weranaOS · Web-based Security Platform · Now Live
from one browser.
Security teams access everything through a browser — no desktop software needed. Deploy the Sentry Agent (eBPF) on monitored hosts for kernel-level visibility across Kubernetes, Containers, and Hosts.
See the actual product
Veluna
Every cloud asset, visible in one view
Automatically discover all cloud assets across Kubernetes, Containers, and Host/VMs. Monitor security classifications, runtime detections, and vulnerability status in real time.
- Auto asset discovery
- Security classification
- Real-time sync

Five challenges that keep
security teams up at night
Zero Trust
Even internal traffic can't be trusted anymore
Can you verify what's flowing between containers, APIs, and microservices in real time? In a cloud-native environment without a defined perimeter, every connection must be validated.
Asset Visibility & Classification
You can't protect what you can't see
After cloud migration, can you instantly answer how many assets you have and what their security classifications are? You can't protect what you can't see.
Security Audit & Compliance
Good security means nothing if you can't prove it
ISMS, CC certification, public cloud security compliance. Auditors demand evidence of actual controls. Do you have an explainable security posture?
N2SF Transition
Re-classify all our data from scratch. Where do we even begin?
Korea's 20-year network separation mandate ends. A new C/S/O data-classification framework with differentiated security controls begins. Are you ready for the new paradigm?
Incident Response
Containers Disappear in Seconds
Ransomware, APT, insider threats. When an ephemeral container is deleted, so is the evidence. You need to detect, isolate, and forensicate in real time.
What fills the gap left by network separation
is real visibility and control
N2SF compliance doesn't require introducing something new. It's about connecting with your existing security tools to fill the blind spots they couldn't see.
"The security N2SF demands — we've been doing it all along."
Five Technical Foundations
Every WERANA capability is built on these five technical principles.
Collect directly from the kernel
eBPF Kernel-Level
Execute programs directly in the OS kernel to collect all system activity. No process can evade observation.
- Complete kernel syscall tracing
- Real-time process creation & termination detection
- File access & modification event capture
- Network socket-level tracking
- Minimal performance overhead (< 3%)
Every layer from L4 to L7
Full-Stack Visibility
Transparently observe and analyze communications across all network layers — from L4 TCP/UDP traffic to L7 HTTP, gRPC, and SSL.
- Full L4–L7 network visibility
- SSL/TLS certificate validity verification
- HTTP·gRPC·DNS protocol analysis
- Container east-west traffic visibility
- Service mesh (Istio·Calico) integration
Detect threats from behavior
Behavioral Threat Detection
Learn normal behavior baselines and identify threat patterns in real time from collected data. From seeing everything to finding threats.
- Automatic behavioral baseline learning
- Real-time APT & ransomware pattern detection
- Kernel exploit & privilege escalation detection
- Sensitive file access & exposed secret detection
- Instant anomaly blocking & alerting
Posture management & regulatory compliance
Compliance Automation
Continuously audit misconfigurations, vulnerabilities, and exposed secrets, and automatically map them to regulatory requirements. Always audit-ready.
- Automated cloud asset misconfiguration auditing
- CVE-based vulnerability detection & prioritization
- Automated regulatory requirement mapping
- Control evidence auto-collection & retention
- Compliance status dashboard
Real-time policy application & response
Runtime Policy Enforcement
Detection is just the beginning. Block threats instantly, isolate containers, and trigger automated responses in coordination with AI Agent.
- Real-time network traffic blocking
- Automatic threat container isolation
- File & process execution policy enforcement
- Instant security event alerting & escalation
- AI Agent integration for automated response (in development)
Supported Environments
Find out if your environment
has blind spots right now
In a 30-minute demo with no installation required, we'll assess the visibility level of your current infrastructure.
Unified platform based on CSPM · CWPP · CNAPP · ASM · CTEM · Built on eBPF technology