1~45 item / All 46 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationBefore making an inquiry
Download PDF1~45 item / All 46 items
Medical institutions handle very sensitive personal information, such as medical history. While measures to prevent information leaks remain an important ongoing issue, there has been a recent surge in cyberattacks. The entry point for these attacks is often the remote maintenance lines prepared for handling issues. In this blog, we will provide a detailed explanation of the current security situation surrounding medical institutions and potential solutions, incorporating case studies from hospitals. [Contents] 1) The current security situation surrounding medical institutions 2) Case study (Initiatives at Hospital A) <Challenge> The remote maintenance line is a "security loophole" <Countermeasure> Establishing access control and monitoring systems with SecureCube Access Check <Effect> Streamlining remote maintenance-related tasks and reducing the workload of responsible personnel 3) Achieving a safe and secure society with SecureCube AccessCheck *For more details, please refer to the related links.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationRecently, the use of cloud storage has become common. There are many free options available, and the choices have diversified. On the other hand, when it comes to corporate use, there are concerns about security, which is something to consider. This column explains the basic knowledge and security points that corporations should keep in mind when choosing cloud storage. [Contents] ■ Is it okay to use free cloud storage for free? ■ Points to consider regarding collaboration platform-type cloud storage ■ File sharing for administrators who absolutely do not want to fail ■ What services are suitable for simple file transfer and sharing for corporations? *You can view the detailed content of the blog through the related links.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWhen choosing corporate services for secure file sharing, cloud storage has recently become a popular option. However, if used inappropriately for its intended purpose, it can expose you to security risks. This column explains the risks and solutions associated with using cloud storage for corporate file sharing. [Contents] ■ Issues with using cloud storage for file sharing - Data remains stored indefinitely in cloud storage - Can easily become a chaotic "lawless zone" if left unattended - Services that are continuously used may change ■ What services enable safe file sharing for corporations *You can view the detailed content of the blog through the related links.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWhat kind of file transfer service is suitable for handling highly confidential information such as personal and technical data? In this column, we will explain the points to consider when choosing a file transfer service with a focus on security, aimed at corporate administrators seeking high security. [Contents] ■ Why you shouldn't choose based on comparison charts ■ Create a unique checklist for your company, not a generic comparison chart ■ Let's take a look at other companies' checklists ■ What file transfer services with high security standards have been continuously chosen by the financial industry *For more details, you can view the related links.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationEmail misdelivery is mostly due to minor human errors. On the other hand, it is always cited as a leading security incident. It is a highly risky issue that can lead to serious accidents. This column explains what to consider when addressing email misdelivery, effective countermeasures, and how to respond when a misdelivery actually occurs. [Contents] - Why does email misdelivery persist? - What are effective measures against misdelivery? - What to do when a misdelivery occurs *For more details, you can view the related links.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationIs it acceptable to use cloud storage for file sharing in business? This column explains the correct way to choose cloud storage and the risks to consider, aimed at IT personnel who are struggling with selecting file-sharing tools. Additionally, it provides foundational knowledge on file servers, cloud storage, and file sharing, which IT personnel should be familiar with, explained from a historical perspective. [Contents] ■ What is the origin of cloud storage? - The dawn of on-premises file servers - The emergence and spread of the cloud - Is there any issue with file sharing using cloud storage? ■ Recommended tools for simple file transfer and sharing *You can view the detailed content of the blog through the related links.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationFile transfer services come in various paid options for businesses, and there are also many free services available for individuals. Additionally, there is a noticeable opinion that "for file transfers, shared services like online storage are sufficient." So, which option is the correct one to use? In this column, we will provide a detailed explanation from basic knowledge to recommended services. [Contents] ■ Is it okay to use free services? ■ What is the difference between file transfer and file sharing? - Characteristics of file sharing services - Characteristics of file transfer services - Which is more suitable for corporate use? ■ High-security file transfer services that receive strong support from the financial industry *You can view the detailed content of the blog through the related links.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe spread of file sharing has brought renewed attention to "IRM (Information Rights Management)." IRM is a system that encrypts files and grants operation permissions to individual users, while also tracking usage at the destination. In this column, we will explain the fundamental knowledge, the background that necessitates it, and the points to consider when implementing IRM, which has become increasingly recognized as important with the proliferation of cloud storage and other technologies. [Contents] ■ The background for the attention on IRM and what can be done with IRM ■ The features of IRM that allow management of files even after they are sent *For more detailed content, please refer to the related links.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe handling of My Number information (specific personal information) is strictly regulated by law. On the other hand, there are many means of transfer besides mailing and face-to-face interactions. As a business, how can we comply with the rules while also improving efficiency? NRI Secure offers a free guidebook that summarizes key points to consider in an easy-to-understand manner. Please feel free to download it. *This column includes excerpts from the guidebook. [Contents] ■ Is email attachment permissible? ■ What are the points to be cautious about when outsourcing? ■ Three essential conditions when using file transfer services. *You can view more details on the blog through the related links. *For more information, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationInformation leaks and system outages due to cyber attacks and internal misconduct. As these threats increase, it is essential to thoroughly manage the high-privilege IDs (privileged IDs) used by system administrators to prevent serious incidents. "Access Check Essential" is a solution that focuses on three essential functions for privileged ID access control (access control, log acquisition and storage, audit support) and offers them at a low price. Since complex operational design and configuration are not required, you can quickly take the first step in privileged ID management at a low cost and within a short period. It is suitable for starting with the minimum necessary controls towards robust privileged ID management. 【Benefits】 ◎ You can start access control and evidence acquisition immediately. ◎ It minimizes the operational burden on administrators. ◎ It reduces the initial implementation costs. ★ We are currently offering explanatory materials for new system administrators that summarize basic knowledge about privileged ID management. *For more details about this solution, please refer to the related links.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationA VDR (Virtual Data Room) is a space for storing and sharing digital documents in a virtual environment such as the cloud. Originally, it has been used in limited industries and applications, such as the medical field and M&A (mergers and acquisitions). However, recently, companies in other industries seem to be considering its implementation. What are the differences and advantages compared to cloud storage and file-sharing services? This article provides a detailed explanation of the basic knowledge of VDRs, their origins, and key points to consider before implementation. [Contents] - What is a VDR (Virtual Data Room)? - VDRs used for special purposes - What are the scenarios where VDRs can be used across industries? - How to prevent mismatches with VDR services? *For more details, you can view the related links. *You can download materials for the secure file exchange service "Crypto-bin." *For more information, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationIn Japan, the leading cause of security incidents is always attributed to misdirected emails. The risks are clear, yet cases of using email for the exchange of personal information continue unabated. This must be a headache for security personnel in companies. In this article, we will clarify the issues with email, the background of incidents and accidents, and areas for improvement. Additionally, we will introduce appropriate means for sending personal information as alternatives to email. [Contents] ■ Misdirected emails ranked as "No. 1 incident/accident in the past year" ■ Why is email not sufficient? ■ The misconception that "encryption makes it safe" ■ What services are acceptable for the transfer of personal information? ■ Safely handling personal information: Corporate file transfer service "Crypto Delivery" * For more details, you can view the related links. * You can download materials for the secure file exchange service "Crypto Delivery." * For more information, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce a case study of ONE COMPATH Co., Ltd., which operates one of the largest electronic flyer services in Japan, implementing "SecureCube Access Check." In their services, the company utilizes this product to appropriately manage permissions during infrastructure setup, application testing, and release operations. Even amidst the transition to a telework environment due to the impact of the COVID-19 pandemic, they have conducted upgrades and are managing the permissions of administrators working from home appropriately. 【Case Overview】 ■Implementation Partner: ONE COMPATH Co., Ltd. ■Implemented Product: SecureCube Access Check ■Implementation Benefits ・Operations can continue smoothly even during telework ・Reduction in the workload and effort for management personnel *For more details, please refer to the related links or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce the case of Idemitsu Kosan Co., Ltd., which has implemented "SecureCube Access Check" for centralized management of personal IDs and logs. One of the features of the "Financial Instruments and Exchange Act," which was applied starting in the fiscal year 2008 in accordance with the U.S. Sarbanes-Oxley Act (SOX), is the clear incorporation of internal controls related to information systems. As a major company in oil refining and sales, Idemitsu Kosan has adopted this product for access management to its information system infrastructure as one of its measures to comply with this regulation. This has enabled them to achieve efficient security management economically. 