Products and Services - Security
ID Management | ||
---|---|---|
Product/Service | Software Manufacturer | Product Overview |
LDAP Manager | EXGEN Networks Co., Ltd. (Japan) | LDAP Manager is a purely domestic integrated ID management product that centrally manages user information used in corporate systems. Real-time maintenance from a dedicated GUI and workflow functionality enable companies to improve the efficiency of their ID management operations. |
Okta | Okta, Inc. (U.S.) | This Identity-as-a-Service (IDaaS) product provides cloud-based ID management and integrated authentication services. It efficiently manages Single-Sign-On (SSO) access to cloud services and on-premise websites, strengthens identity verification through multi-factor authentication, and integrates ID linkage to cloud services. |
Privileged ID Management | ||
---|---|---|
Product/Service | Software Manufacturer | Product Overview |
iDoperation | NTT TechnoCross Corporation (Japan) | iDoperation is an All-in-one privileged ID management product with ID management, workflow, access control, access log management, and screen recording functions. It provides privileged ID management functions not only on-premise but also in cloud environments and virtual infrastructures. |
Enhanced Server Security | ||
---|---|---|
Product/Service | Software Manufacturer | Product Overview |
SHieldWARE | Fsas Technologies Inc. (Japan) | This product strengthens the security of servers that store important corporate data. Robust security is realized through enhanced access control and log acquisition that can be performed for servers located on-premise and in the cloud. |
Vulnerability Management | ||
---|---|---|
Product/Service | Software Manufacturer | Product Overview |
Tenable | Tenable, Inc. (U.S.) | From on-premise IT assets to those in the cloud and within IoT, Tenable allows visualization of all corporate IT assets. Through prioritization of many vulnerabilities, Tenable significantly reduces risk management burdens. |
Endpoint Security | ||
---|---|---|
Product/Service | Software Manufacturer | Product Overview |
CylancePROTECT / CylanceOPTICS | BlackBerry Limited (Canada) | An AI-based threat detection engine that exposes unknown malware with a high degree of accuracy and supports visualization, analysis, and investigation of threats. It can be used even in environments without Internet connection, as pattern file updates are not required. |
Unified Endpoint Management (UEM) | ||
---|---|---|
Product/Service | Software Manufacturer | Product Overview |
Hibun | Hitachi Software Engineering Co., Ltd. (Japan) | Hibun is a service (SaaS) enabling the integrated implementation of endpoint security measures and asset management. In addition to visualization of endpoint information, the service automatically addresses vulnerabilities and other problems, enhancing security and reducing operational burdens. |
Information Leakage Countermeasures | ||
---|---|---|
Product/Service | Software Manufacturer | Product Overview |
PISO | Insight Technology, Inc. (Japan) | A monitoring tool using proprietary technology to collect the access logs of various databases with minimal impact to the database. It supports suppression of unauthorized operations by providing information leakage countermeasures and internal controls to monitor and manage audit trails for various compliance requirements. |
Secure Remote Access | ||
---|---|---|
Product/Service | Software Manufacturer |
Product Overview |
Ericom Connect | Ericom Software Ltd. (Israel) | A secure remote access solution that protects corporate information assets and terminals, and provides low-cost, "secure connections" from any device to in-house systems, clouds, and telework environments. |
Citrix Virtual Apps and Desktops | Citrix Systems, Inc. (U.S.) | For the virtualization of applications and desktops, "Citrix Virtual Apps and Desktops" provides optimized communication methods and secure remote access environments for each. In addition, it provides secure data protection for corporate assets, such as prohibiting data storage on terminals through detailed policy settings. |
Citrix DaaS | Citrix Systems, Inc. (U.S.) | Citrix DaaS Provides Citrix product management capabilities as a cloud service. It provides secure remote access to enterprise applications and desktop environments, whether on-premise or in the cloud, and a digital workspace environment. |
On-Line Storage | ||
---|---|---|
Product/Service | Software Manufacturer |
Product Overview |
Citrix ShareFile | Citrix Systems, Inc. (U.S.) | Citrix ShareFile is a hybrid file-sharing solution that allows users to consolidate and access data in various locations, both on-premise and in the cloud, and as a standard online storage solution. |
Secure Access Service Edge | ||
---|---|---|
Product/Service | Software Manufacturer |
Product Overview |
Ericom Shield Cloud | Ericom Software Ltd. (Israel) | Cloud version of Ericom Shield (Internet Isolation). No hardware or installation is required to achieve speedy deployment. Globally deployed access points provide stability and low latency service. |
Zscaler | Zscaler, Inc. (U.S.) | Zscaler is a cloud-based gateway security service that improves security and operational efficiency by applying various security measures such as URL filtering, malware infection countermeasures, and information leakage countermeasures, regardless of where users work. |
Internet Separation | ||
---|---|---|
Product/Service | Software Manufacturer |
Product Overview |
Ericom Shield | Ericom Software Inc. (Israel) | Ericom Shield is a next-generation Internet separation product that improves the usability issues of Internet separation and comes standard with a file detoxification function. In addition, this solution provides convenience and security by enabling you to use local browsers without modification. |
Log Management | ||
---|---|---|
Product/Service | Software Manufacturer | Product Overview |
Logstorage | Infoscience Corporation (Japan) | Logstorage provides the functions necessary for log management for various purposes and can be handled in an integrated manner, regardless of whether on-premise or in the cloud. As a result, it is the de facto standard for integrated log management products, with more than 4,000 companies using it in Japan. |