1~12 item / All 12 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationContact this company
Contact Us Online1~12 item / All 12 items
Television Osaka, Inc., which conducts television broadcasting business targeting the Osaka Prefecture. While advancing security measures for PCs and networks, you were exploring effective means for email security measures, particularly against spoofing emails, and chose our cloud-based DMARC analysis service "DMARC/25." After the implementation of "DMARC/25," spoofing emails sent from unknown mail servers and their sources have been visualized. Additionally, by utilizing our "Diagnostic Consulting Service," where our analysts analyze your email environment and provide reports and optimal countermeasures, we are currently achieving significant results in reducing spoofing emails. [Challenges Before Implementation] While advancing security measures for PCs and networks, we were exploring how to address spoofing as one of the email security measures.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce a case study of the implementation of the "Cloudmark Security Platform for Email" at Ricoh Company, Ltd. The company was in a black box state, completely unaware of what emails were flowing, in what quantities, and from where to where. To achieve security measures, promote digital transformation (DX), and improve operational efficiency, it was urgent to visualize and restructure the email system. To break this situation, the "Cloudmark Security Platform for Email" was introduced as an email gateway while standardizing the email software specifications. This enabled real-time visualization and control of traffic, resulting in significant improvements in security through finely tunable policies. [Challenges Before Implementation] - The email system was in a black box state, posing significant security risks. - Different organizations operated email systems and standards, leading to issues such as garbled text and undelivered emails. *For more details, please refer to the PDF document or feel free to contact us.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce a case study on the implementation of "DMARC/25 Analyze" at BANDAI SPIRITS Co., Ltd. In recent times, as security incidents have been increasing, the company had been relying solely on manual checks based on reports to confirm the existence of phishing emails impersonating their e-commerce site "Premium Bandai." With the introduction of "DMARC/25 Analyze," the company was able to easily quantify the status of phishing email countermeasures and actively detect such threats. This also significantly reduced the effort previously required. [Challenges Before Implementation] ■ The company was looking for a clearer and more robust way to confirm the existence of phishing emails, which had been unclear. *For more details, please refer to the PDF document or feel free to contact us.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce a case study on the implementation of "DMARC/25" for Techouse Inc. In their operations, the company exchanges numerous emails related to job postings, recruitment, and applications with various clients. The security risk of phishing emails is very high, necessitating the introduction of proper email domain authentication technology. With the implementation of "DMARC/25," the previously opaque email sending routes have been corrected. This is expected to lead to an improvement in the reputation score and a reduction in email delivery failures. [Challenges Before Implementation] ■ Due to the exchange of emails related to job postings, recruitment, and applications with clients, the risk of phishing emails is high, making the introduction of email domain authentication necessary. ■ Numerous emails are sent from multiple domains, and there are multiple infrastructures for email sending, making the application status of SPF and DKIM unclear. ■ Email delivery failures, believed to be caused by a decline in reputation scores, have occurred, necessitating the introduction of email domain authentication technology to improve the reputation score. *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce a case study of the implementation of "RSTOR" at KADOKAWA Connected Inc. The company's video community service "Niconico," one of the largest in Japan, has a vast amount of files stored in its object storage. There were many Read/Write operations for small-sized data, and during these times, the concentration of objects in the hundreds of millions led to issues such as system failures and inability to operate. In response, the company replaced its existing system with the high-speed cloud storage "RSTOR." With the introduction of "RSTOR," they were able to configure an object storage that matched their service, reducing operational downtime and achieving performance well above expectations. 【Challenges Before Implementation】 ■ The current system experienced system failures and became inoperable during times of object concentration or bulk deletion of large amounts of data. ■ The existence of nearly 100 million objects required enormous costs. ■ The current system required routine tasks to maintain performance, which also incurred costs. *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce a case study of the implementation of "DMARC/25" at A2 Corporation. The company had previously set up SPF records as a measure against spoofed emails, but they were unable to ascertain the actual number of spoofed emails that failed authentication. In order to confirm the status of measures against spoofed emails, they chose our "DMARC/25," which offers complete support in Japanese, over many overseas products. By implementing "DMARC/25," they were able to understand the status of SPF authentication and identify issues related to third-party signatures and email forwarding. This has been useful for their future measures against spoofed emails. [Challenges Before Implementation] - Although they believed that the SPF record settings should have mitigated spoofed spam emails, they did not know how many emails were actually failing authentication. *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce a case study of the implementation of "RSTOR" at Kids Star Co., Ltd. The company, which develops digital content for families, has been working to increase the number of app users in line with its business expansion. However, it has been struggling with the rising costs of CDN that have increased in proportion to this growth. One day, after referring to the implementation case of "RSTOR" at another company, they decided to adopt it due to its transparent pricing structure that leads to cost reduction and the good performance observed in the actual test environment. After the implementation, they were able to provide users with stable content delivery, unchanged from before, while achieving the anticipated reduction in CDN costs. 【Challenges Before Implementation】 ■ Struggling with the increasing CDN costs that rise in proportion to the expansion of app user utilization ■ Although CloudFront was addressed with Reserved Capacity, there was no fundamental solution ■ Having allocated resources primarily to front-end development, they missed the timing to transition to a new architecture for the back end (AWS) *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce a case study of the implementation of "Cloudmark Authority" at Nifty Corporation. The company had been using products from other vendors for spam email countermeasures, but it became quite burdensome in terms of costs for both the products and infrastructure, as it was necessary to operate on a scale of dozens of servers. On the other hand, the company had previously implemented the MTA software "Cloudmark Security Platform," and since it was possible to add the email security solution "Cloudmark Authority" as an add-on, and the associated server operation costs and product costs matched their expectations, they decided to proceed with the implementation. After the implementation, not only did they achieve the expected spam detection, but they also eliminated the need for dozens of servers that were required for the operation of other products, resulting in significant infrastructure cost reductions. [Challenges Before Implementation] ■ They were operating a group of dozens of servers with products from other vendors for spam email countermeasures, which was a burden in terms of product and infrastructure costs. *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration(1) DMARC Report Analysis Tool After implementing DMARC to combat spoofing emails for your email domain, you can visualize the data obtained using a cloud-based analysis tool. (2) Consulting We provide implementation and diagnostic consulting for DMARC to combat spoofing emails, reducing the risk of spoofing attacks on your email domain. (3) Brand Logo Icon BIMI Support We assist in issuing the authentication mark certificate necessary for complying with the BIMI standard, which displays your logo on emails sent from your email domain.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationEmail communication is essential in corporate activities. However, with the prevalence of spoofed emails nowadays, security measures to prevent malware and fraud are absolutely necessary for your company. DMARC (Domain-based Message Authentication, Reporting & Conformance) is a technology for combating spoofed emails, and it has been gaining traction overseas, showing certain effectiveness as a security measure. On the other hand, it can be said that this technology is not well-known among domestic companies. This white paper analyzes the extent to which DMARC is being adopted and utilized in specific industries within domestic companies, namely "manufacturing," "distribution and retail," and "financial services." Does your company have DMARC set up for its email domain? Are you effectively utilizing measures against spoofed emails to protect your brand? Through this white paper, why not learn about DMARC and consider its implementation? *Please check the white paper via the PDF download link below.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"DMARC/25" is a cloud-based DMARC analysis service that aggregates and visualizes authentication result information (DMARC reports) for analysis, providing an easy-to-understand web-based report. It allows you to check whether your domain is being misused and can quickly detect suspicious email sending that may involve impersonation. In the event that your domain is used for unauthorized sending, you can accurately grasp the existence and content of phishing emails, enabling you to warn customers or business partners who may receive your emails, thereby mitigating potential damage. 【Service】 ■ Visualization of DMARC reports ・Email usage status ・Impersonation status ・Response status of sending hosts ■ Date and time alert settings ■ Regular diagnostic reports and consulting *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis catalog introduces various products and services that support large-scale email systems. As a group of engineers with many years of experience in the email system infrastructure of major ISPs, xSPs, and mobile operators, we provide consulting on the design and construction of large-scale email systems, as well as on security and other related matters. [Contents (excerpt)] ■ Products & Services ■ TwoFive Products & Services Solutions ■ 01-1 Email delivery server for large-scale use ■ 01-2 Message security for large-scale carriers ■ 01-3 Security filters for large-scale carriers / xSPs *For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration