Centralized management of internal access to the server! A case where the quality and efficiency of access control have significantly improved.
We would like to introduce a case study of Internet Initiative Japan Inc., which implemented the privileged ID access management tool "SecureCube Access Check." The company adopted this product in 2014 to integrate and manage internal access to approximately 27,000 nodes of servers located on-premises and in a private cloud. This has enabled robust information security based on strict and flexible access control. 【Case Overview】 ■ Implementing Company: Internet Initiative Japan Inc. ■ Implemented Product: SecureCube Access Check ■ Implementation Benefits ・Complete digitization of access management ・Significant improvement in the accuracy and efficiency of audit tasks *For more details, please refer to the PDF document or feel free to contact us.
Inquire About This Product
basic information
[Points] - For hosting providers, access control to customer systems is a critical issue in information security. - Centralized management of internal access to servers totaling 27,000 nodes has improved work efficiency. - It can accommodate an OS environment where 70% is Linux and UNIX, meeting sufficient conditions for log acquisition. *For more details, please refer to the PDF document or feel free to contact us.
Price range
Delivery Time
Applications/Examples of results
For more details, please refer to the PDF document or feel free to contact us.
catalog(1)
Download All CatalogsCompany information
NRI Secure Technologies, as a specialized information security company of the Nomura Research Institute Group, has focused on continuously providing high-quality services and products since its establishment by accumulating not only technology but also insights and know-how, as well as fostering world-class security personnel. Regardless of the era, we provide security services that empower companies to adapt to environmental changes, serving as a partner that leads our clients' challenges to success and allowing them to concentrate on and develop their own business as professionals in information security.