We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Security measures.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Security measures - List of Manufacturers, Suppliers, Companies and Products | IPROS GMS

Security measures Product List

1~4 item / All 4 items

Displayed results

Export Control Security DDHBOX

It is impossible to prevent intrusion 100%. Therefore, we stop it at the exit.

Modern cyber attacks have become sophisticated, making it impossible to prevent 100% of intrusions with just entry measures. Once infected, confidential data can be exfiltrated to the attacker's server (C2 server), leading to significant business losses and a loss of social credibility. DDHBOX is a dedicated appliance that fills the gaps in traditional "entry measures" with "exit measures." Utilizing the top-tier threat intelligence list from JSOC (LAC Co., Ltd.), it automatically detects and blocks unauthorized communications to attackers 24/7, preventing information leaks at the source. Its greatest feature is the easy installation that requires simply placing it on the network. There is no need for software installation or configuration changes on individual PCs. Additionally, to prepare for unforeseen circumstances, a cyber insurance policy of up to 3 million yen is included as standard. This covers investigation and recovery costs, with experts providing one-stop support. DDHBOX addresses the challenges faced by small and medium-sized enterprises, such as "lack of expertise" and "limited budgets," offering maximum defense and peace of mind with minimal operational burden. It achieves a "multi-layered defense" encompassing entry, internal, and exit measures, ensuring the protection of your company's digital assets.

  • Firewall and intrusion prevention
  • Security measures

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[DDHBOX Introduction Case] Metal Processing Contracting / Manufacturing and Processing Contracting

Summarize and reinforce the "external communication control, logs, reporting, and emergency response" required for client checks!

We would like to introduce a case study of a company engaged in metal processing outsourcing that implemented the exit security measure "DDHBOX." They were requested by a major manufacturer to submit a security checklist and were pointed out the concern of being "used as a stepping stone" as a subcontractor/supplier. There was no dedicated information systems department, and the situation was being handled by someone with multiple responsibilities. With the introduction of our product, external unauthorized communication (C2) after an intrusion was blocked at the exit. When detected, the source IP was identified through email notifications, and procedures for isolating the terminal were established. A monthly report was created to explain the status of countermeasures both internally and externally. [Case Overview] ■ Challenge: No dedicated information systems department, handled by someone with multiple responsibilities ■ Solution: Created a format to explain the status of countermeasures both internally and externally through monthly reports ■ Effects: - The responses to the checklist became more specific, meeting the conditions for continuing the business relationship - The operational burden was low, allowing for continuity even with multiple responsibilities *For more details, please download the PDF or feel free to contact us.

  • Other security
  • Firewall and intrusion prevention
  • Security measures

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[DDHBOX Introduction Case] IT Vendor / IT and Information Communication

A case where measures that can be "explained" were established not only for our own company but also as a position handling customer information!

We would like to introduce a case where the exit strategy security "DDHBOX" was implemented by an IT vendor. While customers demanded security checks (monitoring/blocking/logging/emergency response), EDR/NDR was considered but posed challenges due to high operational difficulty. Additionally, there were situations where small-scale SOC operations were not feasible. With the introduction of our product, we implemented blocking of C2 communications at the exit. We prepared notification emails and monthly reports as materials for customer reporting, and established a system where investigation/recovery support with insurance can be utilized in emergencies. 【Case Overview】 ■ Challenge: EDR/NDR is a candidate, but operational difficulty is high ■ Solution: Prepared notification emails and monthly reports as materials for customer reporting ■ Effects - Responses to customer checks became more concrete, making contract renewals and new proposals easier - We were able to continuously submit operational results (reports) for measures - We were able to streamline operations to be manageable even with a small team *For more details, please download the PDF or feel free to contact us.

  • Other security
  • Firewall and intrusion prevention
  • Security measures

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[DDHBOX Introduction Case] Testing and Analysis Contracting / Testing, Analysis, and Measurement

Automatically block C2 communications! Simplify operations with notifications and monthly reports, supporting accountability.

We would like to introduce a case where a company engaged in testing and analysis services implemented our exit strategy security solution, "DDHBOX." The client experienced an increase in requests for confirmation regarding "information leakage measures" and "log management," and there were many data media brought in from external sources, making it impossible to eliminate infection risks completely. Additionally, there was a concern about a lack of confidence in investigations and explanations in the event of an accident. By installing our product at the exit and blocking C2 communication, we reduced the risk of data being taken out. We created procedures for device isolation and determining the need for investigation, starting from notification emails, and clarified the insurance-backed investigation/recovery/consulting support as a "last resort." 【Case Overview】 ■ Challenge: Lack of confidence in investigations/explanations in the event of an accident ■ Solution: Clarified insurance-backed investigation/recovery/consulting support as a "last resort" ■ Effects: - Prepared explanatory materials (reports, systems) for clients, making audit responses easier - Clarified initial actions during an incident, reducing the psychological burden on responsible personnel - Evaluated as "preparation including emergency response" *For more details, please download the PDF or feel free to contact us.

  • Other security
  • Firewall and intrusion prevention
  • Security measures

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration