security
Visonal
yamory (all-in-one vulnerability management cloud)
Implement all-layer vulnerability management for the entire organization, including apps/hosts/containers/clouds/network devices. Since yamory can detect and manage vulnerabilities in software used in IT systems, there is no need to cross multiple tools […]
Axio
Keyspider (cloud ID management tool)
It streamlines the work of information system personnel and realizes a secure ID management environment in line with the organizational structure of Japanese companies. With the automatic authorization function, it is possible to set IDs and services that can be used for each team, department, and position, so that each employee's ID can be set individually […]
Future Research Institute, TitaniumDefence Ltd,.(New Zealand)
AEGIS-EW (Cyber Security Vulnerability Diagnosis Tool)
It is possible to diagnose homepages and services provided to customers on the Internet, and easily obtain diagnostic results on where serious security risks exist. The threat level of cyber attacks is displayed in red and yellow colors. Passive scanning […]
NEC Networks & System Integration Corp., Trend Micro
5G network security operation service for Trend Micro Mobile Network Security
With functions such as IoT device authenticity check, intrusion prevention, web threat countermeasures, and abnormal communication detection, information that poses a threat to the local 5G network is detected and sent to the SOC (Security Operation Center). At SOC […]
Focus Systems, Fortinet Japan
OT security assessment service
We provide one-stop support for OT security measures, from consulting to implementation, construction, and operation, for customers who have security issues related to their factories. Three perspectives: ``Organization/People'', ``Operations'', and ``Technology''
Hitachi Astemo, Hitachi, Trend Micro
Basic technology for detecting and responding to cyberattacks on connected cars
In order to detect and respond to the occurrence and signs of cyber-attacks on connected cars, we have developed security measures for the inside of the car and connected platforms, as well as measures to continuously monitor them. The developed technology is: (1) Analytical cyber attack detection technology (vehicle system […]