1~6 item / All 6 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationContact this company
Contact Us Online1~6 item / All 6 items
"ACP (Acronis Cyber Protect)" is a comprehensive solution that protects your company's assets from cyber attacks, disasters, and failures. By installing agent software on computers, it enables the protection of various computers. ACP can be used on a subscription basis according to the types of assets you want to protect and the scale of your business. [Features] ■ A single point of contact for inquiries in case of emergencies, making it simple. *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis is a completely new concept device that prevents the encryption of NAS (Network Attached Storage) by ransomware and protects against large-scale data leaks. The LAN Breaker has two functions: 1. Reducing the risk of valuable data being encrypted by ransomware. 2. Limiting large file copies and blocking the LAN while issuing alerts. Most ransomware attacks begin in the early hours of the morning when there are no users on the IT system. The LAN Breaker reduces the risk of encryption by ransomware by disconnecting the NAS containing important files from the network during that time. The LAN Breaker itself cannot be configured from the network, so it is unaffected even if an attacker takes control of the IT system. Additionally, by pre-setting the file transfer configuration values, it can disconnect the NAS from the network and issue an alert if the communication volume exceeds the set threshold.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe analysis method complies with the "Security Risk Analysis Guide for Control Systems" published by IPA (Information-technology Promotion Agency) and can achieve up to 90% efficiency improvement. It automatically generates asset-based risk analysis sheets and business impact-based risk analysis sheets used in the above guide. By inputting the assets to be analyzed along with their characteristics, connection information, and data flow, it automatically determines dangerous attack trees.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationFor customers who believe that while it is possible to strengthen the security of the headquarters, it is difficult to enhance the security of overseas locations. This tool can automatically generate English versions of the two types of risk analysis sheets provided in the IPA's "Guidelines for Security Risk Analysis of Control Systems, 2nd Edition": the asset-based risk analysis sheet and the business impact-based risk analysis sheet. By using it alongside the English version and the security risk analysis seminar videos, you can improve cybersecurity overseas.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis is an English version of the learning video content for asset-based risk analysis and business impact-based risk analysis, in accordance with the "Security Risk Analysis Guide for Control Systems, 2nd Edition," provided by the Information-technology Promotion Agency (IPA). Recently, there has been a significant increase in cyberattacks from overseas bases and branches. To enhance security measures at such locations, please make use of this content. The online version of the guide is available, and the text in the image is explained in Japanese while adhering to the English (IPA Pocket Guide) standards.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationOur risk analysis support flexibly assists clients who wish to conduct their own analyses. By performing an analysis, it becomes possible to make efficient security investments. Additionally, the standard analysis methods published by the Information-technology Promotion Agency (IPA) come with a guidebook that is 380 pages long, making it recommended for those who want to get started quickly. 【Features】 ■ Fully compliant with IPA's "Security Risk Analysis Guide for Control Systems" ■ Uses our developed risk analysis tools to minimize costs to the extreme ■ Achieves highly effective security risk assessments *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration