Service Introduction

Cyber Security

Cyber Security

Anti-Malware(Endpoint)

Endpoint Detection & Response( Security Doctor / eGIS)

  • A next generation cyber solution that supports risk recognition and measures. It detects the cyber threats that entered PC by investigating the logs, and visualize the cyber risk of the organization.
  • Emergency alerts, regular computer diagnosis (visualization), and risk visualization.

 

Endpoint Protection Platform (Cylance Protect / Cylance )

Next-generation AI engine utilizing AI engine

Detect and prevent unknown malware before execution

  • High detection rate, also proven in holiday tests
  • Mechanism of predictive threat defense by AI (except from signature and behavior detection)
  • Block incoming malware anytime, anywhere (even offline)
  • Lightweight scanning that does not affect PC performance

 

DLP/ IT asset management

Data Loss Prevention  ( ObbligatoⅢ/  NEC )

  • It protects from taking out confidential data and drawings easily at low cost.
  • Prevent from leakage of sensitive information such as drawings!
  • It can achieve safe system of collaboration development with overseas branches by preventing technical information leakage from inside of the organization.

IT Asset Management (JP1( ITDM) / Hitachi)

IT assets of hardware and software can be collected automatically and managed efficiently and centrally. Our engineers can also compare and report monthly changes in IT assets under JP1. Significantly reduce your workload.

 

Prevention / Awareness /Education

Securing Awareness Training Service

Simulation training, where mock attacks are actually conducted, is an effective educational method to raise security awareness.

 

Vulnerability Assessment

For Web application

  • This is a assessment service that detects and analyzes security problems in web applications and reports countermeasures.
  • It checks for potential vulnerabilities in your web applications such as enhancing information disclosure or unauthorized access.
  • You can check whether the web application is safe before release judgment or in operation.

For Platform

  • It investigates security vulnerabilities that exist in platforms such as OS and middleware. Then we present security measures based on that.
  • We conduct our services with the utmost care to avoid overloads or system trouble due to assessment.
  • We recommend regular assessment such as once a year.

 

Security Consulting

Risk Assessment and Security planning

Emergency !!

Digital forensics

This is a method and technique for collecting, restoring, and analyzing logs that remain in electronic devices such as computers and networks. We will report the existence and possibility of information leakage. If you accurately grasp the actual situation of damage and take prompt action, it is possible to increase the credibility of your company.

Example of survey items

  • Access log analysis
  • In-house security log analysis
  • Mail log analysis
  • Check event log and setting file reverse engineering

 

Prevention / Awareness /Education

Security Education  ( E-learning)

We aim to strengthen the security of the organization with practical education support.

  • Literacy course for general employees
  • Accident response exercise course for management/crisis managers/department managers
  • Specialized course for system and security personnel

 

Contact us!

We’d love to speak with you. Leave us your details and one of our team members will be in touch soon.