Vulnerability Assessment Service×CIC - メーカー・企業と製品の一覧

Vulnerability Assessment Serviceの製品一覧

1~3 件を表示 / 全 3 件

表示件数

Seclore Rights Management

You can easily define and remotely control detailed usage policies.

Our company offers 'Seclore Rights Management', which can protect confidential information regardless of device or location. Files are stored across a wide range of media, including servers, emails, and mobile devices, but unauthorized users cannot access the information. Additionally, since the usage policy remains effective once granted to a file, it enables the safe use of cloud services, BYOD, and external collaboration. 【Features】 ■ Policy Federation ■ Bulk Update ■ Protection of Various Files *For more details, please download the PDF or feel free to contact us.

  • 企業:CIC
  • 価格:Other
  • Database
  • Other Software

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Information Security Services

For matters related to information security, please contact our company.

Our company provides information security services. We effectively combine our long-standing expertise in the development and operation of information systems with our knowledge of information security to propose appropriate and efficient support that meets our customers' needs. Please feel free to contact us if you have any requests. 【Service Contents】 ■ Consulting / Audit Support ■ Vulnerability Assessment / Risk Assessment Support ■ Education / Training Support ■ Information System Development Support *For more details, please download the PDF or feel free to contact us.

  • 企業:CIC
  • 価格:Other
  • Security Assessment
  • WAF

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Targeted Attack Email Response Training Service

We offer various training on security.

We provide training for responding to targeted phishing emails. Targeted phishing emails are cleverly disguised and are characterized by appearing to be legitimate. It is effective to regularly conduct training to firmly establish the points to check in emails and to make this a habit. Please feel free to contact us if you have any requests. 【Flow of Targeted Phishing Email Response Training】 1. Pre-training 2. Sending targeted phishing emails (within the scope of our service) 3. Detection of response errors (within the scope of our service) 4. Reporting detection results (within the scope of our service) 5. Post-training 6. Survey *For more details, please download the PDF or feel free to contact us.

  • 企業:CIC
  • 価格:Other
  • others

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録