We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Security Solutions.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Security Solutions×NRIセキュアテクノロジーズ - List of Manufacturers, Suppliers, Companies and Products

Security Solutions Product List

1~4 item / All 4 items

Displayed results

Support services for internal PSIRT (Product Security Incident Response Team)

Strongly support the establishment and enhancement of PSIRT from planning and operation to improvement and incident response!

Our company offers one-stop support for PSIRT, including not only the planning of construction but also assistance in the preparation of PSIRT-related documents, security threat and incident analysis, support for obtaining Achilles certification, assessments, training, incident response support, and operational evaluations. Please feel free to contact us if you have any requests. *PSIRT refers to an organization that manages risks related to security vulnerabilities in products manufactured or sold by the company and responds to emergencies during security incidents. While CSIRTs have also become widespread, the difference from CSIRTs is that PSIRTs are security response organizations specifically for IoT products and IoT services provided to customers. [Examples of Services Offered] ■Support for PSIRT construction planning ■Assistance in the preparation of PSIRT-related documents, etc. *For more details, please download the PDF or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[File Transfer Service Case] Sumitomo Life Insurance Company

Achieve minimization of information risk due to misdelivery by utilizing a closed transmission function for the transfer of personal information of insurance subscribers (Crypto Delivery).

We would like to introduce a case study of the implementation of "Crypto Delivery" at Sumitomo Life Insurance Mutual Company. Until now, the company has been exchanging various business information with customer companies using FD and MO, but the process of exchanging information through electronic media has been cumbersome and improvements have been desired from the perspective of information security. Therefore, the company introduced our product starting in January 2015. In addition to reducing the costs and efforts associated with data exchange, they have implemented a system for data transfer that is more efficient and protected by robust security, utilizing features such as the "Closed Group" function, which allows file exchanges only among designated users. 【Key Points】 ■ Utilization of the "Closed Transmission Function" for the exchange of personal information ■ Minimization of the risk of information leakage due to misdelivery ■ Confirmation of advantages in both security and cost aspects *For more details, please refer to the PDF document or feel free to contact us.

  • Firewall and intrusion prevention
  • Encryption and authentication
  • Virus software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[High Privilege ID Management Case Study] Tokyu Card Co., Ltd.

An example of improved internal security awareness through the establishment of a workflow for task approval.

We would like to introduce the case of Tokyu Card Co., Ltd., which implemented the high-privilege (privileged ID) management solution "SecureCube Access Check." In 2015, the company began efforts to establish a more secure card usage environment in compliance with the security standards for credit card information protection, PCI DSS. They introduced our product as their ID management tool, further strengthening their security management system and enhancing security awareness. 【Case Overview】 ■ Client: Tokyu Card Co., Ltd. ■ Product Implemented: SecureCube Access Check ■ Implementation Effects - Achieved strong access control required by PCI DSS - Significantly improved security awareness across the organization *For more details, please refer to the PDF document or feel free to contact us.

  • Other security
  • Other information systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Measures Against Information Leaks] What methods can corporations use to transfer My Number?

How to collect My Number information safely and efficiently? Explained in the column!

The handling of My Number information (specific personal information) is strictly regulated by law. On the other hand, there are many means of transfer besides mailing and face-to-face interactions. As a business, how can we comply with the rules while also improving efficiency? NRI Secure offers a free guidebook that clearly summarizes key points to consider. Please feel free to download it. *This column includes excerpts from the guidebook. [Contents] ■ Is it permissible to attach files to emails? ■ What are the points to be cautious about when outsourcing? ■ Three essential conditions for using file transfer services *You can view more detailed content on the blog through the related links. *For more information, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration