba(255,255,255,0.02);border-radius:8px;border-left:3px solid rgba(92,184,196,0.3);}\n.sc-uc-block-title{font-size:14px;font-weight:700;color:#5CB8C4;margin-bottom:6px;letter-spacing:0.5px;}\n.sc-uc-block-desc{font-size:16px;color:#A0AEC0;line-height:1.7;word-break:break-word;}\n\n\/* Certification *\/\n.sc-cert-row{display:flex;gap:48px;align-items:stretch;justify-content:center;margin-top:40px;flex-wrap:wrap;}\n.sc-cert-item{display:flex;align-items:center;gap:16px;padding:20px 28px;background:rgba(255,255,255,0.03);border:1px solid rgba(255,255,255,0.08);border-radius:12px;flex:1;max-width:400px;justify-content:center;}\n.sc-cert-name{font-size:16px;font-weight:700;color:#FFF;}\n.sc-cert-desc{font-size:14px;color:#A0AEC0;}\n\n\/* CTA *\/\n.sc-cta{text-align:center;padding:80px 0 100px;}\n.sc-cta-btn{display:inline-block;padding:16px 48px;font-size:18px;font-weight:700;color:#FFF;background:linear-gradient(135deg,#1A56DB,#5CB8C4);border-radius:8px;text-decoration:none;transition:transform 0.3s,box-shadow 0.3s;font-family:'Pretendard Variable',sans-serif;}\n.sc-cta-btn:hover{transform:translateY(-2px);box-shadow:0 8px 32px rgba(26,86,219,0.3);}\n.sc-cta-outline{background:transparent;border:1px solid rgba(92,184,196,0.4);color:#5CB8C4;}\n.sc-cta-outline:hover{border-color:#5CB8C4;box-shadow:0 8px 32px rgba(92,184,196,0.15);}\n\n\/* Tablet *\/\n@media(max-width:1024px){\n  .sc-wrap{padding:0 24px;}.sc-section{padding:72px 0;}.sc-h1{font-size:36px;}.sc-h2{font-size:28px;}\n  .sc-need-grid{grid-template-columns:1fr;}\n  .sc-feat-row{grid-template-columns:1fr;gap:24px;}\n  .sc-feat-row:nth-child(even){direction:ltr;}\n  .sc-ben-item{grid-template-columns:60px 1fr;gap:20px;padding:28px 24px;}\n  .sc-uc-grid{grid-template-columns:1fr;}\n}\n\/* Mobile *\/\n@media(max-width:767px){\n  .sc-wrap{padding:0 20px;}.sc-section{padding:56px 0;}\n  .sc-hero{min-height:auto;padding:80px 0 48px;}\n  .sc-hero-bg{display:none;}.sc-hero-content{max-width:100%;}\n  .sc-h1{font-size:36px;}.sc-h2{font-size:22px;}\n  .sc-hero-sub{font-size:18px;}.sc-hero-desc{font-size:15px;}\n  .sc-need-title{font-size:17px;}.sc-need-desc{font-size:14px;}\n  .sc-ben-title{font-size:17px;}.sc-ben-body{font-size:14px;}.sc-ben-num{font-size:30px;}\n  .sc-ben-item{grid-template-columns:1fr;gap:12px;padding:24px 20px;}\n  .sc-feat-title{font-size:17px;}.sc-feat-desc{font-size:14px;}.sc-feat-sub{font-size:13px;}\n  .sc-uc-title{font-size:17px;}.sc-uc-block-desc{font-size:13px;}.sc-uc-block-title{font-size:12px;}\n  .sc-uc-card{grid-template-columns:1fr;gap:16px;}.sc-uc-icon{margin-bottom:4px;}\n  .sc-body{font-size:14px;}.sc-cta-btn{font-size:15px;padding:14px 32px;}\n  .sc-cert-row{flex-direction:column;gap:16px;}\n  .sc-cert-item{max-width:100%;padding:16px 20px;gap:16px;display:flex;align-items:center;}\n  .sc-cert-item img[alt=\"ClassNK\"]{height:22px!important;}\n  .sc-cert-item img[alt=\"RINA\"]{height:40px!important;}\n}\n<\/style>\n\n<!-- \u2550\u2550 HERO \u2550\u2550 -->\n<div class=\"sc-hero\">\n  <div class=\"sc-hero-bg\">\n    <div class=\"sc-hero-circle\" style=\"width:800px;height:800px;\"><\/div>\n    <div class=\"sc-hero-circle\" style=\"width:500px;height:500px;border-color:rgba(26,86,219,0.08);\"><\/div>\n    <div class=\"sc-hero-circle\" style=\"width:200px;height:200px;border-color:rgba(92,184,196,0.1);\"><\/div>\n    <div class=\"sc-hero-line\"><\/div>\n    <div class=\"sc-hero-glow\"><\/div>\n  <\/div>\n  <div class=\"sc-wrap sc-hero-content\">\n    <div class=\"sc-fade\"><span class=\"sc-phase-tag\">VERIFY<\/span><\/div>\n    <div class=\"sc-fade sc-d1\">\n      <h1 class=\"sc-h1\">CYTUR-SC\u2122<\/h1>\n      <p class=\"sc-hero-sub\">Scanner<br>Vessel, Asset & Network Portable Scanner<\/p>\n    <\/div>\n    <div class=\"sc-fade sc-d2\">\n      <p class=\"sc-hero-desc\">A portable security integrity verification solution that automatically discovers all assets connected to complex vessel networks and performs deep analysis for hidden vulnerabilities. It identifies and classifies even <strong class=\"sc-white\">undetectable shadow devices<\/strong>, objectively verifying the vessel's security posture.<\/p>\n    <\/div>\n  <\/div>\n<\/div>\n\n<!-- \u2550\u2550 \uc81c\ud488 \ud544\uc694\uc131 \u2550\u2550 -->\n<div class=\"sc-section\"><div class=\"sc-wrap\">\n  <div class=\"sc-fade\"><span class=\"sc-label\">Why You Need It<\/span><h2 class=\"sc-h2\">Why a <span class=\"sc-cyan\">Portable Security Scanner<\/span> Is Essential<\/h2><\/div>\n  <div class=\"sc-need-grid\">\n    <div class=\"sc-need-card sc-fade sc-d1\"><div class=\"sc-need-icon\">\ud83d\udccb<\/div><div class=\"sc-need-title\">Overcoming Manual Inspection Limitations<\/div><div class=\"sc-need-desc\">With the proliferation of smart vessels and rapidly increasing onboard equipment, manual inspections are not only extremely time-consuming and costly but inevitably create security blind spots due to data omissions.<\/div><\/div>\n    <div class=\"sc-need-card sc-fade sc-d2\"><div class=\"sc-need-icon\">\ud83d\udcdc<\/div><div class=\"sc-need-title\">Mandatory Compliance with IACS UR E26\/E27<\/div><div class=\"sc-need-desc\">Under IACS regulations mandatory since July 2024, all newbuilds must verify the security integrity of onboard critical systems (CBS) before delivery and submit results to classification societies. CYTUR-SC\u2122 automatically scans installed equipment to inspect vulnerabilities and configurations, generating objective technical evidence for the required 'field verification'.<\/div><\/div>\n  <\/div>\n<\/div><\/div>\n\n<!-- \u2550\u2550 \uae30\ub300 \ud6a8\uacfc \u2550\u2550 -->\n<div class=\"sc-section\"><div class=\"sc-wrap\">\n  <div class=\"sc-fade\"><span class=\"sc-label\">Key Benefits<\/span><h2 class=\"sc-h2\">The Value <span class=\"sc-cyan\">CYTUR-SC\u2122<\/span> Delivers<\/h2><\/div>\n  <div class=\"sc-ben-list\">\n    <div class=\"sc-ben-item sc-fade sc-d1\"><div class=\"sc-ben-num\">01<\/div><div><span class=\"sc-ben-tag sc-tag-blue\">Cost Reduction<\/span><div class=\"sc-ben-title\">Secure Operational Stability Through Proactive Defect Resolution<\/div><div class=\"sc-ben-body\">By identifying and resolving security defects before vessel delivery, dramatically reduces massive repair costs during actual operations and proactively prevents operational disruption risks.<\/div><\/div><\/div>\n    <div class=\"sc-ben-item sc-fade sc-d2\"><div class=\"sc-ben-num\">02<\/div><div><span class=\"sc-ben-tag sc-tag-green\">Full Visibility<\/span><div class=\"sc-ben-title\">Complete Asset Discovery Including Hidden Shadow Devices<\/div><div class=\"sc-ben-body\">Conducts comprehensive surveys of all control systems under actual operational conditions, building a transparent management framework that includes devices missing from inventories and temporarily connected equipment.<\/div><\/div><\/div>\n    <div class=\"sc-ben-item sc-fade sc-d3\"><div class=\"sc-ben-num\">03<\/div><div><span class=\"sc-ben-tag sc-tag-purple\">Management Efficiency<\/span><div class=\"sc-ben-title\">Automated Real-Time Network Change Tracking<\/div><div class=\"sc-ben-body\">Manages frequent equipment additions and changes during sea trials through automated scanning instead of manual labor, tracking and controlling all network changes.<\/div><\/div><\/div>\n  <\/div>\n<\/div><\/div>\n\n<!-- \u2550\u2550 \uc8fc\uc694 \uae30\ub2a5 \u2550\u2550 -->\n<div class=\"sc-section\"><div class=\"sc-wrap\">\n  <div class=\"sc-fade\"><span class=\"sc-label\">Core Features<\/span><h2 class=\"sc-h2\">Core <span class=\"sc-cyan\">Capabilities<\/span><\/h2><\/div>\n  <div class=\"sc-feat-list\">\n    <div class=\"sc-feat-row sc-fade sc-d1\">\n      <img decoding=\"async\" src=\"https:\/\/cytur.net\/wp-content\/uploads\/2026\/04\/SC-1.png\" alt=\"Fast & Accurate Vessel Equipment Discovery\" class=\"sc-feat-img\">\n      <div><div class=\"sc-feat-title\">Fast & Accurate Vessel Equipment Discovery<\/div><div class=\"sc-feat-sub\">Automated Asset Identification<\/div><div class=\"sc-feat-desc\">Simply enter the network address to instantly discover all connected equipment (CBS). Automatically matches device names, manufacturers, and OS information without additional software installation, finding even hidden devices invisible to the naked eye to build a complete asset inventory.<\/div><\/div>\n    <\/div>\n    <div class=\"sc-feat-row sc-fade sc-d2\">\n      <img decoding=\"async\" src=\"https:\/\/cytur.net\/wp-content\/uploads\/2026\/04\/SC-2.png\" alt=\"24\/7 Automated Security Scan Scheduling\" class=\"sc-feat-img\">\n      <div><div class=\"sc-feat-title\">24\/7 Automated Security Scan Scheduling<\/div><div class=\"sc-feat-sub\">Schedule-Based Automation<\/div><div class=\"sc-feat-desc\">Schedule security scans at desired times. Even if equipment powers off and restarts, scans automatically resume according to schedule, maintaining continuous security status without data gaps throughout extended sea trial periods.<\/div><\/div>\n    <\/div>\n    <div class=\"sc-feat-row sc-fade sc-d3\">\n      <img decoding=\"async\" src=\"https:\/\/cytur.net\/wp-content\/uploads\/2026\/04\/SC-3.png\" alt=\"Equipment History Management & Integrated Control\" class=\"sc-feat-img\">\n      <div><div class=\"sc-feat-title\">Equipment History Management & Integrated Control<\/div><div class=\"sc-feat-sub\">Change History Tracking<\/div><div class=\"sc-feat-desc\">Manages all scan results and equipment data in an integrated list format. Tracks inspection history to verify at a glance when equipment was added and how it changed, proving inventory consistency throughout the entire process from construction to delivery.<\/div><\/div>\n    <\/div>\n    <div class=\"sc-feat-row sc-fade sc-d4\">\n      <img decoding=\"async\" src=\"https:\/\/cytur.net\/wp-content\/uploads\/2026\/04\/SC-4.png\" alt=\"Data-Driven Security Vulnerability Diagnosis\" class=\"sc-feat-img\">\n      <div><div class=\"sc-feat-title\">Data-Driven Security Vulnerability Diagnosis<\/div><div class=\"sc-feat-sub\">Vulnerability Analysis & Mitigation<\/div><div class=\"sc-feat-desc\">Precisely inspects discovered equipment for security vulnerabilities and unnecessary connections. Cross-references the latest security databases to pinpoint risks, provides specific mitigation recommendations for identified weaknesses, and serves as objective technical evidence for class certification.<\/div><\/div>\n    <\/div>\n  <\/div>\n<\/div><\/div>\n\n<!-- \u2550\u2550 \ud65c\uc6a9 \uc0ac\ub840 \u2550\u2550 -->\n<div class=\"sc-section\"><div class=\"sc-wrap\">\n  <div class=\"sc-fade\"><span class=\"sc-label\">Use Cases<\/span><h2 class=\"sc-h2\">Application <span class=\"sc-cyan\">Scenarios<\/span><\/h2><\/div>\n  <div class=\"sc-uc-list\">\n    <div class=\"sc-uc-card sc-fade sc-d1\"><div class=\"sc-uc-icon\">\ud83d\udd0d<\/div><div><div class=\"sc-uc-title\">Pre-Delivery Equipment Verification: Security Integrity Before Installation<\/div><div class=\"sc-uc-grid\"><div class=\"sc-uc-block\"><div class=\"sc-uc-block-title\">Scenario<\/div><div class=\"sc-uc-block-desc\">Before physically installing equipment on vessels, shipyards or suppliers connect CYTUR-SC\u2122 during the configuration stage to pre-scan assets<\/div><\/div><div class=\"sc-uc-block\"><div class=\"sc-uc-block-title\">Proactive Response<\/div><div class=\"sc-uc-block-desc\">Identifies potential vulnerabilities within devices in advance, verifying that security configurations are completed according to design before installation<\/div><\/div><div class=\"sc-uc-block\"><div class=\"sc-uc-block-title\">Expected Outcome<\/div><div class=\"sc-uc-block-desc\">Prevents equipment with security defects from being installed on vessels, reducing post-installation remediation costs<\/div><\/div><\/div><\/div><\/div>\n    <div class=\"sc-uc-card sc-fade sc-d2\"><div class=\"sc-uc-icon\">\ud83d\udc7b<\/div><div><div class=\"sc-uc-title\">Asset Management Automation: Shadow Device Discovery<\/div><div class=\"sc-uc-grid\"><div class=\"sc-uc-block\"><div class=\"sc-uc-block-title\">Scenario<\/div><div class=\"sc-uc-block-desc\">Activates automated scanning in complex vessel network environments with thousands of intertwined IT\/OT devices<\/div><\/div><div class=\"sc-uc-block\"><div class=\"sc-uc-block-title\">Proactive Response<\/div><div class=\"sc-uc-block-desc\">Automatically discovers and classifies unidentified shadow assets connected to the network without authorization but missing from the inventory<\/div><\/div><div class=\"sc-uc-block\"><div class=\"sc-uc-block-title\">Expected Outcome<\/div><div class=\"sc-uc-block-desc\">Achieves complete control and visibility over all onboard equipment that is impractical to verify manually<\/div><\/div><\/div><\/div><\/div>\n    <div class=\"sc-uc-card sc-fade sc-d3\"><div class=\"sc-uc-icon\">\ud83d\udd27<\/div><div><div class=\"sc-uc-title\">Security Remediation: Vulnerability Resolution & Compliance Check<\/div><div class=\"sc-uc-grid\"><div class=\"sc-uc-block\"><div class=\"sc-uc-block-title\">Scenario<\/div><div class=\"sc-uc-block-desc\">Performs detailed inspections of security weaknesses (open ports, outdated software, etc.) found in identified assets<\/div><\/div><div class=\"sc-uc-block\"><div class=\"sc-uc-block-title\">Proactive Response<\/div><div class=\"sc-uc-block-desc\">After implementing system-recommended mitigations, performs re-scans to confirm threats have been completely eliminated<\/div><\/div><div class=\"sc-uc-block\"><div class=\"sc-uc-block-title\">Expected Outcome<\/div><div class=\"sc-uc-block-desc\">Ensures stability by delivering systems or transitioning to operations only after security has been verified<\/div><\/div><\/div><\/div><\/div>\n    <div class=\"sc-uc-card sc-fade sc-d4\"><div class=\"sc-uc-icon\">\ud83d\udea2<\/div><div><div class=\"sc-uc-title\">Final Pre-Delivery Verification: Proving Security Reliability for Ship Owners<\/div><div class=\"sc-uc-grid\"><div class=\"sc-uc-block\"><div class=\"sc-uc-block-title\">Scenario<\/div><div class=\"sc-uc-block-desc\">After construction completion, performs final full network scans with portable CYTUR-SC\u2122 during sea trials or immediately before delivery<\/div><\/div><div class=\"sc-uc-block\"><div class=\"sc-uc-block-title\">Proactive Response<\/div><div class=\"sc-uc-block-desc\">Conducts comprehensive surveys of network configurations that may have changed during installation and newly added equipment security status<\/div><\/div><div class=\"sc-uc-block\"><div class=\"sc-uc-block-title\">Expected Outcome<\/div><div class=\"sc-uc-block-desc\">Provides confidence through objective scan data that the vessel is 'cyber-security verified and safe', supporting smooth and secure operations<\/div><\/div><\/div><\/div><\/div>\n  <\/div>\n<\/div><\/div>\n\n<!-- \u2550\u2550 \uc778\uc99d \u2550\u2550 -->\n<div class=\"sc-section\"><div class=\"sc-wrap\" style=\"text-align:center;\">\n  <div class=\"sc-fade\"><span class=\"sc-label\">Certifications<\/span><h2 class=\"sc-h2\">International Class <span class=\"sc-cyan\">Certifications<\/span><\/h2><\/div>\n  <div class=\"sc-cert-row sc-fade sc-d1\">\n    <div class=\"sc-cert-item\"><div style=\"width:100px;flex-shrink:0;display:flex;align-items:center;justify-content:center;\"><img decoding=\"async\" src=\"https:\/\/cytur.net\/wp-content\/uploads\/2026\/03\/batch_trusted_classnk.webp\" alt=\"ClassNK\" style=\"height:28px;width:auto;\"><\/div><div style=\"text-align:left;\"><div class=\"sc-cert-name\">Innovation Endorsement<\/div><div class=\"sc-cert-desc\">for Product & Solution 2025<\/div><\/div><\/div>\n    <div class=\"sc-cert-item\"><div style=\"width:100px;flex-shrink:0;display:flex;align-items:center;justify-content:center;\"><img decoding=\"async\" src=\"https:\/\/cytur.net\/wp-content\/uploads\/2026\/03\/batch_trusted_RINA-Brand-Guidelines-21-short-logo.webp\" alt=\"RINA\" style=\"height:48px;width:auto;\"><\/div><div style=\"text-align:left;\"><div class=\"sc-cert-name\">NovelTech.Approval<\/div><div class=\"sc-cert-desc\">Marine Cyber Security<\/div><\/div><\/div>\n  <\/div>\n<\/div><\/div>\n\n<!-- \u2550\u2550 CTA \u2550\u2550 -->\n<div class=\"sc-cta\"><div class=\"sc-wrap\"><div class=\"sc-fade\">\n  <h2 class=\"sc-h2\">Start <span class=\"sc-cyan\">Objective Verification<\/span> of Vessel Security<\/h2>\n  <p class=\"sc-body\" style=\"margin-bottom:40px;\">Want to learn more about CYTUR-SC\u2122? Request a consultation today.<\/p>\n  <div style=\"display:flex;gap:16px;justify-content:center;flex-wrap:wrap;\">\n    <a href=\"\/en\/book-a-demo\/\" class=\"sc-cta-btn\">Book a Demo<\/a>\n    <a href=\"\/en\/contact-sales\/\" class=\"sc-cta-btn sc-cta-outline\">Contact Sales<\/a>\n  <\/div>\n<\/div><\/div><\/div>\n\n<script>\n(function(){\n  const obs=new IntersectionObserver((entries)=>{\n    entries.forEach(e=>{if(e.isIntersecting){e.target.classList.add('visible');obs.unobserve(e.target);}});\n  },{threshold:0.15});\n  document.querySelectorAll('.sc-fade').forEach(el=>obs.observe(el));\n})();\n<\/script>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>VERIFY CYTUR-SC\u2122 ScannerVessel, Asset &#038; Network Portable Scanner A portable security integrity verification solution that automatically discovers all assets connected to complex vessel networks and performs deep analysis for hidden vulnerabilities. It identifies and classifies even undetectable shadow devices, objectively verifying the vessel&#8217;s security posture. Why You Need It Why a Portable Security Scanner Is [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3472","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CYTUR-SC - Cyber Trust &amp; Resilience for Maritime<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cytur.net\/en\/cytur-sc\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CYTUR-SC - Cyber Trust &amp; Resilience for Maritime\" \/>\n<meta property=\"og:description\" content=\"VERIFY CYTUR-SC\u2122 ScannerVessel, Asset &#038; Network Portable Scanner A portable security integrity verification solution that automatically discovers all assets connected to complex vessel networks and performs deep analysis for hidden vulnerabilities. It identifies and classifies even undetectable shadow devices, objectively verifying the vessel&#8217;s security posture. Why You Need It Why a Portable Security Scanner Is [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cytur.net\/en\/cytur-sc\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Trust &amp; Resilience for Maritime\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-13T08:15:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cytur.net\/wp-content\/uploads\/2026\/04\/SC-1.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cytur.net\\\/en\\\/cytur-sc\\\/\",\"url\":\"https:\\\/\\\/cytur.net\\\/en\\\/cytur-sc\\\/\",\"name\":\"CYTUR-SC - Cyber Trust &amp; Resilience for Maritime\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cytur.net\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cytur.net\\\/en\\\/cytur-sc\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cytur.net\\\/en\\\/cytur-sc\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cytur.net\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/SC-1.png\",\"datePublished\":\"2026-04-13T08:10:50+00:00\",\"dateModified\":\"2026-04-13T08:15:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cytur.net\\\/en\\\/cytur-sc\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cytur.net\\\/en\\\/cytur-sc\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cytur.net\\\/en\\\/cytur-sc\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cytur.net\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/SC-1.png\",\"contentUrl\":\"https:\\\/\\\/cytur.net\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/SC-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cytur.net\\\/en\\\/cytur-sc\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\ud648\",\"item\":\"https:\\\/\\\/cytur.net\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CYTUR-SC\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cytur.net\\\/#website\",\"url\":\"https:\\\/\\\/cytur.net\\\/\",\"name\":\"CYTUR Cyber Trust & Resilience for Maritime\",\"description\":\"End-to-End Cybersecurity for the Maritime Industry \uc120\ubc15 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc194\ub8e8\uc158 \ubc0f \ucee8\uc124\ud305 \uc804\ubb38 \uae30\uc5c5\",\"publisher\":{\"@id\":\"https:\\\/\\\/cytur.net\\\/#organization\"},\"alternateName\":\"CYTUR \uc2f8\uc774\ud130\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cytur.net\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cytur.net\\\/#organization\",\"name\":\"CYTUR\",\"alternateName\":\"CYTUR, \uc2f8\uc774\ud130\",\"url\":\"https:\\\/\\\/cytur.net\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cytur.net\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cytur.net\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/CYTUR_Logo.png\",\"contentUrl\":\"https:\\\/\\\/cytur.net\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/CYTUR_Logo.png\",\"width\":250,\"height\":250,\"caption\":\"CYTUR\"},\"image\":{\"@id\":\"https:\\\/\\\/cytur.net\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cytur\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CYTUR-SC - Cyber Trust &amp; Resilience for