National Research Institute Collaboration: Rocket Works' Cloud-based WAF Aegis
Aegis Server Security
Detect and block cyber attacks on websites at a low cost. Equipped with an AI engine, it automatically responds to the latest attacks, eliminating the need for manual operation.
A cloud-based WAF "Aegis," developed by companies participating in a national project, overcomes the challenges of traditional WAFs. Achieving high security 24/7 with 【no construction or operation required】, 【low cost】, and 【no risk】. ■ No construction or operation required No construction or environmental changes are needed during installation. ■ Equipped with AI engine The AI engine automatically responds quickly to new vulnerabilities and attack methods 24/7. ■ No risk of speed delays or server downtime Unlike other products, there is no analysis engine placed on the communication path, eliminating the risk of speed delays or server downtime. ■ Low cost With a flat-rate system instead of pay-as-you-go, you can use it with peace of mind. It is available for as short as one month, making it suitable for campaign sites. ■ Plans with DDoS protection features available We also offer plans that include DDoS protection. ■ Monthly reports sent every month We create monthly reports summarizing cyber attacks on the target website, saving you the hassle of preparing reporting materials.
Inquire About This Product
basic information
〈【Visualizing Cyber Attacks】 Aegis (Cloud-based WAF) One Month Free Trial Now Available〉 "Is my company really experiencing cyber attacks?" "Does a low-cost WAF really work?" These are the top two inquiries we receive from customers. To alleviate your concerns, we are currently running the "One Month Free Trial Campaign" for Aegis. - IP address of the server to be maintained - Email address for defense proof reporting Once you provide us with these two pieces of information, Aegis, the "Cloud WAF + IPS," will be implemented for your company without any construction required. *Please note that the free cyber attack diagnosis does not constitute a contract, so feel free to apply.
Price range
P2
Delivery Time
P3
Applications/Examples of results
■Tokyo / Company J Based on the "Defense Proof Report," the system department holds a countermeasure meeting every month. We also share the same report with the outsourced system company. ■Osaka / Company H I appreciate that they are willing to consult on additional measures and equipment purchases. It is also helpful that they inform us about industry trend services. ■Fukuoka / Company S I was pleased that the president came all the way to Kyushu when I consulted about the contract. Even though it's a cloud service, it's still difficult to finalize a contract without seeing faces. ■Tokyo / Company K Considering the "what if" scenarios, I wanted to ask a company strong in legal matters. The fact that Ogawahara Rokugawa International Comprehensive Law Office is in charge of legal affairs was a significant deciding factor. ■Tokyo / Company U The fixed-rate system made it easier to get approval. I think it could be priced higher. ■Tokyo / Company I The "Defense Proof Report" is inexpensive at 20,000 yen. I feel that just this alone covers the cost. By visualizing the protection measures, my superiors are also convinced.
Company information
Our company is engaged in research, development, and sales aimed at the practical application and standardization of quantum ICT technology, as well as the development and sales of cybersecurity services. We will focus on keeping up with the rapid advancements in information and communication technology that were unimaginable in the past, and on honing security technologies that complement their convenience. Please feel free to contact us for the following requests: ● Support for strengthening website security ・Detection and blocking of cyber attacks on the target website ・Preparation of monthly reports summarizing cyber attacks on the target website ● Web security consulting ・Assistance in building websites that mitigate risks from cyber attacks ● Coordination with external support organizations ・Introduction to companies that respond to security incidents