Email Security - メーカー・企業と製品の一覧

Email Securityの製品一覧

1~8 件を表示 / 全 8 件

表示件数

Company Information [JSecurity Co., Ltd.]

Providing peace of mind for all businesses with security solutions recognized by the world!

JSecurity Co., Ltd. provides solutions that contribute to Japan's IT security under the slogan "All for Japan Security." We offer a lineup of email security products that address spam prevention, virus email protection, email sanitization, and measures against email misdelivery, as well as information security products for small and medium-sized enterprises that are affordable and easy to implement and operate. Our main business is the development and sales of information security products that cover a wide range from networks to endpoints. [Business Description] ■ Development and sales of information security products and services *For more details, please refer to the PDF document or feel free to contact us.*

  • Security Assessment

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Email Security "m-FILTER"

We provide a secure business environment with "m-FILTER," which only receives safe emails.

**"White Operation of m-FILTER"** The database of "m-FILTER" stores "IP addresses" and "email domains" of safe senders with over 99.90% reliability. Emails from safe senders registered in the database are received with minimal false positives, while emails from senders not registered in the database are assessed based on factors such as "macro presence" and "file extensions," allowing for accurate detection without oversight. **"Robust External Attack Countermeasures"** In addition to sender spoofing detection in white operations, it supports "SPF/DKIM/DAMRC" authentication, addressing email attacks with sophisticated sender spoofing. For attachment spoofing detection, it can assess files with macros and identify dangerous file extensions. It can also inspect the contents of password-protected ZIP files, which are frequently used in attacks. In category and content spoofing detection, it evaluates the URLs listed within the emails. **"Diverse Measures Against Misdelivery"** For outgoing emails, it is possible to flexibly set filtering rules tailored to the organization's operations based on criteria such as "what," "under what conditions," and "how."

  • Other Software

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Email Security "Matrix Scan APEX III"

Top-class spam and malware protection in Japan! Concentrated capture of Japan-specific spam emails to achieve a secure email environment.

The "Matrix Scan APEX III" is an email security appliance designed to combat spam emails and malware. The domestically developed "msec technology" is a patented proprietary technology. The variable algorithm used for detecting and determining spam emails evolves effectively against the ever-changing nature of spam. It focuses on capturing spam emails unique to Japan, ensuring a secure email environment. ■ Basic Functions - AI Anti-Spam (in-house developed engine) - AI Anti-Virus (in-house developed engine) - IP Reputation ■ Offered (Appliance) Models - Entry Model (Low Range Model) - 1U Rack Mount Type - Transparent type specification can be supported as an option (Bypass NIC) - Standard Model (Mid Range Model) - 1U Rack Mount Type - RAID1 - Bypass NIC transparent type support - Enterprise Model (High Range Model) - 1U Rack Mount Type - RAID10 - Bypass NIC transparent type support * Multi-unit configurations are supported for any of the models.

  • Other security systems
  • Other Software

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Free rental of evaluation machine [SPAMSNIPER]

SpamSniper Evaluation Machine Free Rental Service

We are offering the SpamSniper evaluation unit for free. Here is an introduction to the SpamSniper free evaluation unit rental service. ■□■Features■□■ ~ One device, four roles: SpamSniper's multi-layered defense ~ ■ Information leakage prevention ■ SMTP attack defense ■ Virus email blocking ■ Spam email blocking ■ There are no functional restrictions on the evaluation unit, so you can evaluate it in a real environment and according to actual operations. For other features and details, please contact us.

  • Other Software

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

[File Transfer Service Case Study] NEXCO Systems

Introducing a case study that achieved enhanced security and single sign-on with the internal information infrastructure! (Crypto Delivery)

We would like to introduce a case study of the implementation of "Crypto Delivery" at NEXCO Systems Co., Ltd., which is responsible for everything from the development to the operational management of core systems. The company received requests from customers to create a more secure file transmission system and proposed our cloud service product. By achieving ID/password integration with the existing internal authentication infrastructure, they significantly streamlined access management for approximately 5,300 accounts, leveraging the cost-effectiveness of the cloud while realizing robust and user-friendly email security. 【Benefits of Implementation】 ■ Enabled single sign-on with the internal authentication infrastructure, securely and efficiently managing ID/password operations for about 5,300 users. ■ Eliminated costs associated with the on-premises era, resulting in significant cost savings. ■ Achieved robust and user-friendly email security. *For more details, please refer to the PDF document or feel free to contact us.

  • Firewall
  • others

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

[Blog] Zero Trust Security Model for Email

Let's implement a security model of 'Trust but Verify'! Introduction to the blog.

Email threats are evolving beyond the delivery of malicious links and attachments. As a result, companies are beginning to apply a zero-trust security model to email. Nowadays, attackers may impersonate the sender to deceive the recipient and launch social engineering attacks. Most of these attacks do not involve sending malware, and since these emails do not contain identifiable dangerous elements, even advanced email security gateways and defenses can be easily bypassed. *You can view the detailed content of the blog through the related link. For more information, please feel free to contact us.*

  • Security Assessment

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Email Security "Vade for M365"

We will strengthen the email security of Microsoft 365, which is prone to attacks.

"Vade for M365" is a cutting-edge email security solution that has been adopted by the filtering services of the three major carriers in Japan. Utilizing over 1 billion mailbox data, which is among the largest in the world, our AI-driven threat detection capabilities and architecture that resolves the challenges of traditional email security all come together with simple operations through API integration with Microsoft 365. We invite you to experience it. [Features] ■ Overcoming challenges of existing email security ■ High detection rate ■ Simple verification, implementation, and operational management *For more details, please download the PDF or feel free to contact us.

  • Other security systems
  • Security Assessment

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

The necessity of email security

You may be required to provide all your information! Over 90% of cyber crimes are triggered by emails!

Email-based attacks have been a popular target for cybercriminals since the early stages of email proliferation, as they can be relatively easy to create and execute. These include common email security threats to consumers and businesses, such as "phishing," "malware," and "business email compromise." Since email serves as an attack vector, protecting email has become crucial for the health, reputation, and future of companies and organizations. [Summary of Damage] ■ Most threats involve "phishing for personal information." ■ The number of phishing scams increased in 2020 → Increased internet usage at home due to the COVID-19 pandemic. ■ Used in ransomware and targeted attacks → Viruses embedded in email attachments or links. ■ Sophistication of business email compromise (BEC) → Content has become more sophisticated (e.g., related to COVID-19), making it difficult to spot unnatural elements. *For more details, please refer to the PDF document or feel free to contact us.

  • Firewall
  • Other security systems
  • Security Assessment

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録