【Case Overview】 ■ Client: Idemitsu Kosan Co., Ltd. ■ Product Implemented: SecureCube Access Check ■ Implementation Effects - Strengthened security regarding access to numerous servers in the information system infrastructure - Significant cost reduction - Achieved efficient operations *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce the case of Tokyu Card Co., Ltd., which implemented the high-privilege (privileged ID) management solution "SecureCube Access Check." In 2015, the company began efforts to comply with the PCI DSS security standards for credit card information protection in order to establish a more secure card usage environment. They introduced our product as their ID management tool, further strengthening their security management system and enhancing security awareness. 【Case Overview】 ■ Client: Tokyu Card Co., Ltd. ■ Product Implemented: SecureCube Access Check ■ Implementation Effects: - Achieved strong access control as required by PCI DSS - Significantly improved security awareness across the organization *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce a case study of Internet Initiative Japan Inc., which implemented the privileged ID access management tool "SecureCube Access Check." The company adopted this product in 2014 to integrate and manage internal access to approximately 27,000 nodes of servers located on-premises and in a private cloud. This has enabled robust information security based on strict and flexible access control. 【Case Overview】 ■ Implementing Company: Internet Initiative Japan Inc. ■ Implemented Product: SecureCube Access Check ■ Implementation Benefits ・Complete digitization of access management ・Significant improvement in the accuracy and efficiency of audit tasks *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce a case where Tower Records, Inc., which provides music-related products and services, has implemented the cloud-based privileged ID access management solution "Cloud Auditor by Access Check." The company migrated its on-premises privileged ID management tool for its e-commerce site to this product. This has resulted in significant efficiency improvements in system audit compliance and an enhancement in security levels. Additionally, in terms of operations, they have been freed from the cumbersome tasks of regular version upgrades, allowing them to create a system foundation for future business development. 【Case Overview】 ■ Client: Tower Records, Inc. ■ Product Implemented: Cloud Auditor by Access Check ■ Implementation Effects ・Easily meets stringent audit compliance levels ・Operational tasks have been drastically reduced to almost zero *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce a case study of the implementation of "Crypto Delivery" at Mitsubishi Pencil Co., Ltd. The company utilizes this product in their workflow for the design application process on writing instruments to ensure safe and reliable data transmission. Previously, large data files that could not be sent via email were copied to MO and exchanged by mail, which could take several days to complete a single process. However, after implementing this product, it has become common to complete tasks within the same day. [Key Points] - There is anxiety about not being able to confirm whether the email has been "successfully received" by the recipient, along with concerns about the potential leakage of commercial design information. - Large files can be sent and received safely and reliably without the need for system development, making it relatively inexpensive to use. - It is a highly reliable system that is web browser-based, making it easy to operate and increasing business speed. *For more details, please refer to the related links or feel free to contact us.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce a case study of the implementation of "Crypto Delivery" at Aozora Bank, Inc., which provides unique and highly specialized financial services to its customers. To ensure more secure file transmission to clients and others, the bank adopted this product in 2018. Not only does it encrypt and send important data such as customer information, but it also implements advanced security management systems required by financial institutions, including audit functions in case of emergencies. 【Key Points】 ■ Sends all documents, including large files, encrypted with TLS ■ Achieves secure file transfer suitable for financial institutions ■ In addition to enhancing security, strengthens and revamps the "file transfer system" from a business control perspective ■ Received feedback exceeding expectations after implementation, already deployed in 22 internal departments and 3 group companies *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationTo Aflac Life Insurance Co., Ltd., which provides insurance products and services, we would like to introduce a case study of the implementation of "Crypto Delivery." The company adopted our product as a more secure method for the transfer of customer information and other data, coinciding with the enforcement of the Personal Information Protection Law. They completely eliminated the use of CD-ROMs and USB drives, significantly minimizing the risk of information leakage while also achieving a substantial reduction in the operational burden of media management. [Key Points] - Complete elimination of data transfer via physical media - Reduced risk of information leakage and media management burden - Encryption features that meet the necessary security levels for insurance companies - Implementation of the AES encryption standard, which is the U.S. encryption standard *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce a case study of the implementation of "Crypto Delivery" at Dai-ichi Life Card Service Co., Ltd., which is engaged in payment collection services and credit card business. In the payment collection business, the company handles approximately 1.7 million transfer operations annually for about 1,300 companies, requiring extremely high information security for the vast amount of personal information exchanged. To address this, the company has introduced the "Crypto Delivery Autopilot Option." This has enabled a more robust personal information protection system and significant reductions in operational costs through automation. 【Key Points】 - Elimination of the need to manage physical media for data transmission that was previously outsourced, resulting in an annual cost reduction of 2 million yen. - Direct integration of business systems with Crypto Delivery via API, greatly improving the efficiency of sending and receiving operations. - Reduction in incidents specific to physical media, lowering indirect costs of system operations and the psychological burden on personnel. *For more details, please refer to the PDF document or feel free to contact us.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce a case study of the implementation of "Crypto Delivery" at NEXCO Systems Co., Ltd., which is responsible for everything from the development to the operational management of core systems. The company received requests from customers to create a more secure file transmission system and proposed our cloud service product. By achieving ID/password integration with the existing internal authentication infrastructure, they significantly streamlined access management for approximately 5,300 accounts, leveraging the cost-effectiveness of the cloud while realizing robust and user-friendly email security. 【Benefits of Implementation】 ■ Enabled single sign-on with the internal authentication infrastructure, securely and efficiently managing ID/password operations for about 5,300 users. ■ Eliminated costs associated with the on-premises era, resulting in significant cost savings. ■ Achieved robust and user-friendly email security. *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce a case study of InfoScience Co., Ltd., which has implemented our high-privilege ID (privileged ID) management solution, "SecureCube Access Check." The company has integrated our product with a unified log management tool for managing access and security of servers used by customers utilizing their hosting services. They have achieved secure log management that includes data utilization by collecting and storing not only access records but also various logs generated from system operations, and issuing management reports by aggregating this data. 【Case Overview】 ■ Implementation Partner: InfoScience Co., Ltd. ■ Implemented Product: SecureCube Access Check ■ Implementation Benefits ・Centralized management of server logs regardless of the number of servers ・Hybrid operation with both cloud and on-premises is also possible *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce a case study of the implementation of "Crypto Delivery" at Sumitomo Life Insurance Mutual Company. Until now, the company has exchanged various business information with client companies using FD and MO, but the exchange of information via electronic media has been cumbersome and improvements are desired from the perspective of information security. Therefore, the company introduced our product starting in January 2015. In addition to reducing the costs and efforts associated with data transfer, the company has utilized features such as the "Closed Group" function, which allows file exchanges only among designated users, to establish a more efficient and robustly secured data transfer system. [Key Points] - Utilized the "Closed Transmission Function" for the transfer of personal information - Minimized the risk of information leakage due to misdelivery - Confirmed advantages in both security and cost aspects *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce a case study of implementing "Crypto Delivery" at ROBOT PAYMENT Inc., which provides payment processing services specialized for subscription-based services. The company used physical media such as USB memory sticks to transfer credit card information between client companies. This made it difficult to respond quickly and raised concerns about the risks of loss and theft. By adopting our product, which complies with the PCI DSS security standards in the credit card industry, they aim to reduce labor and operational costs. 【Key Points】 - Transition from transferring credit card information via USB memory to a speedy online transfer. - Adoption of a service that complies with PCI DSS and has a proven track record with many financial institutions, ensuring high-level security. - Implementation of secure operations through access restrictions limited to specific members and device authentication. *For more details, please refer to the related links or feel free to contact us.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationOn November 17, 2020, Takeya Hirai, the Minister for Digital Reform, announced at a regular press conference that the use of "password-protected zip files" by central government employees when sending documents and other data via email would be abolished. This is likely to become a social issue involving private companies as well, and an increasing number of companies may struggle with essential security measures for file transmission to replace the current PPAP operation. Our blog explains why the PPAP operation does not provide encryption that guarantees security levels and what should be done to ensure security levels. [Contents] - What is a password-protected zip file (PPAP operation)? - Why is the PPAP operation problematic? - Why does the PPAP operation persist? - How should files be sent securely? - Summary *You can view the detailed content of the blog through the related links. Please feel free to contact us for more information. *You can download materials for the secure file exchange service "Crypto-bin."
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationIn order to prevent the spread of the new coronavirus, many companies are continuing to implement telework. To maintain business operations under telework, there may be situations where important files, such as contracts, invoices, and documents containing customer personal information, are shared using cloud services. However, when using cloud services that have not been utilized before, security concerns may arise. On our blog, we explain the means and challenges of "file sharing" during telework, as well as solutions for IT personnel who are struggling with this issue. [Contents] ■ Means and challenges of file sharing in telework ■ Approaches to solving file sharing challenges in telework ■ For corporate file transfer/sharing, use "Crypto-bin" ■ Summary * You can view the detailed content of the blog through the related links. For more information, please feel free to contact us. * You can download materials for the secure file exchange service "Crypto-bin."
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWhat are the most threatening events for your company? According to our research, many Japanese companies report that targeted attacks and information leaks due to internal misconduct are the most significant threats they face. To protect against these threats, it is necessary to reduce risks through a multi-layered defense that combines various security measures. One of the important countermeasures in this regard is "proper management of privileged IDs." Therefore, our blog clearly explains the importance of "privileged ID management" and approaches to it. [Content Overview] ■ What is a privileged ID? ■ Risks associated with improper management of privileged IDs ■ Incident examples due to inadequate management of privileged IDs ■ Best practices for privileged ID management ■ Conclusion *For more details, you can view the blog through the related link. Please feel free to contact us for more information. *You can download materials for the privileged ID access management solution "SecureCube Access Check."
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationIn recent years, more companies have been introducing and utilizing telework, such as remote work from home. As it allows for effective use of time and location, it has become common to see people working remotely not just from home, but also from coffee stands in the city and shared offices. In light of the recent COVID-19 pandemic, an increasing number of companies are considering telework as part of their business continuity plans (BCP) in the event of natural disasters or incidents, and are looking to expand the scope of telework-related tasks. Therefore, on our company blog, we explain what system administrators should consider when conducting their work remotely as telework becomes more widespread. [Content Overview] - Three essential elements for a location-independent system maintenance environment - System management during telework using SecureCube Access Check - Summary *You can view the detailed content of the blog through the related links. Please feel free to contact us for more information. *You can download materials on the privileged ID access management solution 'SecureCube Access Check.'
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationDue to the impact of the COVID-19 pandemic, many companies have implemented telework to avoid contact with others as much as possible. On the other hand, there are challenges arising from the inability to communicate face-to-face due to telework, such as difficulties in understanding how other employees, partner company employees, and IT vendors are conducting their work, and whether there are any security issues. In our company's blog, we focus on "privileged ID management," which is used for system maintenance, and introduce the risks and countermeasures related to the use of privileged IDs in telework. [Contents] ■ Challenges of using privileged IDs in telework ■ Key points for managing privileged IDs in telework ■ Examples of utilizing privileged ID management solutions in telework ■ Conclusion * You can view the detailed content of the blog through the related links. Please feel free to contact us for more information. * You can download materials for the privileged ID access management solution "SecureCube Access Check."
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationIn recent years, due to the rampant spread of the new coronavirus, companies have been strongly encouraged to adopt telework. While there is a desire to promote telework, there may be individuals who feel anxious about how to address security incidents and accidents. Our company's blog focuses on "privileged ID management," a security measure aimed at preventing the leakage of IDs and passwords, which often trigger many security incidents and accidents. We explain the differences in "methods" of privileged ID management and the selection points for privileged ID products, taking into account their respective advantages and disadvantages. [Contents] ■ Are administrator accounts and root accounts under threat? ■ What is a privileged ID? ■ [Comparison] Differences in methods of privileged ID management products ■ New trends in privileged ID management products ■ In conclusion ■ About SecureCube Access Check *Detailed content of the blog can be viewed through the related links. Please feel free to contact us for more information. *You can download materials for the privileged ID access management solution "SecureCube Access Check."
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationAs the utilization of the cloud progresses, the vague anxieties that many have felt about "using the cloud" are diminishing. However, on the other hand, many companies may still harbor concerns about security, wondering if they can adequately address issues such as the leakage, loss, or unauthorized access of important data. In our blog, we focus on the user's responsibility and introduce methods for managing privileged IDs that users should be aware of when using the cloud. [Contents] - Security considerations in the cloud - Privileged IDs that should be managed within the user's responsibility - Examples of utilizing privileged ID management tools in cloud usage - Conclusion *You can view the detailed content of the blog through the related links. Please feel free to contact us for more information. *You can download materials for the privileged ID access management solution "SecureCube Access Check."