Maritime","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cytur.net\/en\/cytur-sc\/","og_locale":"en_US","og_type":"article","og_title":"CYTUR-SC - Cyber Trust &amp; Resilience for Maritime","og_description":"VERIFY CYTUR-SC\u2122 ScannerVessel, Asset &#038; Network Portable Scanner A portable security integrity verification solution that automatically discovers all assets connected to complex vessel networks and performs deep analysis for hidden vulnerabilities. It identifies and classifies even undetectable shadow devices, objectively verifying the vessel&#8217;s security posture. Why You Need It Why a Portable Security Scanner Is [&hellip;]","og_url":"https:\/\/cytur.net\/en\/cytur-sc\/","og_site_name":"Cyber Trust &amp; Resilience for Maritime","article_modified_time":"2026-04-13T08:15:33+00:00","og_image":[{"url":"https:\/\/cytur.net\/wp-content\/uploads\/2026\/04\/SC-1.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cytur.net\/en\/cytur-sc\/","url":"https:\/\/cytur.net\/en\/cytur-sc\/","name":"CYTUR-SC - Cyber Trust &amp; Resilience for Maritime","isPartOf":{"@id":"https:\/\/cytur.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cytur.net\/en\/cytur-sc\/#primaryimage"},"image":{"@id":"https:\/\/cytur.net\/en\/cytur-sc\/#primaryimage"},"thumbnailUrl":"https:\/\/cytur.net\/wp-content\/uploads\/2026\/04\/SC-1.png","datePublished":"2026-04-13T08:10:50+00:00","dateModified":"2026-04-13T08:15:33+00:00","breadcrumb":{"@id":"https:\/\/cytur.net\/en\/cytur-sc\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cytur.net\/en\/cytur-sc\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cytur.net\/en\/cytur-sc\/#primaryimage","url":"https:\/\/cytur.net\/wp-content\/uploads\/2026\/04\/SC-1.png","contentUrl":"https:\/\/cytur.net\/wp-content\/uploads\/2026\/04\/SC-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/cytur.net\/en\/cytur-sc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\ud648","item":"https:\/\/cytur.net\/en\/"},{"@type":"ListItem","position":2,"name":"CYTUR-SC"}]},{"@type":"WebSite","@id":"https:\/\/cytur.net\/#website","url":"https:\/\/cytur.net\/","name":"CYTUR Cyber Trust & Resilience for Maritime","description":"End-to-End Cybersecurity for the Maritime Industry \uc120\ubc15 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc194\ub8e8\uc158 \ubc0f \ucee8\uc124\ud305 \uc804\ubb38 \uae30\uc5c5","publisher":{"@id":"https:\/\/cytur.net\/#organization"},"alternateName":"CYTUR \uc2f8\uc774\ud130","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cytur.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cytur.net\/#organization","name":"CYTUR","alternateName":"CYTUR, \uc2f8\uc774\ud130","url":"https:\/\/cytur.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cytur.net\/#\/schema\/logo\/image\/","url":"https:\/\/cytur.net\/wp-content\/uploads\/2026\/04\/CYTUR_Logo.png","contentUrl":"https:\/\/cytur.net\/wp-content\/uploads\/2026\/04\/CYTUR_Logo.png","width":250,"height":250,"caption":"CYTUR"},"image":{"@id":"https:\/\/cytur.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cytur"]}]}},"_links":{"self":[{"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/pages\/3472","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/comments?post=3472"}],"version-history":[{"count":4,"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/pages\/3472\/revisions"}],"predecessor-version":[{"id":3484,"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/pages\/3472\/revisions\/3484"}],"wp:attachment":[{"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/media?parent=3472"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}