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationIn recent years, due to the rampant spread of the new coronavirus, companies have been encouraged to adopt telework. There may have been discussions about how to manage the administrator ID/passwords that were previously used only within the company. How should the management of privileged IDs, which are different from regular IDs, be conducted? In our company's blog, we particularly focus on the "differences in ID management methods" for privileged IDs and introduce key points to consider when selecting privileged ID products, taking into account the advantages and disadvantages of manual operations. [Contents] ■ What are the "differences in ID management methods" for privileged ID management? ■ Let's try using privileged ID management products ■ Conclusion * For more details on the blog content, you can view it through the related links. Please feel free to contact us for more information. * You can download materials for the privileged ID access management solution 'SecureCube Access Check'.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationNRI Secure Insight 2020 published by NRI Secure. We conducted a "Survey on the State of Information Security in Companies" targeting companies in Japan, the United States, and Australia, and found significant differences in the understanding and awareness of information security among Japanese companies. In our blog, we explain specific solutions for internal fraud response measures and key points, based on the differences in awareness regarding the security controls of outsourced partners and potential cases that may arise. [Contents] ■ Current status and reality of security measures in Japanese companies ■ Cases of information leakage due to internal fraud ■ Three security measures to prevent information leakage caused by internal fraud ■ Effective solutions for security measures against information leakage due to internal fraud: "Privileged ID Management" ■ Conclusion *Detailed content of the blog can be viewed through the related links. For more information, please feel free to contact us. *You can download materials for the privileged ID access management solution "SecureCube Access Check."
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationIncidents of information leakage due to internal misconduct continue to occur without end. Once again, we should review our measures to prevent information leakage by insiders within the organization. Measures against internal misconduct should not only make it technically impossible to commit such acts but also encompass various aspects such as physical management and employee compliance. Our company's blog organizes the perspectives on internal misconduct measures and provides explanations based on specific examples of countermeasures. Please make use of this for reviewing internal misconduct measures within your organization. 【Contents】 ■Introduction ■About Internal Misconduct ■Examples of Internal Misconduct Measures ■Conclusion *You can view the detailed content of the blog through the related links. For more information, please feel free to contact us. *You can download materials for the privileged ID access management solution "SecureCube Access Check."
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationDue to the rapid global expansion of telework in recent times, it has become possible to access areas that were previously protected by boundaries. Additionally, with the recent globalization, companies are interacting with numerous businesses both domestically and internationally, leading to more opportunities to access information from domestic and international data centers and utilize SaaS services. The era where it was sufficient for a company to protect its own security has shifted to a necessity for implementing security measures that span the supply chain. Our blog focuses on access management and explains best practices for supply chain management. [Contents] ■ What is a supply chain? ■ Threats to the supply chain ■ Best practices for access management ■ Effective products and solutions for access management ■ Summary *You can view detailed content of the blog through the related links. Please feel free to contact us for more information. *You can download materials for the privileged ID access management solution "SecureCube Access Check."
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe international security standard "PCI DSS" for businesses that handle credit cards is scheduled to undergo a major version upgrade from the current version 3.2.1 to 4.0 for the first time in about eight years. Many businesses and merchants are constantly pressed to comply with PCI DSS. Furthermore, the prospect of adapting to the new version may leave many feeling overwhelmed. In our blog, we review the overview of PCI DSS and explain key points for maintaining security levels while streamlining operations from the perspective of access management and log management experts. For those who are about to start working on PCI DSS compliance, we hope this serves as a reference for future-oriented measures. [Contents] ■ What is PCI DSS ■ Reasons why maintaining PCI DSS compliance is difficult ■ How to maintain PCI DSS compliance security standards ■ Summary *Detailed content of the blog can be viewed via the related link. *You can download materials for the privileged ID access management solution "SecureCube Access Check."
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"SecureCube Access Check" is a privileged ID management solution that protects critical systems from attacks with robust access control. It also supports internal controls such as IT general controls and PCI DSS. It reduces implementation costs with a configuration that does not impact existing systems. Even for large-scale systems, it allows for a small start and early deployment. All functionalities, from work requests to audits, are provided in a single solution. We have implemented this solution for various customers across industries, including manufacturing, financial institutions, and distribution, and have received high praise for our detailed maintenance and support system unique to in-house development, as well as for feature enhancements that reflect customer feedback. [Features] ■ Achieves high security with minimal effort ■ Eliminates fraudulent activities in critical systems ■ Streamlines and reduces labor in audit operations ■ Supports internal controls such as IT general controls and PCI DSS *For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis document introduces the proper handling of specific personal information and the methods for corporations to transfer My Number. It includes explanations of physical and technical security management measures, as well as the advantages and issues of transfer methods such as email, fax, and registered mail. Additionally, it discusses the three essential conditions for file transfer services and the safe and secure collection of My Number using "Crypto Delivery." We encourage you to read it. [Contents] ■ Introduction ■ 1. Proper handling of specific personal information ■ 2. Advantages and issues of transfer methods ■ 3. The choice of "file transfer services" ■ Conclusion *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationIn this document, we will consider the secure transfer of files and introduce approaches to problem-solving through actual case studies. We will provide a detailed explanation of the risks associated with file transfers, including the use of email, the careless use of free services, and the improper handling of My Number. Additionally, we will present case studies from various industries, including Company A, an IT specialist firm; Company B, which operates in the credit card business; and Company C, a manufacturer. We encourage you to read it. [Contents] ■ Introduction ■ 1. Risks associated with file transfers ■ 2. Use cases categorized by issues ■ <Reference> Why you should not choose based on comparison tables? *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"Crypto Delivery" is a cloud service that facilitates file exchange through a dedicated server equipped with robust security measures. Since it uses a web browser, there is no need to build a new system. It offers menus in Japanese, English, and Chinese, allowing for smooth file exchanges with overseas companies. Equipped with high security features unique to information security specialist companies, it is adopted by many businesses, including banks. With "Crypto Delivery," you can safely and easily transition from zip files! ■ No need for dedicated terminals or software ■ Combines the usability of email with security ■ Abundant measures against misdelivery and security risks ■ Proven track record in high-security-required companies such as banks
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis document introduces the four basic steps of privileged ID management that information system administrators should know once they become administrators. Starting with "System Management and Privileged IDs," it details "Risks Associated with Privileged ID Usage," "Basics of Privileged ID Management," and "Challenges in Privileged ID Management," using diagrams for clarity. When assigned as a system administrator, it is advisable to review whether your company's privileged ID management is implementing these four basic steps. Furthermore, if there are challenges in daily operations regarding management burden, costs, or management accuracy, consider implementing a privileged ID management solution to enhance the overall productivity of system management. 【Contents (Excerpt)】 ■ Introduction ■ System Management and Privileged IDs ■ Risks Associated with Privileged ID Usage ■ Basics of Privileged ID Management ■ Challenges in Privileged ID Management *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe duties of system administrators require them to maintain and operate information systems that support business activities, even in situations where they cannot commute to the office due to natural disasters such as extreme weather or large-scale incidents. In this document, we focus on the tasks of system administrators, which are being reevaluated as part of BCP (Business Continuity Planning) in light of the spread of telework, and we explain three key points to consider when performing these tasks remotely. We encourage you to read it. [Contents (excerpt)] ■ Introduction ■ 1. Three essential elements for a location-independent system maintenance environment - Point 1: Establish a remote access environment - Point 2: Review the application flow for paper-based processes - Point 3: Record and verify the tasks performed *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe support the implementation of the 'SCADAfence Platform,' a solution for monitoring and detecting cyber attacks on industrial IoT systems. The 'SCADAfence Platform' can be integrated into existing networks through passive network monitoring using mirror ports and networks, and it has a proven track record of deployment in large-scale sites, including factories with over 20,000 devices, primarily in the automotive and electronics sectors in Europe and the United States. 【Features】 ■ Visualization of "assets to be protected" ■ Learning, analysis, and storage of communication content ■ Anomaly detection and recovery/improvement *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationOur company offers one-stop support for PSIRT, including not only the planning of construction but also assistance in the preparation of PSIRT-related documents, security threat and incident analysis, support for obtaining Achilles certification, assessments, training, incident response support, and operational evaluations. Please feel free to contact us if you have any requests. *PSIRT refers to an organization that manages risks related to security vulnerabilities in products manufactured or sold by the company and responds to emergencies during security incidents. While CSIRTs have also become widespread, the difference from CSIRTs is that PSIRTs are security response organizations specifically for IoT products and IoT services provided to customers. [Examples of Services Offered] ■ Support for PSIRT construction planning ■ Assistance in the preparation of PSIRT-related documents, etc. *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration